mirror of
https://github.com/bitwarden/browser.git
synced 2025-02-28 03:21:40 +01:00
fix(sso-routing): [Auth/PM-13458] Fixes for routing flow on TDE login (#13479)
* fix(sso-routing): [PM-13458] Fixes for routing flow on TDE login - Fixed routing flow and added comments. * fix(sso-routing): [PM-13458] Fixes for routing flow on TDE login - Undid the old sso component flow because we determined it's not worth fixing. * fix(sso-routing): [PM-13458] Fixes for routing flow on TDE login - Removed flow entirely.
This commit is contained in:
parent
359007ab8d
commit
d999d91f19
@ -445,13 +445,6 @@ export class SsoComponent implements OnInit {
|
|||||||
const userId = (await firstValueFrom(this.accountService.activeAccount$))?.id;
|
const userId = (await firstValueFrom(this.accountService.activeAccount$))?.id;
|
||||||
await this.ssoLoginService.setActiveUserOrganizationSsoIdentifier(orgSsoIdentifier, userId);
|
await this.ssoLoginService.setActiveUserOrganizationSsoIdentifier(orgSsoIdentifier, userId);
|
||||||
|
|
||||||
// Users enrolled in admin acct recovery can be forced to set a new password after
|
|
||||||
// having the admin set a temp password for them (affects TDE & standard users)
|
|
||||||
if (authResult.forcePasswordReset == ForceSetPasswordReason.AdminForcePasswordReset) {
|
|
||||||
// Weak password is not a valid scenario here b/c we cannot have evaluated a MP yet
|
|
||||||
return await this.handleForcePasswordReset(orgSsoIdentifier);
|
|
||||||
}
|
|
||||||
|
|
||||||
// must come after 2fa check since user decryption options aren't available if 2fa is required
|
// must come after 2fa check since user decryption options aren't available if 2fa is required
|
||||||
const userDecryptionOpts = await firstValueFrom(
|
const userDecryptionOpts = await firstValueFrom(
|
||||||
this.userDecryptionOptionsService.userDecryptionOptions$,
|
this.userDecryptionOptionsService.userDecryptionOptions$,
|
||||||
|
Loading…
Reference in New Issue
Block a user