-
Notifications
You must be signed in to change notification settings - Fork 1.8k
New issue
Have a question about this project? # for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “#”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? # to your account
Idle timeout behavior. #1935
Comments
talk to @kontsevoy and @klizhentas before working on it, each point comes from a real use-case requested by someone. |
ProposalLets add two settings to both auth_service:
# Maximum time a connection is allowed to remain idle, i.e. without any input from the client.
# 15m (default). Can also be "off" i.e. boolean parsing also applies
disconnect_client_idle: 15m
# When enabled, a connection will be terminated when the client certificate expires.
# OFF by default.
disconnect_expired_cert: off And in the role... kind: role
version: v3
metadata:
name: intern
spec:
options:
# these two settings override the global ones:
disconnect_client_idle: 1m
disconnect_expired_cert: on Notes:
|
what if we don't want to disconnect idle client behavior, should it be - |
also, why not: |
lets leave as-is as discussed. |
This commit implements #1935, fixes #2038 Auth server now supports global defaults for timeout behavior: ``` auth_service: client_idle_timeout: 15m disconnect_expired_cert: no ``` New role options were introduced: ``` kind: role version: v3 metadata: name: intern spec: options: # these two settings override the global ones: client_idle_timeout: 1m disconnect_expired_cert: yes ```
See final result here: Auth server now supports global auth_service:
# default value is 'never' - for backwards-compatibility reasons
client_idle_timeout: 15m
# default value is `no` for backwards compatibility reasons
disconnect_expired_cert: no New role options were introduced: kind: role
version: v3
metadata:
name: intern
spec:
options:
# these two settings override the global ones:
client_idle_timeout: 1m
disconnect_expired_cert: yes |
Global vs local options resolution: Roles do not "relax" global default values when set. For example, in the following setup: auth_service:
client_idle_timeout: 15m and user's role: kind: role
version: v3
metadata:
name: intern
spec:
options:
client_idle_timeout: 20m still, the most restrictive option will be used If there are two roles with two values available, the most restrictive option will be used as well, This means that default global values are permissive - for example default idle timeout is |
This commit implements #1935, fixes #2038 Auth server now supports global defaults for timeout behavior: ``` auth_service: client_idle_timeout: 15m disconnect_expired_cert: no ``` New role options were introduced: ``` kind: role version: v3 metadata: name: intern spec: options: # these two settings override the global ones: client_idle_timeout: 1m disconnect_expired_cert: yes ```
This commit implements #1935, fixes #2038 Auth server now supports global defaults for timeout behavior: ``` auth_service: client_idle_timeout: 15m disconnect_expired_cert: no ``` New role options were introduced: ``` kind: role version: v3 metadata: name: intern spec: options: # these two settings override the global ones: client_idle_timeout: 1m disconnect_expired_cert: yes ```
This commit implements #1935, fixes #2038 Auth server now supports global defaults for timeout behavior: ``` auth_service: client_idle_timeout: 15m disconnect_expired_cert: no ``` New role options were introduced: ``` kind: role version: v3 metadata: name: intern spec: options: # these two settings override the global ones: client_idle_timeout: 1m disconnect_expired_cert: yes ```
Docs for terminating user serssions in case of: - idle clients - expired certs Closes #1935
where will I put this? |
at server side or at client side? |
Description
Many policies CJIS and PCI for example enforce 30 and 15 minutes idle connection termination as a requirement. Make sure that idle connection in teleport indeed terminates after 15 minutes of inactivity.
We have set the timeout, but we need to make sure it actually works.
Proposed solution
There is no single way that will work for everyone, after several conversations with customers here are the modes this ticket should enable:
The text was updated successfully, but these errors were encountered: