Jake Fink
88dd745070
[PM-1188] Server owner auth migration ( #2825 )
...
* [PM-1188] add sso project to auth
* [PM-1188] move sso api models to auth
* [PM-1188] fix sso api model namespace & imports
* [PM-1188] move core files to auth
* [PM-1188] fix core sso namespace & models
* [PM-1188] move sso repository files to auth
* [PM-1188] fix sso repo files namespace & imports
* [PM-1188] move sso sql files to auth folder
* [PM-1188] move sso test files to auth folders
* [PM-1188] fix sso tests namespace & imports
* [PM-1188] move auth api files to auth folder
* [PM-1188] fix auth api files namespace & imports
* [PM-1188] move auth core files to auth folder
* [PM-1188] fix auth core files namespace & imports
* [PM-1188] move auth email templates to auth folder
* [PM-1188] move auth email folder back into shared directory
* [PM-1188] fix auth email names
* [PM-1188] move auth core models to auth folder
* [PM-1188] fix auth model namespace & imports
* [PM-1188] add entire Identity project to auth codeowners
* [PM-1188] fix auth orm files namespace & imports
* [PM-1188] move auth orm files to auth folder
* [PM-1188] move auth sql files to auth folder
* [PM-1188] move auth tests to auth folder
* [PM-1188] fix auth test files namespace & imports
* [PM-1188] move emergency access api files to auth folder
* [PM-1188] fix emergencyaccess api files namespace & imports
* [PM-1188] move emergency access core files to auth folder
* [PM-1188] fix emergency access core files namespace & imports
* [PM-1188] move emergency access orm files to auth folder
* [PM-1188] fix emergency access orm files namespace & imports
* [PM-1188] move emergency access sql files to auth folder
* [PM-1188] move emergencyaccess test files to auth folder
* [PM-1188] fix emergency access test files namespace & imports
* [PM-1188] move captcha files to auth folder
* [PM-1188] fix captcha files namespace & imports
* [PM-1188] move auth admin files into auth folder
* [PM-1188] fix admin auth files namespace & imports
- configure mvc to look in auth folders for views
* [PM-1188] remove extra imports and formatting
* [PM-1188] fix ef auth model imports
* [PM-1188] fix DatabaseContextModelSnapshot paths
* [PM-1188] fix grant import in ef
* [PM-1188] update sqlproj
* [PM-1188] move missed sqlproj files
* [PM-1188] move auth ef models out of auth folder
* [PM-1188] fix auth ef models namespace
* [PM-1188] remove auth ef models unused imports
* [PM-1188] fix imports for auth ef models
* [PM-1188] fix more ef model imports
* [PM-1188] fix file encodings
2023-04-14 13:25:56 -04:00
Jake Fink
e5aafe1c8b
[AC-1046] add browser autofill policy ( #2751 )
...
* [EC-1046] add browser autofill policy
* [AC-1046] check plan when activating policy
* [AC-1046] add useActivateAutofillPolicy to Organization response
* [AC-1046] add UseActivateAutofillPolicy to provider org response
2023-03-10 12:52:50 -05:00
Rui Tomé
c6c0f95ed7
[EC-741 Single Organization policy exception when an Invited status user is also in the Revoked status ( #2568 )
...
* [EC-741] Check that OrganizationUsers to be removed have a UserId
* [EC-741] Filtering Revoked users in query for users to remove from organization
2023-01-23 16:05:12 +00:00
Justin Baur
7f5f010e1e
Run formatting ( #2230 )
2022-08-29 16:06:55 -04:00
Justin Baur
bae03feffe
Revert filescoped ( #2227 )
...
* Revert "Add git blame entry (#2226 )"
This reverts commit 239286737d .
* Revert "Turn on file scoped namespaces (#2225 )"
This reverts commit 34fb4cca2a .
2022-08-29 15:53:48 -04:00
Justin Baur
34fb4cca2a
Turn on file scoped namespaces ( #2225 )
2022-08-29 14:53:16 -04:00
Justin Baur
231eb84e69
Turn On ImplicitUsings ( #2079 )
...
* Turn on ImplicitUsings
* Fix formatting
* Run linter
2022-06-29 19:46:41 -04:00
Matt Gibson
ef403b4362
[PS-616] [PS-795] Fix/auto enroll master password reset without user verification ( #2038 )
...
* Fix parameter name to match entity
* Deserialize policy data in object
* Add policy with config type to fixtures
* Return policy with deserialized config
* Use CoreHelper serializers
* Add master password reset on accept request
* Simplify policy data parsing
* Linter
2022-06-08 08:44:28 -05:00
Thomas Rittson
669d44c170
Remove noncompliant users for new policies ( #1951 )
2022-04-22 08:13:02 +10:00
Oscar Hinton
e4a10aae27
Split out repositories to Infrastructure.Dapper / EntityFramework ( #1759 )
2022-01-11 10:40:51 +01:00
Oscar Hinton
23b0a1f9df
Run dotnet format ( #1764 )
2021-12-16 15:35:09 +01:00
Oscar Hinton
f866b25e43
Key Connector feature toggle ( #1716 )
2021-11-17 11:46:35 +01:00
Thomas Rittson
c2975b003d
[Key Connector] Fix policy checks and other pre-reqs ( #1711 )
...
