Account recovery administration not enforcing Single orginization policy to be enabled. #409

Closed
opened 2025-10-09 16:29:00 +03:00 by OVERLORD · 3 comments
Owner

Originally created by @ghost on GitHub.

Originally assigned to: @BlackDex on GitHub.

Subject of the issue

Account recovery administration is not enforcing "Single orginization" policy to be enabled. You are able to enable the "Account recovery administration" organization policy without the "Single organization" policy being enabled.

Deployment environment

  • vaultwarden version: 1.32.0
  • Install method: Docker through tag: vaultwarden/server:1.32.0

  • Clients used:

  • Reverse proxy and version: nginx

  • MySQL/MariaDB or PostgreSQL version:

  • Other relevant details:

Steps to reproduce

Enable the Account recovery administration without the Single Organizaton policy being enabled.

Expected behaviour

Not being able to enable it.

Actual behaviour

You can enable it

Troubleshooting data

image

Originally created by @ghost on GitHub. Originally assigned to: @BlackDex on GitHub. <!-- # ### NOTE: Please update to the latest version of vaultwarden before reporting an issue! This saves you and us a lot of time and troubleshooting. See: * https://github.com/dani-garcia/vaultwarden/issues/1180 * https://github.com/dani-garcia/vaultwarden/wiki/Updating-the-vaultwarden-image # ### --> <!-- Please fill out the following template to make solving your problem easier and faster for us. This is only a guideline. If you think that parts are unnecessary for your issue, feel free to remove them. Remember to hide/redact personal or confidential information, such as passwords, IP addresses, and DNS names as appropriate. --> ### Subject of the issue <!-- Describe your issue here. --> Account recovery administration is not enforcing "Single orginization" policy to be enabled. You are able to enable the "Account recovery administration" organization policy without the "Single organization" policy being enabled. ### Deployment environment <!-- ========================================================================================= Preferably, use the `Generate Support String` button on the admin page's Diagnostics tab. That will auto-generate most of the info requested in this section. ========================================================================================= --> <!-- The version number, obtained from the logs (at startup) or the admin diagnostics page --> <!-- This is NOT the version number shown on the web vault, which is versioned separately from vaultwarden --> <!-- Remember to check if your issue exists on the latest version first! --> * vaultwarden version: 1.32.0 <!-- How the server was installed: Docker image, OS package, built from source, etc. --> * Install method: Docker through tag: vaultwarden/server:1.32.0 * Clients used: <!-- web vault, desktop, Android, iOS, etc. (if applicable) --> * Reverse proxy and version: <!-- if applicable --> nginx * MySQL/MariaDB or PostgreSQL version: <!-- if applicable --> * Other relevant details: ### Steps to reproduce <!-- Tell us how to reproduce this issue. What parameters did you set (differently from the defaults) and how did you start vaultwarden? --> Enable the Account recovery administration without the Single Organizaton policy being enabled. ### Expected behaviour <!-- Tell us what you expected to happen --> Not being able to enable it. ### Actual behaviour <!-- Tell us what actually happened --> You can enable it ### Troubleshooting data <!-- Share any log files, screenshots, or other relevant troubleshooting data --> ![image](https://github.com/user-attachments/assets/bad9fd3c-d704-45b9-8b0f-7f7f4468913d)
OVERLORD added the low priorityenhancement labels 2025-10-09 16:29:00 +03:00
Author
Owner

@BlackDex commented on GitHub:

The only way i can see to fix this issue is to add another config option which will enforce this option if wanted/needed.
Which we could make a default in a later release for example.

@BlackDex commented on GitHub: The only way i can see to fix this issue is to add another config option which will enforce this option if wanted/needed. Which we could make a default in a later release for example.
Author
Owner

@louisfgr commented on GitHub:

I mentioned this some time ago in #4113. I'm afraid that this requirement could cause some problems for users who need access to multiple organizations if those organizations don't want to give up the account recovery option.

Even though I think this requirement makes sense for Bitwarden's use case, I find it impractical for Vaultwarden.
Especially since it was recommended to use organisations before group support was introduced (#1623).

Regardless of this, the warning in the policy settings should of course be in line with reality, whether this means adjusting the functionality or the warning.

@louisfgr commented on GitHub: I mentioned this some time ago in #4113. I'm afraid that this requirement could cause some problems for users who need access to multiple organizations if those organizations don't want to give up the account recovery option. Even though I think this requirement makes sense for Bitwarden's use case, I find it impractical for Vaultwarden. Especially since it was recommended to use organisations before group support was introduced (#1623). Regardless of this, the warning in the policy settings should of course be in line with reality, whether this means adjusting the functionality or the warning.
Author
Owner

@ghost commented on GitHub:

Not sure how I missed your earlier post about this. I apologize for this.

One concern about this setting not being enforced is if you reset User A's password, you can gain access to other organizations which that User A is also a part of. I suspect that this might be the reason for the inital setting of enforcing one organization per user with this policy.
My (possible wrongfull) impression is that organiazitons are suppose to be kind of indepentent from each other. This not being enforced kinda negates that.

@ghost commented on GitHub: Not sure how I missed your earlier post about this. I apologize for this. One concern about this setting not being enforced is if you reset User A's password, you can gain access to other organizations which that User A is also a part of. I suspect that this might be the reason for the inital setting of enforcing one organization per user with this policy. My (possible wrongfull) impression is that organiazitons are suppose to be kind of indepentent from each other. This not being enforced kinda negates that.
Sign in to join this conversation.
1 Participants
Notifications
Due Date
No due date set.
Dependencies

No dependencies set.

Reference: starred/vaultwarden#409