mirror of
https://github.com/bitwarden/server.git
synced 2025-05-03 18:52:22 -05:00

* Add RequireSsoPolicyRequirement and its factory to enforce SSO policies * Enhance WebAuthnController to support RequireSsoPolicyRequirement with feature flag integration. Update tests to validate behavior when SSO policies are applicable. * Integrate IPolicyRequirementQuery into request validators to support RequireSsoPolicyRequirement. Update validation logic to check SSO policies based on feature flag. * Refactor RequireSsoPolicyRequirementFactoryTests to improve test coverage for SSO policies. Add tests for handling both valid and invalid policies in CanUsePasskeyLogin and SsoRequired methods. * Remove ExemptStatuses property from RequireSsoPolicyRequirementFactory to use default values from BasePolicyRequirementFactory * Restore ValidateRequireSsoPolicyDisabledOrNotApplicable * Refactor RequireSsoPolicyRequirement to update CanUsePasskeyLogin and SsoRequired properties to use init-only setters * Refactor RequireSsoPolicyRequirementFactoryTests to enhance test clarity * Refactor BaseRequestValidatorTests to improve test clarity * Refactor WebAuthnController to replace SSO policy validation with PolicyRequirement check * Refactor BaseRequestValidator to replace SSO policy validation with PolicyRequirement check * Refactor WebAuthnControllerTests to update test method names and adjust policy requirement checks * Add tests for AttestationOptions and Post methods in WebAuthnControllerTests to validate scenario where SSO is not required * Refactor RequireSsoPolicyRequirement initialization * Refactor SSO requirement check for improved readability * Rename test methods in RequireSsoPolicyRequirementFactoryTests for clarity on exempt status conditions * Update RequireSsoPolicyRequirement to refine user status checks for SSO policy requirements
233 lines
9.0 KiB
C#
233 lines
9.0 KiB
C#
using System.Security.Claims;
|
|
using Bit.Core;
|
|
using Bit.Core.AdminConsole.OrganizationFeatures.Policies;
|
|
using Bit.Core.AdminConsole.Services;
|
|
using Bit.Core.Auth.Repositories;
|
|
using Bit.Core.Auth.Services;
|
|
using Bit.Core.Context;
|
|
using Bit.Core.Entities;
|
|
using Bit.Core.Repositories;
|
|
using Bit.Core.Services;
|
|
using Bit.Core.Settings;
|
|
using Bit.Core.Utilities;
|
|
using Duende.IdentityServer.Models;
|
|
using Duende.IdentityServer.Validation;
|
|
using Microsoft.AspNetCore.Identity;
|
|
|
|
namespace Bit.Identity.IdentityServer.RequestValidators;
|
|
|
|
public class ResourceOwnerPasswordValidator : BaseRequestValidator<ResourceOwnerPasswordValidationContext>,
|
|
IResourceOwnerPasswordValidator
|
|
{
|
|
private UserManager<User> _userManager;
|
|
private readonly ICurrentContext _currentContext;
|
|
private readonly ICaptchaValidationService _captchaValidationService;
|
|
private readonly IAuthRequestRepository _authRequestRepository;
|
|
private readonly IDeviceValidator _deviceValidator;
|
|
public ResourceOwnerPasswordValidator(
|
|
UserManager<User> userManager,
|
|
IUserService userService,
|
|
IEventService eventService,
|
|
IDeviceValidator deviceValidator,
|
|
ITwoFactorAuthenticationValidator twoFactorAuthenticationValidator,
|
|
IOrganizationUserRepository organizationUserRepository,
|
|
IMailService mailService,
|
|
ILogger<ResourceOwnerPasswordValidator> logger,
|
|
ICurrentContext currentContext,
|
|
