diff --git a/ProcessMaker/Http/Controllers/Admin/UserController.php b/ProcessMaker/Http/Controllers/Admin/UserController.php index 3cf2374b9c..e0fdd8623e 100644 --- a/ProcessMaker/Http/Controllers/Admin/UserController.php +++ b/ProcessMaker/Http/Controllers/Admin/UserController.php @@ -69,9 +69,15 @@ function ($result, $item) { ); $ssoUser = false; if (class_exists(SsoUser::class)) { + // Check if the user is an SSO user (including SAML) $ssoUser = SsoUser::where('user_id', $user->id)->exists(); } + // Check if the user is an LDAP user + if (isset($user->meta?->authenticationType) && $user->meta->authenticationType === 'ldap') { + $ssoUser = true; + } + // Get global and valid 2FA preferences for the user $enabled2FA = config('password-policies.2fa_enabled', false); $global2FAEnabled = config('password-policies.2fa_method', []); diff --git a/ProcessMaker/Http/Controllers/ProfileController.php b/ProcessMaker/Http/Controllers/ProfileController.php index 5e757baa39..0fdfae2e84 100644 --- a/ProcessMaker/Http/Controllers/ProfileController.php +++ b/ProcessMaker/Http/Controllers/ProfileController.php @@ -46,9 +46,15 @@ function ($result, $item) { $ssoUser = false; if (class_exists(SsoUser::class)) { + // Check if the user is an SSO user (including SAML) $ssoUser = SsoUser::where('user_id', $currentUser->id)->exists(); } + // Check if the user is an LDAP user + if (isset($currentUser->meta?->authenticationType) && $currentUser->meta->authenticationType === 'ldap') { + $ssoUser = true; + } + // Get global and valid 2FA preferences for the user $enabled2FA = config('password-policies.2fa_enabled', false); $global2FAEnabled = config('password-policies.2fa_method', []);