Accessing the Native Connect Login Page When Login Bypass Is Enabled
As part of the SAML Authentication configuration, administrators can enable a setting that bypasses the Connect login page and automatically redirects users to the Identity Provider (IdP).
While this improves the sign-in experience for most users, there may be situations where access to the native Connect login page is required. For example:
- Logging in with a native (non-SSO) administrator account
- Troubleshooting SSO configuration issues
- Accessing Connect when the IdP is temporarily unavailable
This page explains how to access the native login page when automatic login bypass is enabled.
When the login page is bypassed
When Bypass Connect login page is enabled in the SAML authentication settings:
- Users who visit the standard Connect login URL are automatically redirected to the IdP
- The native username and password login form is not displayed
Forcing access to the native login page
To bypass the automatic redirect and display the native Connect login page, you can append a query parameter to the login URL.
URL parameter: force_native_login=true
Example:
https://example.com/q/login?force_native_login=true
https://example.com/q/login/admin?force_native_login=true
When this parameter is present:
- The automatic redirect to the IdP is disabled for that request
- The native Connect login page is displayed
- Users can sign in using a native Connect account
This does not change any configuration settings and only applies to the current login attempt.
Important notes
- This option is intended for administrative or troubleshooting use
- It does not disable SSO or the login bypass setting globally
- The parameter must be included each time you want to access the native login page while bypass is enabled