mirror of
https://github.com/bitwarden/server.git
synced 2025-04-05 05:00:19 -05:00
[Require SSO] Enterprise policy enforcement (#970)
* Initial commit of require sso authentication policy enforcement * Updated sproc to send UseSso flag // Updated base validator to send back error message // Added changes to EntityFramework (just so its there for the future * Update policy name // adjusted conditional to demorgan's * Updated sproc // Added migrator script * Added .sql file extension to DeleteOrgUserWithOrg migrator script * Added policy // edit // strings // validation to business portal * Change requests from review // Added Owner & Admin exemption * Updated repository function used to get org user's type * Updated with requested changes
This commit is contained in:
parent
e872b4df9d
commit
66e44759f0
@ -1,4 +1,5 @@
|
|||||||
using System.Threading.Tasks;
|
using System;
|
||||||
|
using System.Threading.Tasks;
|
||||||
using Bit.Core.Enums;
|
using Bit.Core.Enums;
|
||||||
using Bit.Core.Models.Table;
|
using Bit.Core.Models.Table;
|
||||||
using Bit.Core.Repositories;
|
using Bit.Core.Repositories;
|
||||||
@ -50,7 +51,8 @@ namespace Bit.Portal.Controllers
|
|||||||
}
|
}
|
||||||
|
|
||||||
var policies = await _policyRepository.GetManyByOrganizationIdAsync(orgId.Value);
|
var policies = await _policyRepository.GetManyByOrganizationIdAsync(orgId.Value);
|
||||||
return View(new PoliciesModel(policies));
|
var selectedOrgUseSso = _enterprisePortalCurrentContext.SelectedOrganizationDetails.UseSso;
|
||||||
|
return View(new PoliciesModel(policies, selectedOrgUseSso));
|
||||||
}
|
}
|
||||||
|
|
||||||
[HttpGet("/edit/{type}")]
|
[HttpGet("/edit/{type}")]
|
||||||
@ -88,6 +90,7 @@ namespace Bit.Portal.Controllers
|
|||||||
return Redirect("~/");
|
return Redirect("~/");
|
||||||
}
|
}
|
||||||
|
|
||||||
|
await ValidateDependentPolicies(type, orgId, model.Enabled);
|
||||||
var policy = await _policyRepository.GetByOrganizationIdTypeAsync(orgId.Value, type);
|
var policy = await _policyRepository.GetByOrganizationIdTypeAsync(orgId.Value, type);
|
||||||
if (!ModelState.IsValid)
|
if (!ModelState.IsValid)
|
||||||
{
|
{
|
||||||
@ -119,5 +122,37 @@ namespace Bit.Portal.Controllers
|
|||||||
return View(new PolicyEditModel(policy, _i18nService));
|
return View(new PolicyEditModel(policy, _i18nService));
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
|
||||||
|
private async Task ValidateDependentPolicies(PolicyType type, Guid? orgId, bool enabled)
|
||||||
|
{
|
||||||
|
if (orgId == null)
|
||||||
|
{
|
||||||
|
throw new ArgumentNullException(nameof(orgId), "OrgId cannot be null");
|
||||||
|
}
|
||||||
|
|
||||||
|
switch(type)
|
||||||
|
{
|
||||||
|
case PolicyType.MasterPassword:
|
||||||
|
case PolicyType.PasswordGenerator:
|
||||||
|
case PolicyType.TwoFactorAuthentication:
|
||||||
|
case PolicyType.OnlyOrg:
|
||||||
|
break;
|
||||||
|
|
||||||
|
case PolicyType.RequireSso:
|
||||||
|
if (!enabled)
|
||||||
|
{
|
||||||
|
break;
|
||||||
|
}
|
||||||
|
var singleOrg = await _policyRepository.GetByOrganizationIdTypeAsync(orgId.Value, type);
|
||||||
|
if (singleOrg?.Enabled != true)
|
||||||
|
{
|
||||||
|
ModelState.AddModelError(string.Empty, _i18nService.T("RequireSsoPolicyReqError"));
|
||||||
|
}
|
||||||
|
break;
|
||||||
|
|
||||||
|
default:
|
||||||
|
throw new ArgumentOutOfRangeException();
|
||||||
|
}
|
||||||
|
}
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
@ -8,7 +8,7 @@ namespace Bit.Portal.Models
|
|||||||
{
|
{
