Some of our employees use OpenVPN Connect, some Pritunl Client.
Correct workflow of deactivation the user who connected with Pritunl client:
User in Okta deactivated,
Active Pritunl VPN connection drops and user can’t connect to our VPN,
Profit.
Incorrect workflow with OpenVPN Connect:
User in Okta deactivated,
Active OpenVPN Connect connection still active and healthy. Only when the user manually disconnects, they can’t reconnect. Update: default time is 60 minutes (app.sso_connection_check_ttl)
Right now I have only ability to manually drop connection by deleting him or push “Disable and disconnect user” button in admin dashboard.
Can it somehow be configured to automatically drop active connections when employee deactivated in Okta?
The single sign-on check during connection is only available in recent releases. This will re-sync the single sign-on user status at the interval set by app.sso_connection_check_ttl. It is enabled by default at a 1 hour interval. Reducing this interval may cause API limit errors from the single sign-on provider.