diff --git a/src/api/core/organizations.rs b/src/api/core/organizations.rs index 99e68234..00f2ef71 100644 --- a/src/api/core/organizations.rs +++ b/src/api/core/organizations.rs @@ -1230,20 +1230,25 @@ fn put_policy( None => err!("Invalid policy type"), }; + // If enabling the TwoFactorAuthentication policy, remove this org's members that do have 2FA if pol_type_enum == OrgPolicyType::TwoFactorAuthentication && data.enabled { - let org_list = UserOrganization::find_by_org(&org_id, &conn); + let org_members = UserOrganization::find_by_org(&org_id, &conn); - for user_org in org_list.into_iter() { - let user_twofactor_disabled = TwoFactor::find_by_user(&user_org.user_uuid, &conn).is_empty(); + for member in org_members.into_iter() { + let user_twofactor_disabled = TwoFactor::find_by_user(&member.user_uuid, &conn).is_empty(); - if user_twofactor_disabled && user_org.atype < UserOrgType::Admin { + // Policy only applies to non-Owner/non-Admin members who have accepted joining the org + if user_twofactor_disabled + && member.atype < UserOrgType::Admin + && member.status != UserOrgStatus::Invited as i32 + { if CONFIG.mail_enabled() { - let org = Organization::find_by_uuid(&user_org.org_uuid, &conn).unwrap(); - let user = User::find_by_uuid(&user_org.user_uuid, &conn).unwrap(); + let org = Organization::find_by_uuid(&member.org_uuid, &conn).unwrap(); + let user = User::find_by_uuid(&member.user_uuid, &conn).unwrap(); mail::send_2fa_removed_from_org(&user.email, &org.name)?; } - user_org.delete(&conn)?; + member.delete(&conn)?; } } }