Skip to main content

Accessing the Native Connect Login Page When Login Bypass Is Enabled

As part of the SAML Authentication configuration, administrators can enable a setting that bypasses the Connect login page and automatically redirects users to the Identity Provider (IdP).

While this improves the sign-in experience for most users, there may be situations where access to the native Connect login page is required. For example:

  • Logging in with a native (non-SSO) administrator account
  • Troubleshooting SSO configuration issues
  • Accessing Connect when the IdP is temporarily unavailable

This page explains how to access the native login page when automatic login bypass is enabled.

When the login page is bypassed

When Bypass Connect login page is enabled in the SAML authentication settings:

  • Users who visit the standard Connect login URL are automatically redirected to the IdP
  • The native username and password login form is not displayed

Forcing access to the native login page

To bypass the automatic redirect and display the native Connect login page, you can append a query parameter to the login URL.

URL parameter: force_native_login=true

Example:

https://example.com/q/login?force_native_login=true
https://example.com/q/login/admin?force_native_login=true

When this parameter is present:

  • The automatic redirect to the IdP is disabled for that request
  • The native Connect login page is displayed
  • Users can sign in using a native Connect account

This does not change any configuration settings and only applies to the current login attempt.

Important notes

  • This option is intended for administrative or troubleshooting use
  • It does not disable SSO or the login bypass setting globally
  • The parameter must be included each time you want to access the native login page while bypass is enabled