Session Timeouts

View as Markdown

Session Timeouts

Session timeout settings control how long users can remain logged into Gail before being automatically signed out. These settings help protect accounts from unauthorized access and ensure compliance with organizational security policies.

Overview

Gail provides two types of session timeout controls:

  1. Inactivity Timeout - Automatically logs out users after a period of inactivity
  2. Maximum Session Duration - Requires re-authentication after a set time, regardless of activity

Both settings work independently to provide comprehensive session security.

Accessing Session Timeout Settings

To configure session timeout settings:

  1. Navigate to Admin Settings in your Gail dashboard
  2. Select the Security tab
  3. Locate the Session Timeouts section

Only administrators have access to security settings. Contact your workspace admin if you need to adjust these settings.

Inactivity Timeout

What It Does

The inactivity timeout automatically signs out users who have been idle for a specified duration. This protects accounts when users step away from their devices without manually logging out.

How It Works

  • Gail monitors user activity (clicks, keystrokes, page navigation)
  • When no activity is detected for the configured period, a warning appears
  • If the user doesn’t respond to the warning, they’re automatically logged out
  • Users must log back in to resume their session

Configuring Inactivity Timeout

  1. Go to Admin SettingsSecuritySession Timeouts
  2. Locate the Inactivity Timeout setting
  3. Enter the desired timeout duration (in minutes)
  4. Click Save Changes

Common Settings:

  • 15 minutes - High security environments (financial services, banking)
  • 30 minutes - Standard business settings
  • 60 minutes - Relaxed environments with lower security requirements
  • Disabled - No automatic logout based on inactivity (not recommended)

Best Practices

  • Set shorter timeouts (15-30 minutes) for workspaces handling sensitive data
  • Consider your team’s workflow patterns - shorter timeouts may interrupt long tasks
  • Balance security needs with user productivity
  • Notify your team before implementing stricter timeout policies

Example Use Cases

Banking Institution:

Inactivity Timeout: 15 minutes
Reason: Regulatory compliance requires automatic logout to protect customer financial data

Insurance Agency:

Inactivity Timeout: 30 minutes
Reason: Balance security with agent productivity during long customer calls

Financial Advisory Firm:

Inactivity Timeout: 60 minutes
Reason: Advisors frequently switch between client calls and portfolio research

Maximum Session Duration

What It Does

Maximum session duration enforces periodic re-authentication, even if users remain actively using Gail. This ensures credentials are re-verified at regular intervals, reducing the risk of compromised sessions.

How It Works

  • A timer starts when a user logs in
  • When the maximum session duration is reached, the user is automatically logged out
  • This happens regardless of whether the user is actively using Gail
  • Users must re-authenticate with their credentials to continue

Configuring Maximum Session Duration

  1. Go to Admin SettingsSecuritySession Timeouts
  2. Locate the Maximum Session Duration setting
  3. Enter the desired duration (in hours)
  4. Click Save Changes

Common Settings:

  • 4 hours - Very high security environments
  • 8 hours - Standard business day security
  • 12 hours - Extended work sessions
  • 24 hours - Minimal forced re-authentication

Best Practices

  • Align maximum session duration with your typical workday
  • Consider time zones if your team is distributed globally
  • Set to 8 hours for standard business day alignment
  • Communicate the policy to avoid user frustration

Example Use Cases

Financial Services Firm:

Maximum Session Duration: 8 hours
Reason: Compliance framework requires re-authentication twice per business day

24/7 Call Center:

Maximum Session Duration: 12 hours
Reason: Accommodate different shift lengths while maintaining security

Small Business:

Maximum Session Duration: 24 hours
Reason: Minimal disruption for small team with lower security requirements

Combining Both Settings

For optimal security, use both inactivity timeout and maximum session duration together. They address different security scenarios:

High Security Environment:

Inactivity Timeout: 15 minutes
Maximum Session Duration: 8 hours

This configuration protects against both unattended devices and prolonged session exposure.

Standard Business Environment:

Inactivity Timeout: 30 minutes
Maximum Session Duration: 12 hours

Balances security with user convenience for typical business operations.

Relaxed Environment:

Inactivity Timeout: 60 minutes
Maximum Session Duration: 24 hours

Minimal interruption while still maintaining basic session security.

User Experience

Warning Messages

Before automatic logout, users see a warning:

  • Inactivity Warning: “You’ve been inactive for [X] minutes. You’ll be logged out in 2 minutes unless you interact with the page.”
  • Session Expiration Warning: “Your session will expire in 5 minutes. Please save your work.”

What Happens on Timeout

When a timeout occurs:

  1. User is immediately logged out
  2. Any unsaved changes may be lost
  3. User is redirected to the login page
  4. A message explains why they were logged out

Remind users to save their work regularly, especially when configuring shorter timeout periods.

