Description |
This article describes how we administrators can disable the auth-keepalive page and still be able to provide users with a logout option.
When a user is authenticated successfully, The default behaviour is FortiGate will redirect the user to the original page. Users cannot log out by themselves in that case.
The keepalive page periodically refreshes the user's timeout period and should not be closed.
The user needs to open a new browser window for original page access.
This can be configured here:
# config system global
Chrome version 88 introduced a change in how background tabs are handled.
The user will need to authenticate again on the next connection attempt, triggering the redirect to the authentication portal. |
Scope | FortiOS |
Solution |
For a few environments the logout option is important as logging out a user manually will not be possible every time. So below settings is applied to make things work.
First, the admin has to disable the keepalive page in the FortiGate.
Scenario 1:
# config system interface
Tips. The '?' symbol cannot be copy-pasted as its primary purpose is to show the next options in the CLI. To enter the symbol, take SSH access of the FortiGate using Putty (not from GUI) and the Press Ctrl+V and then the '?'. The key should be entered quickly as it allows only a second or two to enter it.
It is possible to use port 1003 if the HTTPS redirect is enabled in the user setting. With the keepalive disabled, FortiGate will instead apply configured timeouts. The default configuration is an idle timeout of five minutes; if the FortiGate did not receive any traffic from the user in the last five minutes, the user is de-authenticated.
|