|
||||||
public class PoliciesModel
|
public class PoliciesModel
|
||||||
{
|
{
|
||||||
public PoliciesModel(ICollection<Policy> policies)
|
public PoliciesModel(ICollection<Policy> policies, bool useSso)
|
||||||
{
|
{
|
||||||
if (policies == null)
|
if (policies == null)
|
||||||
{
|
{
|
||||||
@ -20,6 +20,10 @@ namespace Bit.Portal.Models
|
|||||||
|
|
||||||
foreach (var type in Enum.GetValues(typeof(PolicyType)).Cast<PolicyType>())
|
foreach (var type in Enum.GetValues(typeof(PolicyType)).Cast<PolicyType>())
|
||||||
{
|
{
|
||||||
|
if (type == PolicyType.RequireSso && !useSso)
|
||||||
|
{
|
||||||
|
continue;
|
||||||
|
}
|
||||||
var enabled = policyDict.ContainsKey(type) ? policyDict[type].Enabled : false;
|
var enabled = policyDict.ContainsKey(type) ? policyDict[type].Enabled : false;
|
||||||
Policies.Add(new PolicyModel(type, enabled));
|
Policies.Add(new PolicyModel(type, enabled));
|
||||||
}
|
}
|
||||||
|
@ -83,6 +83,7 @@ namespace Bit.Portal.Models
|
|||||||
break;
|
break;
|
||||||
case PolicyType.OnlyOrg:
|
case PolicyType.OnlyOrg:
|
||||||
case PolicyType.TwoFactorAuthentication:
|
case PolicyType.TwoFactorAuthentication:
|
||||||
|
case PolicyType.RequireSso:
|
||||||
break;
|
break;
|
||||||
default:
|
default:
|
||||||
throw new ArgumentOutOfRangeException();
|
throw new ArgumentOutOfRangeException();
|
||||||
|
@ -36,6 +36,11 @@ namespace Bit.Portal.Models
|
|||||||
NameKey = "OnlyOrganization";
|
NameKey = "OnlyOrganization";
|
||||||
DescriptionKey = "OnlyOrganizationDescription";
|
DescriptionKey = "OnlyOrganizationDescription";
|
||||||
break;
|
break;
|
||||||
|
|
||||||
|
case PolicyType.RequireSso:
|
||||||
|
NameKey = "RequireSso";
|
||||||
|
DescriptionKey = "RequireSsoDescription";
|
||||||
|
break;
|
||||||
|
|
||||||
default:
|
default:
|
||||||
throw new ArgumentOutOfRangeException();
|
throw new ArgumentOutOfRangeException();
|
||||||
|
@ -32,6 +32,19 @@
|
|||||||
@i18nService.T("OnlyOrganizationPolicyWarning")
|
@i18nService.T("OnlyOrganizationPolicyWarning")
|
||||||
</div>
|
</div>
|
||||||
}
|
}
|
||||||
|
|
||||||
|
@if (Model.PolicyType == PolicyType.RequireSso)
|
||||||
|
{
|
||||||
|
<div class="callout callout-success" role="alert">
|
||||||
|
<h3 class="callout-heading">
|
||||||
|
<i class="fa fa-lightbulb-o" *ngIf="icon" aria-hidden="true"></i>
|
||||||
|
@i18nService.T("Prerequisite")
|
||||||
|
</h3>
|
||||||
|
@i18nService.T("RequireSsoPolicyReq")
|
||||||
|
</div>
|
||||||
|
}
|
||||||
|
|
||||||
|
<div asp-validation-summary="ModelOnly" class="alert alert-danger"></div>
|
||||||
|
|
||||||
<div class="form-group">
|
<div class="form-group">
|
||||||
<div class="form-check">
|
<div class="form-check">
|
||||||
|
@ -6,5 +6,6 @@
|
|||||||
MasterPassword = 1,
|
MasterPassword = 1,
|
||||||
PasswordGenerator = 2,
|
PasswordGenerator = 2,
|
||||||
OnlyOrg = 3,
|
OnlyOrg = 3,
|
||||||
|
RequireSso = 4,
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
@ -35,6 +35,7 @@ namespace Bit.Core.IdentityServer
|
|||||||
private readonly ILogger<ResourceOwnerPasswordValidator> _logger;
|
private readonly ILogger<ResourceOwnerPasswordValidator> _logger;
|
||||||
private readonly CurrentContext _currentContext;
|
private readonly CurrentContext _currentContext;
|
||||||
private readonly GlobalSettings _globalSettings;
|
private readonly GlobalSettings _globalSettings;
|
||||||
|
private readonly IPolicyRepository _policyRepository;
|
||||||
|
|
||||||
public BaseRequestValidator(
|
public BaseRequestValidator(
