2023-07-12 12:24:01 +00:00
|
|
|
package oidc
|
|
|
|
|
|
|
|
import "github.com/zitadel/zitadel/internal/domain"
|
|
|
|
|
|
|
|
const (
|
|
|
|
// Password states that the users password has been verified
|
|
|
|
// Deprecated: use `PWD` instead
|
|
|
|
Password = "password"
|
|
|
|
// PWD states that the users password has been verified
|
|
|
|
PWD = "pwd"
|
|
|
|
// MFA states that multiple factors have been verified (e.g. pwd and otp or passkey)
|
|
|
|
MFA = "mfa"
|
|
|
|
// OTP states that a one time password has been verified (e.g. TOTP)
|
|
|
|
OTP = "otp"
|
|
|
|
// UserPresence states that the end users presence has been verified (e.g. passkey and u2f)
|
|
|
|
UserPresence = "user"
|
|
|
|
)
|
|
|
|
|
|
|
|
// AuthMethodTypesToAMR maps zitadel auth method types to Authentication Method Reference Values
|
|
|
|
// as defined in [RFC 8176, section 2].
|
|
|
|
//
|
|
|
|
// [RFC 8176, section 2]: https://datatracker.ietf.org/doc/html/rfc8176#section-2
|
|
|
|
func AuthMethodTypesToAMR(methodTypes []domain.UserAuthMethodType) []string {
|
2024-03-20 10:18:46 +00:00
|
|
|
if methodTypes == nil {
|
|
|
|
return nil // make sure amr is omitted when not provided / supported
|
|
|
|
}
|
2023-07-12 12:24:01 +00:00
|
|
|
amr := make([]string, 0, 4)
|
2023-08-02 16:57:53 +00:00
|
|
|
var factors, otp int
|
2023-07-12 12:24:01 +00:00
|
|
|
for _, methodType := range methodTypes {
|
|
|
|
switch methodType {
|
|
|
|
case domain.UserAuthMethodTypePassword:
|
|
|
|
amr = append(amr, PWD)
|
2023-08-02 16:57:53 +00:00
|
|
|
factors++
|
2023-07-12 12:24:01 +00:00
|
|
|
case domain.UserAuthMethodTypePasswordless:
|
|
|
|
amr = append(amr, UserPresence)
|
2023-08-02 16:57:53 +00:00
|
|
|
factors += 2
|
2023-07-12 12:24:01 +00:00
|
|
|
case domain.UserAuthMethodTypeU2F:
|
|
|
|
amr = append(amr, UserPresence)
|
2023-08-02 16:57:53 +00:00
|
|
|
factors++
|
2024-03-20 10:18:46 +00:00
|
|
|
case domain.UserAuthMethodTypeOTP,
|
|
|
|
domain.UserAuthMethodTypeTOTP,
|
2023-08-02 16:57:53 +00:00
|
|
|
domain.UserAuthMethodTypeOTPSMS,
|
|
|
|
domain.UserAuthMethodTypeOTPEmail:
|
|
|
|
// a user could use multiple (t)otp, which is a factor, but still will be returned as a single `otp` entry
|
|
|
|
otp++
|
|
|
|
factors++
|
2023-07-12 12:24:01 +00:00
|
|
|
case domain.UserAuthMethodTypeIDP:
|
|
|
|
// no AMR value according to specification
|
2023-08-02 16:57:53 +00:00
|
|
|
factors++
|
2023-07-12 12:24:01 +00:00
|
|
|
case domain.UserAuthMethodTypeUnspecified:
|
|
|
|
// ignore
|
|
|
|
}
|
|
|
|
}
|
2023-08-02 16:57:53 +00:00
|
|
|
if otp > 0 {
|
|
|
|
amr = append(amr, OTP)
|
|
|
|
}
|
|
|
|
if factors >= 2 {
|
2023-07-12 12:24:01 +00:00
|
|
|
amr = append(amr, MFA)
|
|
|
|
}
|
|
|
|
return amr
|
|
|
|
}
|
2024-03-20 10:18:46 +00:00
|
|
|
|
|
|
|
func AMRToAuthMethodTypes(amr []string) []domain.UserAuthMethodType {
|
|
|
|
authMethods := make([]domain.UserAuthMethodType, 0, len(amr))
|
|
|
|
var (
|
|
|
|
userPresence bool
|
|
|
|
mfa bool
|
|
|
|
)
|
|
|
|
|
|
|
|
for _, entry := range amr {
|
|
|
|
switch entry {
|
|
|
|
case Password, PWD:
|
|
|
|
authMethods = append(authMethods, domain.UserAuthMethodTypePassword)
|
|
|
|
case OTP:
|
|
|
|
authMethods = append(authMethods, domain.UserAuthMethodTypeOTP)
|
|
|
|
case UserPresence:
|
|
|
|
userPresence = true
|
|
|
|
case MFA:
|
|
|
|
mfa = true
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
if userPresence {
|
|
|
|
if mfa {
|
|
|
|
authMethods = append(authMethods, domain.UserAuthMethodTypePasswordless)
|
|
|
|
} else {
|
|
|
|
authMethods = append(authMethods, domain.UserAuthMethodTypeU2F)
|
|
|
|
}
|
|
|
|
}
|
|
|
|
return authMethods
|
|
|
|
}
|