using System.Text.Json; using Bit.Core.AdminConsole.Entities; using Bit.Core.Auth.Enums; using Bit.Core.Auth.Identity.TokenProviders; using Bit.Core.Auth.Models; using Bit.Core.Auth.Models.Business.Tokenables; using Bit.Core.Context; using Bit.Core.Entities; using Bit.Core.Models.Data.Organizations; using Bit.Core.Repositories; using Bit.Core.Services; using Bit.Core.Tokens; using Bit.Core.Utilities; using Duende.IdentityServer.Validation; using Microsoft.AspNetCore.Identity; namespace Bit.Identity.IdentityServer.RequestValidators; public interface ITwoFactorAuthenticationValidator { /// /// Check if the user is required to use two-factor authentication to login. This is based on the user's /// enabled two-factor providers, the user's organizations enabled two-factor providers, and the grant type. /// Client credentials and webauthn grant types do not require two-factor authentication. /// /// the active user for the request /// the request that contains the grant types /// boolean Task> RequiresTwoFactorAsync(User user, ValidatedTokenRequest request); /// /// Builds the two-factor authentication result for the user based on the available two-factor providers /// from either their user account or Organization. /// /// user trying to login /// organization associated with the user; Can be null /// Dictionary with the TwoFactorProviderType as the Key and the Provider Metadata as the Value Task> BuildTwoFactorResultAsync(User user, Organization organization); /// /// Uses the built in userManager methods to verify the two-factor token for the user. If the organization uses /// organization duo, it will use the organization duo token provider to verify the token. /// /// the active User /// organization of user; can be null /// Two Factor Provider to use to verify the token /// secret passed from the user and consumed by the two-factor provider's verify method /// boolean Task VerifyTwoFactor(User user, Organization organization, TwoFactorProviderType twoFactorProviderType, string token); } public class TwoFactorAuthenticationValidator( IUserService userService, UserManager userManager, IOrganizationDuoUniversalTokenProvider organizationDuoWebTokenProvider, IFeatureService featureService, IApplicationCacheService applicationCacheService, IOrganizationUserRepository organizationUserRepository, IOrganizationRepository organizationRepository, IDataProtectorTokenFactory ssoEmail2faSessionTokeFactory, ICurrentContext currentContext) : ITwoFactorAuthenticationValidator { private readonly IUserService _userService = userService; private readonly UserManager _userManager = userManager; private readonly IOrganizationDuoUniversalTokenProvider _organizationDuoUniversalTokenProvider = organizationDuoWebTokenProvider; private readonly IFeatureService _featureService = featureService; private readonly IApplicationCacheService _applicationCacheService = applicationCacheService; private readonly IOrganizationUserRepository _organizationUserRepository = organizationUserRepository; private readonly IOrganizationRepository _organizationRepository = organizationRepository; private readonly IDataProtectorTokenFactory _ssoEmail2faSessionTokeFactory = ssoEmail2faSessionTokeFactory; private readonly ICurrentContext _currentContext = currentContext; public async Task> RequiresTwoFactorAsync(User user, ValidatedTokenRequest request) { if (request.GrantType == "client_credentials" || request.GrantType == "webauthn") { /* Do not require MFA for api key logins. We consider Fido2 userVerification a second factor, so we don't require a second factor here. */ return new Tuple(false, null); } var individualRequired = _userManager.SupportsUserTwoFactor && await _userManager.GetTwoFactorEnabledAsync(user) && (await _userManager.GetValidTwoFactorProvidersAsync(user)).Count > 0; Organization firstEnabledOrg = null; var orgs = (await _currentContext.OrganizationMembershipAsync(_organizationUserRepository, user.Id)).ToList(); if (orgs.Count > 0) { var orgAbilities = await _applicationCacheService.GetOrganizationAbilitiesAsync(); var twoFactorOrgs = orgs.Where(o => OrgUsing2fa(orgAbilities, o.Id)); if (twoFactorOrgs.Any()) { var userOrgs = await _organizationRepository.GetManyByUserIdAsync(user.Id); firstEnabledOrg = userOrgs.FirstOrDefault( o => orgs.Any(om => om.Id == o.Id) && o.TwoFactorIsEnabled()); } } return new Tuple(individualRequired || firstEnabledOrg != null, firstEnabledOrg); } public async Task> BuildTwoFactorResultAsync(User user, Organization organization) { var enabledProviders = await GetEnabledTwoFactorProvidersAsync(user, organization); if (enabledProviders.Count == 0) { return null; } var providers = new Dictionary>(); foreach (var provider in enabledProviders) { var twoFactorParams = await BuildTwoFactorParams(organization, user, provider.Key, provider.Value); providers.Add(((byte)provider.Key).ToString(), twoFactorParams); } var