FR Force Single Sign-On flow with every sign in when online |
||||||||
Issue descriptionCustomer would like to force their Chromebook users through the SSO flow via their IdP with every online sign-in attempt. This is to accommodate an IdP providing controlled access to the user based on their IP address from which they are attempting to sign-in. This would also need to accommodate to allow users to sign-in while offline. Currently when SSO is enabled the minimum frequency via user policy is 3 days, which is too high for this customer.
,
Jun 13 2016
Start for all options
,
Jun 14 2016
david has been thinking about this.
,
Jun 16 2016
+1 to Comment 1. A little known fact about the online flow when the devices loses internet is that it will show a fake Google sign in screen. If the user types in their email address and their offline password it will let the users in without doing online auth. It will be a bit strange for a SAML user since the fake screen looks like GAIA and not like their IdP, but it should cover their bases.
,
Jun 16 2016
That said, what's not a high timeout? 1 day? The original worry was that we want to protect the user experience with the pods screen and we don't want admins to deprive users of an offline experience by setting this to 0 days. 3 days was considered a reasonable compromise. Though per comments #1 and #4, this can be easily worked around by using an existing policy.
,
Jun 17 2016
+ltong, sdavern fyi It feels like we have a workable solution that's outlined in c#1 and discussed with me a while back (thanks Jay!). I've shared this with the partner previously and at this stage have not had feedback that this isn't addressing their use case.
,
Jul 14 2016
Need to revisit this. The ask is now not to force SSO flow with every sign in when online as title suggests, but instead to have lower frequency options in CPanel e.g. 1, 3, 5 hours. Adding some context: - The Azure AD user portal is providing access to employee apps. - When the Azure AD timeout value is exceeded, or the users access changes (internal to external or vice versa) they have to re-authenticate with the site by design, to gain access to any of the apps it provides. - Chromebooks continue to provide access to GApps regardless which is undesired from a corporate data security perspective. - Forcing SSO flow every sign in with "never show user names and photos" is overkill and additional work for the user. Essentially bringing the Chrome SSO user policy timer down to less than the Azure AD timeout aligns Chrome device access, GApps access and Azure AD apps access, so that the SSO flow is followed only when necessary (timeout, network change...). This provides consistency, instead of having users signed into Chrome device and GApps, but not Azure AD and all the apps Azure is providing access to.
,
Oct 28 2016
Please use Hotlist-Enterprise, not Enterprise-Hotlist.
,
Nov 10 2016
,
Aug 1
,
Aug 23
,
Sep 18
|
||||||||
►
Sign in to add a comment |
||||||||
Comment 1 by jayhlee@google.com
, Jun 12 2016