- It doesn't look like there is any way to specific a authentication session timeout per filter policy, profile, or device type - is this true?
- Due to the above would my only option be to set all authentication timeouts to be X amount of time so the chromebooks would need to authenticate per user due to session time?
When you log in via Browser auth it should pop up a new tab (sometimes blocked by your pop up blocker).
The (screwy but we cant change it because some customers rely on it) logic is:
- While the pop-up is open the user is logged in
- After the pop-up is closed they have until auth timeout while still considered logged on
Then what you do is make sure that pop-ups are always allowed, set your timeout to two minutes.
Chromebook user logs in, popup appears in new tab. As long as they keep that tab open they are fine. When the user logs off the tab is closed and the UTM now thinks no user it logged in. Next person comes in and starts again. If anyone ever closes the tab they'll find themselves logged out after 2 minutes (negative reinforcement will teach them not to).
This is assuming that Chromebook doesn't do some screwy multi-user thing and keep users running even in background.
I've configured the browser variant. but after 900sec no surfing there will be the timeout. i configured it now with another way.
deactivatet authentication for the wireless lan for the byod, implemented an hotspot with backend auth and set the authenticationperiode for 24h. the only one problem is, that i cant difference the userpolicys for surfing, but in this scenario isn't a problem .)
greetings