twoFactorResultDict = new Dictionary { { "TwoFactorProviders", providers.Keys }, // backwards compatibility { "TwoFactorProviders2", providers }, }; // If we have email as a 2FA provider, we might need an SsoEmail2fa Session Token if (enabledProviders.Any(p => p.Key == TwoFactorProviderType.Email)) { twoFactorResultDict.Add("SsoEmail2faSessionToken", _ssoEmail2faSessionTokeFactory.Protect(new SsoEmail2faSessionTokenable(user))); twoFactorResultDict.Add("Email", user.Email); } if (enabledProviders.Count == 1 && enabledProviders.First().Key == TwoFactorProviderType.Email) { // Send email now if this is their only 2FA method await _userService.SendTwoFactorEmailAsync(user); } return twoFactorResultDict; } public async Task VerifyTwoFactor( User user, Organization organization, TwoFactorProviderType type, string token) { if (organization != null && type == TwoFactorProviderType.OrganizationDuo) { if (organization.TwoFactorProviderIsEnabled(type)) { return await _organizationDuoUniversalTokenProvider.ValidateAsync(token, organization, user); } return false; } switch (type) { case TwoFactorProviderType.Authenticator: case TwoFactorProviderType.Email: case TwoFactorProviderType.Duo: case TwoFactorProviderType.YubiKey: case TwoFactorProviderType.WebAuthn: case TwoFactorProviderType.Remember: if (type != TwoFactorProviderType.Remember && !await _userService.TwoFactorProviderIsEnabledAsync(type, user)) { return false; } return await _userManager.VerifyTwoFactorTokenAsync(user, CoreHelpers.CustomProviderName(type), token); default: return false; } } private async Task>> GetEnabledTwoFactorProvidersAsync( User user, Organization organization) { var enabledProviders = new List>(); var organizationTwoFactorProviders = organization?.GetTwoFactorProviders(); if (organizationTwoFactorProviders != null) { enabledProviders.AddRange( organizationTwoFactorProviders.Where( p => (p.Value?.Enabled ?? false) && organization.Use2fa)); } var userTwoFactorProviders = user.GetTwoFactorProviders(); var userCanAccessPremium = await _userService.CanAccessPremium(user); if (userTwoFactorProviders != null) { enabledProviders.AddRange( userTwoFactorProviders.Where(p => // Providers that do not require premium (p.Value.Enabled && !TwoFactorProvider.RequiresPremium(p.Key)) || // Providers that require premium and the User has Premium (p.Value.Enabled && TwoFactorProvider.RequiresPremium(p.Key) && userCanAccessPremium))); } return enabledProviders; } /// /// Builds the parameters for the two-factor authentication /// /// We need the organization for Organization Duo Provider type /// The user for which the token is being generated /// Provider Type /// Raw data that is used to create the response /// a dictionary with the correct provider configuration or null if the provider is not configured properly private async Task> BuildTwoFactorParams(Organization organization, User user, TwoFactorProviderType type, TwoFactorProvider provider) { // We will always return this dictionary. If none of the criteria is met then it will return null. var twoFactorParams = new Dictionary(); // OrganizationDuo is odd since it doesn't use the UserManager built-in TwoFactor flows /* Note: Duo is in the midst of being updated to use the UserManager built-in TwoFactor class in the future the `AuthUrl` will be the generated "token" - PM-8107 */ if (type == TwoFactorProviderType.OrganizationDuo && await _organizationDuoUniversalTokenProvider.CanGenerateTwoFactorTokenAsync(organization)) { twoFactorParams.Add("Host", provider.MetaData["Host"]); twoFactorParams.Add("AuthUrl", await _organizationDuoUniversalTokenProvider.GenerateAsync(organization, user)); return twoFactorParams; } // Individual 2FA providers use the UserManager built-in TwoFactor flow so we can generate the token before building the params var token = await _userManager.GenerateTwoFactorTokenAsync(user, CoreHelpers.CustomProviderName(type)); switch (type) { case TwoFactorProviderType.Duo: twoFactorParams.Add("Host", provider.MetaData["Host"]); twoFactorParams.Add("AuthUrl", token); break; case TwoFactorProviderType.WebAuthn: if (token != null) { twoFactorParams = JsonSerializer.Deserialize>(token); } break; case TwoFactorProviderType.Email: var twoFactorEmail = (string)provider.MetaData["Email"]; var redactedEmail = CoreHelpers.RedactEmailAddress(twoFactorEmail); twoFactorParams.Add("Email", redactedEmail); break; case TwoFactorProviderType.YubiKey: twoFactorParams.Add("Nfc", (bool)provider.MetaData["Nfc"]); break; } // return null if the dictionary is empty return twoFactorParams.Count > 0 ? twoFactorParams : null; } private bool OrgUsing2fa(IDictionary orgAbilities, Guid orgId) { return orgAbilities != null && orgAbilities.ContainsKey(orgId) && orgAbilities[orgId].Enabled && orgAbilities[orgId].Using2fa; } }