Session timeout
Admins set idle timeout and absolute maximum session length:- Idle timeout logs users out after no activity; balances security with long-running canvas work—some teams set 30–60 minutes for analysts, shorter for admins.
- Absolute timeout forces re-authentication even if the user is active, limiting stolen session token utility.
SSO sessions may still be controlled by your IdP; Planasonix respects shorter of the two timeouts where both apply.
IP allowlist
Restrict browser and API access to corporate egress CIDRs or VPN ranges. Remote contractors need explicit entries or a dedicated ZTNA path.Password policy
When local passwords are allowed, configure:- Minimum length and complexity
- Password history to prevent reuse
- Rotation interval (where not superseded by SSO)
API and automation
Session cookies and API keys behave differently: keys often ignore browser session timeout but may still be constrained by IP allowlists. Document which automation subnets to add before enabling strict network rules.Break-glass access
Break-glass access
Maintain an audited break-glass admin path documented with security; do not rely on IP allowlists without a recovery story.
Geographic restrictions
Geographic restrictions
Some deployments block sign-ins from unexpected countries; pair with IdP conditional access for defense in depth.
Related topics
SSO
Federated login and group claims.
MFA
Second factor requirements.