|
||||||
UserManager<User> userManager,
|
UserManager<User> userManager,
|
||||||
@ -49,7 +50,8 @@ namespace Bit.Core.IdentityServer
|
|||||||
IMailService mailService,
|
IMailService mailService,
|
||||||
ILogger<ResourceOwnerPasswordValidator> logger,
|
ILogger<ResourceOwnerPasswordValidator> logger,
|
||||||
CurrentContext currentContext,
|
CurrentContext currentContext,
|
||||||
GlobalSettings globalSettings)
|
GlobalSettings globalSettings,
|
||||||
|
IPolicyRepository policyRepository)
|
||||||
{
|
{
|
||||||
_userManager = userManager;
|
_userManager = userManager;
|
||||||
_deviceRepository = deviceRepository;
|
_deviceRepository = deviceRepository;
|
||||||
@ -64,6 +66,7 @@ namespace Bit.Core.IdentityServer
|
|||||||
_logger = logger;
|
_logger = logger;
|
||||||
_currentContext = currentContext;
|
_currentContext = currentContext;
|
||||||
_globalSettings = globalSettings;
|
_globalSettings = globalSettings;
|
||||||
|
_policyRepository = policyRepository;
|
||||||
}
|
}
|
||||||
|
|
||||||
protected async Task ValidateAsync(T context, ValidatedTokenRequest request)
|
protected async Task ValidateAsync(T context, ValidatedTokenRequest request)
|
||||||
@ -112,9 +115,18 @@ namespace Bit.Core.IdentityServer
|
|||||||
twoFactorToken = null;
|
twoFactorToken = null;
|
||||||
}
|
}
|
||||||
|
|
||||||
var device = await SaveDeviceAsync(user, request);
|
if (await IsValidAuthTypeAsync(user, request.GrantType)) // Returns true if can finish validation process
|
||||||
await BuildSuccessResultAsync(user, context, device, twoFactorRequest && twoFactorRemember);
|
{
|
||||||
return;
|
var device = await SaveDeviceAsync(user, request);
|
||||||
|
await BuildSuccessResultAsync(user, context, device, twoFactorRequest && twoFactorRemember);
|
||||||
|
}
|
||||||
|
else
|
||||||
|
{
|
||||||
|
SetSsoResult(context, new Dictionary<string, object>
|
||||||
|
{{
|
||||||
|
"ErrorModel", new ErrorResponseModel("SSO authentication is required.")
|
||||||
|
}});
|
||||||
|
}
|
||||||
}
|
}
|
||||||
|
|
||||||
protected abstract Task<(User, bool)> ValidateContextAsync(T context);
|
protected abstract Task<(User, bool)> ValidateContextAsync(T context);
|
||||||
@ -229,6 +241,8 @@ namespace Bit.Core.IdentityServer
|
|||||||
}
|
}
|
||||||
|
|
||||||
protected abstract void SetTwoFactorResult(T context, Dictionary<string, object> customResponse);
|
protected abstract void SetTwoFactorResult(T context, Dictionary<string, object> customResponse);
|
||||||
|
|
||||||
|
protected abstract void SetSsoResult(T context, Dictionary<string, object> customResponse);
|
||||||
|
|
||||||
protected abstract void SetSuccessResult(T context, User user, List<Claim> claims,
|
protected abstract void SetSuccessResult(T context, User user, List<Claim> claims,
|
||||||
Dictionary<string, object> customResponse);
|
Dictionary<string, object> customResponse);
|
||||||
@ -259,11 +273,63 @@ namespace Bit.Core.IdentityServer
|
|||||||
return new Tuple<bool, Organization>(individualRequired || firstEnabledOrg != null, firstEnabledOrg);
|
return new Tuple<bool, Organization>(individualRequired || firstEnabledOrg != null, firstEnabledOrg);
|
||||||
}
|
}
|
||||||
|
|
||||||
|
private async Task<bool> IsValidAuthTypeAsync(User user, string grantType)
|
||||||
|
{
|
||||||
|
if (grantType == "authorization_code")
|
||||||
|
{
|
||||||
|
return true; // Already using SSO to authorize, finish successfully
|
||||||
|
}
|
||||||
|
|
||||||
|
// Is user apart of any orgs? Use cache for initial checks.
