diff --git a/bitwarden_license/bit-cli/src/admin-console/device-approval/approve-all.command.ts b/bitwarden_license/bit-cli/src/admin-console/device-approval/approve-all.command.ts index dc78ebf7cd0..33365337913 100644 --- a/bitwarden_license/bit-cli/src/admin-console/device-approval/approve-all.command.ts +++ b/bitwarden_license/bit-cli/src/admin-console/device-approval/approve-all.command.ts @@ -35,7 +35,7 @@ export class ApproveAllCommand { .organizations$(userId) .pipe(map((organizations) => organizations.find((o) => o.id === organizationId))), ); - if (!organization?.canManageUsersPassword) { + if (!organization?.canManageDeviceApprovals) { return Response.error( "You do not have permission to approve pending device authorization requests.", ); diff --git a/bitwarden_license/bit-cli/src/admin-console/device-approval/approve.command.ts b/bitwarden_license/bit-cli/src/admin-console/device-approval/approve.command.ts index 27597fd1a85..b63138a7bc5 100644 --- a/bitwarden_license/bit-cli/src/admin-console/device-approval/approve.command.ts +++ b/bitwarden_license/bit-cli/src/admin-console/device-approval/approve.command.ts @@ -44,7 +44,7 @@ export class ApproveCommand { .organizations$(userId) .pipe(map((organizations) => organizations?.find((o) => o.id === organizationId))), ); - if (!organization?.canManageUsersPassword) { + if (!organization?.canManageDeviceApprovals) { return Response.error( "You do not have permission to approve pending device authorization requests.", ); diff --git a/bitwarden_license/bit-cli/src/admin-console/device-approval/deny-all.command.ts b/bitwarden_license/bit-cli/src/admin-console/device-approval/deny-all.command.ts index 923545f15ef..10c6590ffef 100644 --- a/bitwarden_license/bit-cli/src/admin-console/device-approval/deny-all.command.ts +++ b/bitwarden_license/bit-cli/src/admin-console/device-approval/deny-all.command.ts @@ -39,7 +39,7 @@ export class DenyAllCommand { .organizations$(userId) .pipe(map((organizations) => organizations.find((o) => o.id === organizationId))), ); - if (!organization?.canManageUsersPassword) { + if (!organization?.canManageDeviceApprovals) { return Response.error( "You do not have permission to approve pending device authorization requests.", ); diff --git a/bitwarden_license/bit-cli/src/admin-console/device-approval/deny.command.ts b/bitwarden_license/bit-cli/src/admin-console/device-approval/deny.command.ts index ac5c285f8d7..59bae14f1c6 100644 --- a/bitwarden_license/bit-cli/src/admin-console/device-approval/deny.command.ts +++ b/bitwarden_license/bit-cli/src/admin-console/device-approval/deny.command.ts @@ -43,7 +43,7 @@ export class DenyCommand { .organizations$(userId) .pipe(map((organizations) => organizations.find((o) => o.id === organizationId))), ); - if (!organization?.canManageUsersPassword) { + if (!organization?.canManageDeviceApprovals) { return Response.error( "You do not have permission to approve pending device authorization requests.", ); diff --git a/bitwarden_license/bit-cli/src/admin-console/device-approval/list.command.ts b/bitwarden_license/bit-cli/src/admin-console/device-approval/list.command.ts index 76b22d0edcb..50f318bae61 100644 --- a/bitwarden_license/bit-cli/src/admin-console/device-approval/list.command.ts +++ b/bitwarden_license/bit-cli/src/admin-console/device-approval/list.command.ts @@ -39,7 +39,7 @@ export class ListCommand { .organizations$(userId) .pipe(map((organizations) => organizations.find((o) => o.id === organizationId))), ); - if (!organization?.canManageUsersPassword) { + if (!organization?.canManageDeviceApprovals) { return Response.error( "You do not have permission to approve pending device authorization requests.", );