The Automatic Logout feature enhances security by automatically logging out users based on configurable triggers, helping maintain system security and user accountability.
Configuration Options
The EPOS system supports three automatic logout modeso
- Post-transaction: Logs out immediately after completing a transaction
- Inactivity Timeout: Logs out after a specified period of user inactivity
- Combined Mode: Enables both post-transaction and inactivity timeout logout
Setting Up Automatic Logout
Login to the EPOS system
Click the settings cog icon in the top-right corner
Select "Register Settings"
Configure the following settings:
- Auto-logout Type
- Default Authentication Method
- Inactivity Interval (in minutes)
Save your changes
Register Configuration Fields
| Field Label | Field API Name | Field Type | Field Description |
|---|---|---|---|
| Auto-logout Type | Bnow__Autologout_Type__c | Picklist | Options: None(Default), Post-transaction, Inactivity Timeout, Post-transaction & Inactivity Timeout |
| Auto-logout Default Authentication | Bnow__Autologout_Default_Authentication__c | Picklist | Options: Username & Password, Pin |
| Auto-logout Inactivity Timeout | Bnow__Autologout_Inactivity_Timeout__c | Integer | Specified time in seconds to wait between the last user action and logging the user out |
Inactivity Detection
The system monitors various user interactions to determine activity status:
- Mouse movement
- Click events
- Keyboard input
- Scrolling
- Touch events
Inactivity Warning System
When 30 seconds remain before an inactivity timeout occurs:
A warning modal appears on screen
Displays a countdown of remaining seconds
User can continue working by performing any monitored action
System automatically logs out if no action is taken
Login Interface
After automatic logout occurs, the system presents a login interface with:
- Tabs for both username/password and PIN authentication
- Default authentication method as configured in register settings
- Secure re-authentication requirement
Best Practices
Security Recommendations
Set appropriate timeout periods based on:
- Business security requirements
- Typical user workflow patterns
- Regulatory compliance needs
Configure shorter timeouts for:
- High-security environments
- Shared workstations
- Public-facing terminals
Train users on:
- Warning system functionality
- How to prevent unintended logouts
- Proper re-authentication procedures