|
||||||
|
var orgs = (await _currentContext.OrganizationMembershipAsync(_organizationUserRepository, user.Id))
|
||||||
|
.ToList();
|
||||||
|
if (orgs.Any())
|
||||||
|
{
|
||||||
|
// Get all org abilities
|
||||||
|
var orgAbilities = await _applicationCacheService.GetOrganizationAbilitiesAsync();
|
||||||
|
// Parse all user orgs that are enabled and have the ability to use sso
|
||||||
|
var ssoOrgs = orgs.Where(o => OrgCanUseSso(orgAbilities, o.Id));
|
||||||
|
if (ssoOrgs.Any())
|
||||||
|
{
|
||||||
|
// Parse users orgs and determine if require sso policy is enabled
|
||||||
|
var userOrgs = await _organizationRepository.GetManyByUserIdAsync(user.Id);
|
||||||
|
foreach (var org in userOrgs)
|
||||||
|
{
|
||||||
|
if (!(org.Enabled && org.UseSso))
|
||||||
|
{
|
||||||
|
continue;
|
||||||
|
}
|
||||||
|
|
||||||
|
var orgPolicy = await _policyRepository.GetByOrganizationIdTypeAsync(org.Id, PolicyType.RequireSso);
|
||||||
|
if (orgPolicy != null && orgPolicy.Enabled)
|
||||||
|
{
|
||||||
|
var userType = await _organizationUserRepository.GetByOrganizationAsync(org.Id, user.Id);
|
||||||
|
// Owners and Admins are exempt from this policy
|
||||||
|
if (userType != null
|
||||||
|
&& userType.Type != OrganizationUserType.Owner
|
||||||
|
&& userType.Type != OrganizationUserType.Admin)
|
||||||
|
{
|
||||||
|
return false;
|
||||||
|
}
|
||||||
|
}
|
||||||
|
}
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
return true; // Default - continue validation process
|
||||||
|
}
|
||||||
|
|
||||||
private bool OrgUsing2fa(IDictionary<Guid, OrganizationAbility> orgAbilities, Guid orgId)
|
private bool OrgUsing2fa(IDictionary<Guid, OrganizationAbility> orgAbilities, Guid orgId)
|
||||||
{
|
{
|
||||||
return orgAbilities != null && orgAbilities.ContainsKey(orgId) &&
|
return orgAbilities != null && orgAbilities.ContainsKey(orgId) &&
|
||||||
orgAbilities[orgId].Enabled && orgAbilities[orgId].Using2fa;
|
orgAbilities[orgId].Enabled && orgAbilities[orgId].Using2fa;
|
||||||
}
|
}
|
||||||
|
|
||||||
|
private bool OrgCanUseSso(IDictionary<Guid, OrganizationAbility> orgAbilities, Guid orgId)
|
||||||
|
{
|
||||||
|
return orgAbilities != null && orgAbilities.ContainsKey(orgId) &&
|
||||||
|
orgAbilities[orgId].Enabled && orgAbilities[orgId].UseSso;
|
||||||
|
}
|
||||||
|
|
||||||
private Device GetDeviceFromRequest(ValidatedRequest request)
|
private Device GetDeviceFromRequest(ValidatedRequest request)
|
||||||
{
|
{
|
||||||
|
@ -31,10 +31,11 @@ namespace Bit.Core.IdentityServer
|
|||||||
IMailService mailService,
|
IMailService mailService,
|
||||||
ILogger<ResourceOwnerPasswordValidator> logger,
|
ILogger<ResourceOwnerPasswordValidator> logger,
|
||||||
CurrentContext currentContext,
|
CurrentContext currentContext,
|
||||||
GlobalSettings globalSettings)
|
GlobalSettings globalSettings,
|
||||||
|
IPolicyRepository policyRepository)
|
||||||
: base(userManager, deviceRepository, deviceService, userService, eventService,
|
: base(userManager, deviceRepository, deviceService, userService, eventService,
|
||||||
organizationDuoWebTokenProvider, organizationRepository, organizationUserRepository,
|
organizationDuoWebTokenProvider, organizationRepository, organizationUserRepository,
|
||||||
applicationCacheService, mailService, logger, currentContext, globalSettings)
|
