diff --git a/test/Core.Test/AdminConsole/OrganizationFeatures/OrganizationUsers/AcceptOrgUserCommandTests.cs b/test/Core.Test/AdminConsole/OrganizationFeatures/OrganizationUsers/AcceptOrgUserCommandTests.cs index 42347154bd..540bac4d1c 100644 --- a/test/Core.Test/AdminConsole/OrganizationFeatures/OrganizationUsers/AcceptOrgUserCommandTests.cs +++ b/test/Core.Test/AdminConsole/OrganizationFeatures/OrganizationUsers/AcceptOrgUserCommandTests.cs @@ -168,9 +168,6 @@ public class AcceptOrgUserCommandTests // Arrange SetupCommonAcceptOrgUserMocks(sutProvider, user, org, orgUser, adminUserDetails); - // User doesn't have 2FA enabled - sutProvider.GetDependency().TwoFactorIsEnabledAsync(user).Returns(false); - // Organization they are trying to join requires 2FA var twoFactorPolicy = new OrganizationUserPolicyDetails { OrganizationId = orgUser.OrganizationId }; sutProvider.GetDependency() @@ -199,11 +196,6 @@ public class AcceptOrgUserCommandTests .IsEnabled(FeatureFlagKeys.PolicyRequirements) .Returns(true); - // User doesn't have 2FA enabled - sutProvider.GetDependency() - .TwoFactorIsEnabledAsync(user) - .Returns(false); - // Organization they are trying to join requires 2FA sutProvider.GetDependency() .GetAsync(user.Id) @@ -237,7 +229,9 @@ public class AcceptOrgUserCommandTests .Returns(true); // User has 2FA enabled - sutProvider.GetDependency().TwoFactorIsEnabledAsync(Arg.Any()).Returns(true); + sutProvider.GetDependency() + .TwoFactorIsEnabledAsync(user) + .Returns(true); // Organization they are trying to join requires 2FA sutProvider.GetDependency() @@ -260,10 +254,9 @@ public class AcceptOrgUserCommandTests } [Theory] - [BitAutoData(true)] - [BitAutoData(false)] + [BitAutoData] public async Task AcceptOrgUserAsync_WithPolicyRequirementsEnabled_UserJoiningOrgWithout2FARequirement_Succeeds( - bool userTwoFactorEnabled, SutProvider sutProvider, + SutProvider sutProvider, User user, Organization org, OrganizationUser orgUser, OrganizationUserUserDetails adminUserDetails) { SetupCommonAcceptOrgUserMocks(sutProvider, user, org, orgUser, adminUserDetails); @@ -272,11 +265,6 @@ public class AcceptOrgUserCommandTests .IsEnabled(FeatureFlagKeys.PolicyRequirements) .Returns(true); - // User 2FA status - sutProvider.GetDependency() - .TwoFactorIsEnabledAsync(user) - .Returns(userTwoFactorEnabled); - // Organization they are trying to join doesn't require 2FA sutProvider.GetDependency() .GetAsync(user.Id) @@ -759,11 +747,6 @@ public class AcceptOrgUserCommandTests .AnyPoliciesApplicableToUserAsync(user.Id, PolicyType.SingleOrg) .Returns(false); - // User doesn't have 2FA enabled - sutProvider.GetDependency() - .TwoFactorIsEnabledAsync(user) - .Returns(false); - // Org does not require 2FA sutProvider.GetDependency().GetPoliciesApplicableToUserAsync(user.Id, PolicyType.TwoFactorAuthentication, OrganizationUserStatusType.Invited)