GlobalSettings globalSettings,
|
|
ICaptchaValidationService captchaValidationService,
|
|
IAuthRequestRepository authRequestRepository,
|
|
IUserRepository userRepository,
|
|
IPolicyService policyService,
|
|
IFeatureService featureService,
|
|
ISsoConfigRepository ssoConfigRepository,
|
|
IUserDecryptionOptionsBuilder userDecryptionOptionsBuilder,
|
|
IPolicyRequirementQuery policyRequirementQuery)
|
|
: base(
|
|
userManager,
|
|
userService,
|
|
eventService,
|
|
deviceValidator,
|
|
twoFactorAuthenticationValidator,
|
|
organizationUserRepository,
|
|
mailService,
|
|
logger,
|
|
currentContext,
|
|
globalSettings,
|
|
userRepository,
|
|
policyService,
|
|
featureService,
|
|
ssoConfigRepository,
|
|
userDecryptionOptionsBuilder,
|
|
policyRequirementQuery)
|
|
{
|
|
_userManager = userManager;
|
|
_currentContext = currentContext;
|
|
_captchaValidationService = captchaValidationService;
|
|
_authRequestRepository = authRequestRepository;
|
|
_deviceValidator = deviceValidator;
|
|
}
|
|
|
|
public async Task ValidateAsync(ResourceOwnerPasswordValidationContext context)
|
|
{
|
|
if (!AuthEmailHeaderIsValid(context))
|
|
{
|
|
context.Result = new GrantValidationResult(TokenRequestErrors.InvalidGrant,
|
|
"Auth-Email header invalid.");
|
|
return;
|
|
}
|
|
|
|
var user = await _userManager.FindByEmailAsync(context.UserName.ToLowerInvariant());
|
|
// We want to keep this device around incase the device is new for the user
|
|
var requestDevice = DeviceValidator.GetDeviceFromRequest(context.Request);
|
|
var knownDevice = await _deviceValidator.GetKnownDeviceAsync(user, requestDevice);
|
|
var validatorContext = new CustomValidatorRequestContext
|
|
{
|
|
User = user,
|
|
KnownDevice = knownDevice != null,
|
|
Device = knownDevice ?? requestDevice,
|
|
};
|
|
|
|
string bypassToken = null;
|
|
if (!validatorContext.KnownDevice &&
|
|
_captchaValidationService.RequireCaptchaValidation(_currentContext, user))
|
|
{
|
|
var captchaResponse = context.Request.Raw["captchaResponse"]?.ToString();
|
|
|
|
if (string.IsNullOrWhiteSpace(captchaResponse))
|
|
{
|
|
context.Result = new GrantValidationResult(TokenRequestErrors.InvalidGrant, "Captcha required.",
|
|
new Dictionary<string, object>
|
|
{
|
|
{ _captchaValidationService.SiteKeyResponseKeyName, _captchaValidationService.SiteKey },
|
|
});
|
|
return;
|
|
}
|
|
|
|
validatorContext.CaptchaResponse = await _captchaValidationService.ValidateCaptchaResponseAsync(
|
|
captchaResponse, _currentContext.IpAddress, user);
|
|
if (!validatorContext.CaptchaResponse.Success)
|
|
{
|
|
await BuildErrorResultAsync("Captcha is invalid. Please refresh and try again", false, context, null);
|
|
return;
|
|
}
|
|
bypassToken = _captchaValidationService.GenerateCaptchaBypassToken(user);
|
|
}
|
|
|
|
await ValidateAsync(context, context.Request, validatorContext);
|
|
if (context.Result.CustomResponse != null && bypassToken != null)
|
|
{
|
|
context.Result.CustomResponse["CaptchaBypassToken"] = bypassToken;
|
|
}
|
|
}
|
|
|
|
protected async override Task<bool> ValidateContextAsync(ResourceOwnerPasswordValidationContext context,
|
|
CustomValidatorRequestContext validatorContext)
|
|
{
|
|
if (string.IsNullOrWhiteSpace(context.UserName) || validatorContext.User == null)
|
|
{
|
|
return false;
|
|
}
|
|
|
|
var authRequestId = context.Request.Raw["AuthRequest"]?.ToString()?.ToLowerInvariant();
|
|