applicationCacheService, mailService, logger, currentContext, globalSettings, policyRepository)
|
||||||
{
|
{
|
||||||
_userManager = userManager;
|
_userManager = userManager;
|
||||||
}
|
}
|
||||||
@ -78,6 +79,9 @@ namespace Bit.Core.IdentityServer
|
|||||||
context.Result.CustomResponse = customResponse;
|
context.Result.CustomResponse = customResponse;
|
||||||
}
|
}
|
||||||
|
|
||||||
|
protected override void SetSsoResult(CustomTokenRequestValidationContext context,
|
||||||
|
Dictionary<string, object> customResponse) => throw new System.NotImplementedException();
|
||||||
|
|
||||||
protected override void SetErrorResult(CustomTokenRequestValidationContext context,
|
protected override void SetErrorResult(CustomTokenRequestValidationContext context,
|
||||||
Dictionary<string, object> customResponse)
|
Dictionary<string, object> customResponse)
|
||||||
{
|
{
|
||||||
|
@ -31,10 +31,11 @@ namespace Bit.Core.IdentityServer
|
|||||||
IMailService mailService,
|
IMailService mailService,
|
||||||
ILogger<ResourceOwnerPasswordValidator> logger,
|
ILogger<ResourceOwnerPasswordValidator> logger,
|
||||||
CurrentContext currentContext,
|
CurrentContext currentContext,
|
||||||
GlobalSettings globalSettings)
|
GlobalSettings globalSettings,
|
||||||
|
IPolicyRepository policyRepository)
|
||||||
: base(userManager, deviceRepository, deviceService, userService, eventService,
|
: base(userManager, deviceRepository, deviceService, userService, eventService,
|
||||||
organizationDuoWebTokenProvider, organizationRepository, organizationUserRepository,
|
organizationDuoWebTokenProvider, organizationRepository, organizationUserRepository,
|
||||||
applicationCacheService, mailService, logger, currentContext, globalSettings)
|
applicationCacheService, mailService, logger, currentContext, globalSettings, policyRepository)
|
||||||
{
|
{
|
||||||
_userManager = userManager;
|
_userManager = userManager;
|
||||||
_userService = userService;
|
_userService = userService;
|
||||||
@ -77,6 +78,13 @@ namespace Bit.Core.IdentityServer
|
|||||||
customResponse);
|
customResponse);
|
||||||
}
|
}
|
||||||
|
|
||||||
|
protected override void SetSsoResult(ResourceOwnerPasswordValidationContext context,
|
||||||
|
Dictionary<string, object> customResponse)
|
||||||
|
{
|
||||||
|
context.Result = new GrantValidationResult(TokenRequestErrors.InvalidGrant, "Sso authentication required.",
|
||||||
|
customResponse);
|
||||||
|
}
|
||||||
|
|
||||||
protected override void SetErrorResult(ResourceOwnerPasswordValidationContext context,
|
protected override void SetErrorResult(ResourceOwnerPasswordValidationContext context,
|
||||||
Dictionary<string, object> customResponse)
|
Dictionary<string, object> customResponse)
|
||||||
{
|
{
|
||||||
|
@ -16,6 +16,7 @@ namespace Bit.Core.Models.Data
|
|||||||
organization.TwoFactorProviders != "{}";
|
organization.TwoFactorProviders != "{}";
|
||||||
UsersGetPremium = organization.UsersGetPremium;
|
UsersGetPremium = organization.UsersGetPremium;
|
||||||
Enabled = organization.Enabled;
|
Enabled = organization.Enabled;
|
||||||
|
UseSso = organization.UseSso;
|
||||||
}
|
}
|
||||||
|
|
||||||
public Guid Id { get; set; }
|
public Guid Id { get; set; }
|
||||||
@ -24,5 +25,6 @@ namespace Bit.Core.Models.Data
|
|||||||
public bool Using2fa { get; set; }
|
public bool Using2fa { get; set; }