* Require SSO Policy to enable Key Connector
* Require that SSO is enabled to use Key Connector
* Fix error messages
"Key Connector" instead of "KeyConnector"
* Refactor dependent policy checks to handle expansion
* Block disabling Sso Policy if using Key Connector
* Update tests for policies required by Key Connector
* Fix tests
* Add test for Key Connector to require Sso Policy
* Add test: Sso config must be enabled to use Key Connector
2021-11-15 19:25:10 +10:00
Oscar Hinton
fd37cb5a12
Add support for Key Connector OTP and account migration ( #1663 )
...
Co-authored-by: Thomas Rittson <trittson@bitwarden.com >
2021-11-09 16:37:32 +01:00
Oscar Hinton
1aa25f2712
Add checks for vault timeout policy ( #1694 )
2021-11-08 14:37:40 +01:00
Justin Baur
58413e2ff0
Policy Service Tests ( #1344 )
...
* Added SsoConfigService tests
* Cleanup whitespace in SsoConfigServiceTests
* Work on PolicyServiceTests
* Refactor PolicyService to remove uneeded calls
* Implement Code Coverage
* Continued work on PolicyServiceTests
* Revert "Implement Code Coverage"
This reverts commit 4ada179ada .
* Fix PolicyServiceTests after rebasing
* Cleanup unused namespaces
* Added assertions that saving or logging of save aren't happening on exceptions
2021-06-11 10:33:32 -05:00
Addison Beck
445ce33c47
check that SingleOrg policy is enabled before saying users cant create new orgs ( #1110 )
...
* check that SingleOrg policy is enabled before saying users cant create new orgs
* fixed org user kick check for SingleOrg
* code review cleanup
2021-01-25 11:19:33 -05:00
Vincent Salucci
136c39fa50
Initial commit of SingleOrg downstream policy checks ( #1038 )
2020-12-16 16:02:54 -06:00
Vincent Salucci
d9cd7551fe
[Exemption] Updated policy messages ( #984 )
...
* Updated messages // added exemption message // added callout
* updated strings - futureproofing
2020-11-10 09:53:44 -06:00
Vincent Salucci
a5db233e51
[Require SSO] Added service layer dependent policy check ( #977 )
...
* Added service layer dependent policy check
* Updated to SingleOrg
2020-10-27 14:08:19 -05:00
Addison Beck
0eccfb8784
changed all OnlyOrg wording to be SingleOrg instead ( #974 )
...
* changed all OnlyOrg wording to be SingleOrg instead
* missed an OnlyOrg to change to SingleOrg
2020-10-27 10:28:41 -04:00
Addison Beck
e872b4df9d
Only org policy ( #962 )
...
* added OnlyOrg to PolicyType enum
* blocked accepting new org invitations if OnlyOrg is relevant to the userOrg
* blocked creating new orgs if already in an org with OnlyOrg enabled
* created email alert for OnlyOrg policy
* removed users & sent alerts when appropriate for the OnlyOrg policy
* added method to noop mail service
* cleanup for OnlyOrg policy server logic
* blocked confirming new org users if they have violated the OnlyOrg policy since accepting
* added localization strings needed for the OnlyOrg policy
* allowed OnlyOrg policy configuration from the portal
* used correct localization key for onlyorg
* formatting and messaging changes for OnlyOrg
* formatting
* messaging change
* code review changes for onlyorg
* slimmed down a conditional
* optimized getting many orgUser records from many userIds
* removed a test file
* sql formatting
* weirdness
* trying to resolve git diff formatting issues
2020-10-20 02:48:10 -04:00
Chad Scharf
9800b752c0
Changed all C# control flow block statements to include space between keyword and open paren
2020-03-27 14:36:37 -04:00
Kyle Spearrin
f54ebfdc75
email user whenever they're removed from org because of 2fa policy ( #657 )
2020-02-27 09:30:03 -05:00
Kyle Spearrin
81424a8526
Enforce 2fa policy ( #654 )
2020-02-19 14:56:16 -05:00
Kyle Spearrin
9266546d60
only 1 policy event
2020-01-20 09:02:41 -05:00
Kyle Spearrin
0790f9859e
usepolicies check
2020-01-15 15:01:31 -05:00
Kyle Spearrin
58faf5266b
policy events
2020-01-15 09:43:49 -05:00
Kyle Spearrin
937bb4359f
policy service
2020-01-15 09:19:28 -05:00