if (!string.IsNullOrWhiteSpace(authRequestId) && Guid.TryParse(authRequestId, out var authRequestGuid))
|
|
{
|
|
var authRequest = await _authRequestRepository.GetByIdAsync(authRequestGuid);
|
|
if (authRequest != null)
|
|
{
|
|
var requestAge = DateTime.UtcNow - authRequest.CreationDate;
|
|
if (requestAge < TimeSpan.FromHours(1) &&
|
|
CoreHelpers.FixedTimeEquals(authRequest.AccessCode, context.Password))
|
|
{
|
|
authRequest.AuthenticationDate = DateTime.UtcNow;
|
|
await _authRequestRepository.ReplaceAsync(authRequest);
|
|
return true;
|
|
}
|
|
}
|
|
return false;
|
|
}
|
|
|
|
if (!await _userService.CheckPasswordAsync(validatorContext.User, context.Password))
|
|
{
|
|
return false;
|
|
}
|
|
return true;
|
|
}
|
|
|
|
protected override Task SetSuccessResult(ResourceOwnerPasswordValidationContext context, User user,
|
|
List<Claim> claims, Dictionary<string, object> customResponse)
|
|
{
|
|
context.Result = new GrantValidationResult(user.Id.ToString(), "Application",
|
|
identityProvider: Constants.IdentityProvider,
|
|
claims: claims.Count > 0 ? claims : null,
|
|
customResponse: customResponse);
|
|
return Task.CompletedTask;
|
|
}
|
|
|
|
[Obsolete("Consider using SetGrantValidationErrorResult instead.")]
|
|
protected override void SetTwoFactorResult(ResourceOwnerPasswordValidationContext context,
|
|
Dictionary<string, object> customResponse)
|
|
{
|
|
context.Result = new GrantValidationResult(TokenRequestErrors.InvalidGrant, "Two factor required.",
|
|
customResponse);
|
|
}
|
|
|
|
[Obsolete("Consider using SetGrantValidationErrorResult instead.")]
|
|
protected override void SetSsoResult(ResourceOwnerPasswordValidationContext context,
|
|
Dictionary<string, object> customResponse)
|
|
{
|
|
context.Result = new GrantValidationResult(TokenRequestErrors.InvalidGrant, "Sso authentication required.",
|
|
customResponse);
|
|
}
|
|
|
|
[Obsolete("Consider using SetGrantValidationErrorResult instead.")]
|
|
protected override void SetErrorResult(ResourceOwnerPasswordValidationContext context,
|
|
Dictionary<string, object> customResponse)
|
|
{
|
|
context.Result = new GrantValidationResult(TokenRequestErrors.InvalidGrant, customResponse: customResponse);
|
|
}
|
|
|
|
protected override void SetValidationErrorResult(
|
|
ResourceOwnerPasswordValidationContext context, CustomValidatorRequestContext requestContext)
|
|
{
|
|
context.Result = new GrantValidationResult
|
|
{
|
|
Error = requestContext.ValidationErrorResult.Error,
|
|
ErrorDescription = requestContext.ValidationErrorResult.ErrorDescription,
|
|
IsError = true,
|
|
CustomResponse = requestContext.CustomResponse
|
|
};
|
|
}
|
|
|
|
protected override ClaimsPrincipal GetSubject(ResourceOwnerPasswordValidationContext context)
|
|
{
|
|
return context.Result.Subject;
|
|
}
|
|
|
|
private bool AuthEmailHeaderIsValid(ResourceOwnerPasswordValidationContext context)
|
|
{
|
|
if (_currentContext.HttpContext.Request.Headers.TryGetValue("Auth-Email", out var authEmailHeader))
|
|
{
|
|
try
|
|
{
|
|
var authEmailDecoded = CoreHelpers.Base64UrlDecodeString(authEmailHeader);
|
|
if (authEmailDecoded != context.UserName)
|
|
{
|
|
return false;
|
|
}
|
|
}
|
|
catch (Exception e) when (e is InvalidOperationException || e is FormatException)
|
|
{
|
|
// Invalid B64 encoding
|
|
return false;
|
|
}
|
|
}
|
|
else
|
|
{
|
|
return false;
|
|
}
|
|
|
|
return true;
|
|
}
|
|
}
|