Skip to content

Automatic Logout

The Automatic Logout feature enhances security by automatically logging out users based on configurable triggers, helping maintain system security and user accountability.

Configuration Options

The EPOS system supports three automatic logout modeso

  1. Post-transaction: Logs out immediately after completing a transaction
  2. Inactivity Timeout: Logs out after a specified period of user inactivity
  3. Combined Mode: Enables both post-transaction and inactivity timeout logout

Setting Up Automatic Logout

  1. Login to the EPOS system

  2. Click the settings cog icon in the top-right corner

  3. Select "Register Settings"

  4. Configure the following settings:

    • Auto-logout Type
    • Default Authentication Method
    • Inactivity Interval (in minutes)
  5. Save your changes

Register Configuration Fields

Field LabelField API NameField TypeField Description
Auto-logout TypeBnow__Autologout_Type__cPicklistOptions: None(Default), Post-transaction, Inactivity Timeout, Post-transaction & Inactivity Timeout
Auto-logout Default AuthenticationBnow__Autologout_Default_Authentication__cPicklistOptions: Username & Password, Pin
Auto-logout Inactivity TimeoutBnow__Autologout_Inactivity_Timeout__cIntegerSpecified time in seconds to wait between the last user action and logging the user out

Inactivity Detection

The system monitors various user interactions to determine activity status:

  • Mouse movement
  • Click events
  • Keyboard input
  • Scrolling
  • Touch events

Inactivity Warning System

When 30 seconds remain before an inactivity timeout occurs:

  1. A warning modal appears on screen

  2. Displays a countdown of remaining seconds

  3. User can continue working by performing any monitored action

  4. System automatically logs out if no action is taken

Login Interface

After automatic logout occurs, the system presents a login interface with:

  • Tabs for both username/password and PIN authentication
  • Default authentication method as configured in register settings
  • Secure re-authentication requirement

Best Practices

Security Recommendations

  1. Set appropriate timeout periods based on:

    • Business security requirements
    • Typical user workflow patterns
    • Regulatory compliance needs
  2. Configure shorter timeouts for:

    • High-security environments
    • Shared workstations
    • Public-facing terminals
  3. Train users on:

    • Warning system functionality
    • How to prevent unintended logouts
    • Proper re-authentication procedures

Implementation Guidelines