|
||||||
public bool UsersGetPremium { get; set; }
|
public bool UsersGetPremium { get; set; }
|
||||||
public bool Enabled { get; set; }
|
public bool Enabled { get; set; }
|
||||||
|
public bool UseSso { get; set; }
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
@ -99,6 +99,7 @@ namespace Bit.Core.Repositories.EntityFramework
|
|||||||
UseEvents = e.UseEvents,
|
UseEvents = e.UseEvents,
|
||||||
UsersGetPremium = e.UsersGetPremium,
|
UsersGetPremium = e.UsersGetPremium,
|
||||||
Using2fa = e.Use2fa && e.TwoFactorProviders != null,
|
Using2fa = e.Use2fa && e.TwoFactorProviders != null,
|
||||||
|
UseSso = e.UseSso,
|
||||||
}).ToListAsync();
|
}).ToListAsync();
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
@ -548,4 +548,19 @@
|
|||||||
<data name="OnlyOrganizationPolicyWarning" xml:space="preserve">
|
<data name="OnlyOrganizationPolicyWarning" xml:space="preserve">
|
||||||
<value>Organization members who are already a part of another organization will be removed from this organization and will receive an email notifying them about the change.</value>
|
<value>Organization members who are already a part of another organization will be removed from this organization and will receive an email notifying them about the change.</value>
|
||||||
</data>
|
</data>
|
||||||
|
<data name="RequireSso" xml:space="preserve">
|
||||||
|
<value>Single Sign-On Authentication</value>
|
||||||
|
</data>
|
||||||
|
<data name="RequireSsoDescription" xml:space="preserve">
|
||||||
|
<value>Require users to log in with the Enterprise Single Sign-On method.</value>
|
||||||
|
</data>
|
||||||
|
<data name="Prerequisite" xml:space="preserve">
|
||||||
|
<value>Prerequisite</value>
|
||||||
|
</data>
|
||||||
|
<data name="RequireSsoPolicyReq" xml:space="preserve">
|
||||||
|
<value>The Single Organization enterprise policy must be enabled before activating this policy.</value>
|
||||||
|
</data>
|
||||||
|
<data name="RequireSsoPolicyReqError" xml:space="preserve">
|
||||||
|
<value>Single Organization policy not enabled.</value>
|
||||||
|
</data>
|
||||||
</root>
|
</root>
|
||||||
|
@ -14,6 +14,7 @@ BEGIN
|
|||||||
0
|
0
|
||||||
END AS [Using2fa],
|
END AS [Using2fa],
|
||||||
[UsersGetPremium],
|
[UsersGetPremium],
|
||||||
|
[UseSso],
|
||||||
[Enabled]
|
[Enabled]
|
||||||
FROM
|
FROM
|
||||||
[dbo].[Organization]
|
[dbo].[Organization]
|
||||||
|
28
util/Migrator/DbScripts/2020-10-20_00_OrgReadAbilities.sql
Normal file
28
util/Migrator/DbScripts/2020-10-20_00_OrgReadAbilities.sql
Normal file
@ -0,0 +1,28 @@
|
|||||||
|
IF OBJECT_ID('[dbo].[Organization_ReadAbilities]') IS NOT NULL
|
||||||
|
BEGIN
|
||||||
|
DROP PROCEDURE [dbo].[Organization_ReadAbilities]
|
||||||
|
END
|
||||||
|
GO
|
||||||
|
|
||||||
|
CREATE PROCEDURE [dbo].[Organization_ReadAbilities]
|
||||||
|
AS
|
||||||
|
BEGIN
|
||||||
|
SET NOCOUNT ON
|
||||||
|
|
||||||
|
SELECT
|
||||||
|
[Id],
|
||||||
|
[UseEvents],
|
||||||
|
[Use2fa],
|
||||||
|
CASE
|
||||||
|
WHEN [Use2fa] = 1 AND [TwoFactorProviders] IS NOT NULL AND [TwoFactorProviders] != '{}' THEN
|
||||||
|
1
|
||||||
|
ELSE
|
||||||
|
0
|
||||||
|
END AS [Using2fa],
|
||||||
|
[UsersGetPremium],
|
||||||
|
[UseSso],
|
||||||
|
[Enabled]
|
||||||
|
FROM
|
||||||
|
[dbo].[Organization]
|
||||||
|
END
|
||||||
|
GO
|
Loading…
x
Reference in New Issue
Block a user