Implementation Best Practices

Planning Your Rollout

  1. Review Requirements - Check if your industry or compliance framework mandates specific timeout settings
  2. Pilot Test - Test settings with a small group before rolling out organization-wide
  3. Document Policies - Create internal documentation explaining timeout policies
  4. Communicate Changes - Notify your team before implementing new timeout settings
  5. Monitor Feedback - Gather user feedback and adjust if settings are too disruptive

Avoiding Common Pitfalls

Too Aggressive Settings:

  • Inactivity timeout under 10 minutes may interrupt legitimate work
  • Can cause user frustration and productivity loss
  • Users may develop workarounds (auto-clickers) that defeat the security purpose

Too Lenient Settings:

  • Timeouts over 2 hours may not adequately protect against unauthorized access
  • May not satisfy compliance requirements
  • Increases risk window for compromised sessions

Not Testing Before Deployment:

  • Can lock out users unexpectedly
  • May not account for specific workflows
  • Can cause support tickets and productivity loss

Compliance Considerations

Different compliance frameworks have specific session timeout requirements:

PCI DSS (Payment Processing)

  • Requires session timeout of 15 minutes or less for high-privilege accounts
  • Standard accounts should timeout within 30 minutes
  • Must re-authenticate after timeout

SOC 2

  • Requires documented session timeout policies
  • Timeout settings must align with stated security policies
  • Regular review of timeout effectiveness

GDPR (Data Protection)

  • No specific timeout requirements
  • Timeouts should be part of “appropriate technical measures”
  • Document as part of data protection impact assessment

GLBA (Financial Services)

  • Requires safeguards to protect customer information
  • Session timeouts are part of access control requirements
  • Must implement automatic logout for unattended sessions
  • Document timeout policies in security program

FINRA (Securities)

  • No explicit timeout requirements, but expects reasonable security measures
  • Timeout settings should align with firm’s cybersecurity policies
  • Document as part of Written Supervisory Procedures (WSP)

Consult with your compliance team to determine the appropriate timeout settings for your organization’s specific requirements.

Troubleshooting

Users Complaining About Frequent Logouts

Check:

  • Is inactivity timeout too aggressive? Consider increasing by 15-minute increments
  • Are users working across multiple tabs? Activity in one tab may not count toward all sessions
  • Do workflows involve long periods without interaction? (e.g., reviewing documents, phone calls)

Solutions:

  • Increase inactivity timeout if security requirements allow
  • Train users to periodically click or move mouse during long tasks
  • Consider specific exceptions for certain user roles

Users Not Being Logged Out as Expected

Check:

  • Settings have been saved correctly
  • No conflicting session management from SSO provider
  • Browser extensions that may simulate activity

Solutions:

  • Review and re-save timeout settings
  • Check SSO provider session settings if applicable
  • Test in incognito/private browsing mode

Session Timeouts Not Working with SSO

When using Single Sign-On (SSO), timeout behavior may be controlled by your identity provider:

  • Gail timeout settings apply to the Gail session only
  • Identity provider may have its own session management
  • Coordinate timeout policies between Gail and your IDP

Viewing Active Sessions

To see currently active sessions:

  1. Go to SettingsSecurityActive Sessions
  2. View all active sessions with details:
    • Device and browser information
    • IP address and location
    • Login time
    • Last activity time
  3. Manually revoke sessions if needed

Force Logout All Sessions

In case of security concerns, you can immediately end all active sessions:

  1. Go to Admin SettingsSecurity
  2. Click Force Logout All Users
  3. Confirm the action
  4. All users (except you) will be immediately logged out

Use force logout sparingly as it will interrupt all active work sessions across your organization.

Session timeout settings work alongside other security features:

FAQ

What happens to unsaved work when I’m logged out?

Unsaved changes may be lost when a session times out. Gail attempts to auto-save certain data, but we recommend saving your work regularly.

Can I set different timeout settings for different users?

Currently, timeout settings apply organization-wide. Role-based timeout settings are planned for a future release.

Do mobile apps have different timeout settings?

Mobile apps use the same timeout settings as the web application for consistency.

Will API sessions also timeout?

API authentication tokens have separate expiration settings. Session timeouts only affect browser-based sessions.

Can users override timeout settings?

No, timeout settings are controlled by administrators and cannot be overridden by individual users.

Does activity in one browser tab extend my session in another tab?

Activity in any Gail tab will reset the inactivity timer across all tabs in the same browser session.

Need Help?

If you have questions about configuring session timeout settings or need assistance determining appropriate policies for your organization, please contact our support team at support@meetgail.com.

Next Steps