#pragma warning disable CS1591 using System; using System.Collections.Concurrent; using System.Collections.Generic; using System.Globalization; using System.IO; using System.Linq; using System.Text; using System.Text.RegularExpressions; using System.Threading; using System.Threading.Tasks; using MediaBrowser.Common.Cryptography; using MediaBrowser.Common.Events; using MediaBrowser.Common.Net; using MediaBrowser.Controller; using MediaBrowser.Controller.Authentication; using MediaBrowser.Controller.Devices; using MediaBrowser.Controller.Drawing; using MediaBrowser.Controller.Dto; using MediaBrowser.Controller.Entities; using MediaBrowser.Controller.Library; using MediaBrowser.Controller.Persistence; using MediaBrowser.Controller.Plugins; using MediaBrowser.Controller.Providers; using MediaBrowser.Controller.Security; using MediaBrowser.Controller.Session; using MediaBrowser.Model.Configuration; using MediaBrowser.Model.Cryptography; using MediaBrowser.Model.Dto; using MediaBrowser.Model.Entities; using MediaBrowser.Model.Events; using MediaBrowser.Model.IO; using MediaBrowser.Model.Serialization; using MediaBrowser.Model.Users; using Microsoft.Extensions.Logging; namespace Emby.Server.Implementations.Library { /// /// Class UserManager. /// public class UserManager : IUserManager { /// /// The logger. /// private readonly ILogger _logger; private readonly object _policySyncLock = new object(); /// /// Gets the active user repository. /// /// The user repository. private readonly IUserRepository _userRepository; private readonly IXmlSerializer _xmlSerializer; private readonly IJsonSerializer _jsonSerializer; private readonly INetworkManager _networkManager; private readonly Func _imageProcessorFactory; private readonly Func _dtoServiceFactory; private readonly IServerApplicationHost _appHost; private readonly IFileSystem _fileSystem; private readonly ICryptoProvider _cryptoProvider; private ConcurrentDictionary _users; private IAuthenticationProvider[] _authenticationProviders; private DefaultAuthenticationProvider _defaultAuthenticationProvider; private InvalidAuthProvider _invalidAuthProvider; private IPasswordResetProvider[] _passwordResetProviders; private DefaultPasswordResetProvider _defaultPasswordResetProvider; public UserManager( ILogger logger, IUserRepository userRepository, IXmlSerializer xmlSerializer, INetworkManager networkManager, Func imageProcessorFactory, Func dtoServiceFactory, IServerApplicationHost appHost, IJsonSerializer jsonSerializer, IFileSystem fileSystem, ICryptoProvider cryptoProvider) { _logger = logger; _userRepository = userRepository; _xmlSerializer = xmlSerializer; _networkManager = networkManager; _imageProcessorFactory = imageProcessorFactory; _dtoServiceFactory = dtoServiceFactory; _appHost = appHost; _jsonSerializer = jsonSerializer; _fileSystem = fileSystem; _cryptoProvider = cryptoProvider; _users = null; } public event EventHandler> UserPasswordChanged; /// /// Occurs when [user updated]. /// public event EventHandler> UserUpdated; public event EventHandler> UserPolicyUpdated; public event EventHandler> UserConfigurationUpdated; public event EventHandler> UserLockedOut; public event EventHandler> UserCreated; /// /// Occurs when [user deleted]. /// public event EventHandler> UserDeleted; /// public IEnumerable Users => _users.Values; /// public IEnumerable UsersIds => _users.Keys; /// /// Called when [user updated]. /// /// The user. private void OnUserUpdated(User user) { UserUpdated?.Invoke(this, new GenericEventArgs { Argument = user }); } /// /// Called when [user deleted]. /// /// The user. private void OnUserDeleted(User user) { UserDeleted?.Invoke(this, new GenericEventArgs { Argument = user }); } public NameIdPair[] GetAuthenticationProviders() { return _authenticationProviders .Where(i => i.IsEnabled) .OrderBy(i => i is DefaultAuthenticationProvider ? 0 : 1) .ThenBy(i => i.Name) .Select(i => new NameIdPair { Name = i.Name, Id = GetAuthenticationProviderId(i) }) .ToArray(); } public NameIdPair[] GetPasswordResetProviders() { return _passwordResetProviders .Where(i => i.IsEnabled) .OrderBy(i => i is DefaultPasswordResetProvider ? 0 : 1) .ThenBy(i => i.Name) .Select(i => new NameIdPair { Name = i.Name, Id = GetPasswordResetProviderId(i) }) .ToArray(); } public void AddParts(IEnumerable authenticationProviders, IEnumerable passwordResetProviders) { _authenticationProviders = authenticationProviders.ToArray(); _defaultAuthenticationProvider = _authenticationProviders.OfType().First(); _invalidAuthProvider = _authenticationProviders.OfType().First(); _passwordResetProviders = passwordResetProviders.ToArray(); _defaultPasswordResetProvider = passwordResetProviders.OfType().First(); } /// public User GetUserById(Guid id) { if (id == Guid.Empty) { throw new ArgumentException("Guid can't be empty", nameof(id)); } _users.TryGetValue(id, out User user); return user; } /// public User GetUserById(string id) => GetUserById(new Guid(id)); public User GetUserByName(string name) { if (string.IsNullOrWhiteSpace(name)) { throw new ArgumentException("Invalid username", nameof(name)); } return Users.FirstOrDefault(u => string.Equals(u.Name, name, StringComparison.OrdinalIgnoreCase)); } public void Initialize() { LoadUsers(); var users = Users; // If there are no local users with admin rights, make them all admins if (!users.Any(i => i.Policy.IsAdministrator)) { foreach (var user in users) { user.Policy.IsAdministrator = true; UpdateUserPolicy(user, user.Policy, false); } } } public static bool IsValidUsername(string username) { // This is some regex that matches only on unicode "word" characters, as well as -, _ and @ // In theory this will cut out most if not all 'control' characters which should help minimize any weirdness // Usernames can contain letters (a-z + whatever else unicode is cool with), numbers (0-9), at-signs (@), dashes (-), underscores (_), apostrophes ('), and periods (.) return Regex.IsMatch(username, @"^[\w\-'._@]*$"); } private static bool IsValidUsernameCharacter(char i) => IsValidUsername(i.ToString(CultureInfo.InvariantCulture)); public string MakeValidUsername(string username) { if (IsValidUsername(username)) { return username; } // Usernames can contain letters (a-z), numbers (0-9), dashes (-), underscores (_), apostrophes ('), and periods (.) var builder = new StringBuilder(); foreach (var c in username) { if (IsValidUsernameCharacter(c)) { builder.Append(c); } } return builder.ToString(); } public async Task AuthenticateUser(string username, string password, string hashedPassword, string remoteEndPoint, bool isUserSession) { if (string.IsNullOrWhiteSpace(username)) { throw new ArgumentNullException(nameof(username)); } var user = Users.FirstOrDefault(i => string.Equals(username, i.Name, StringComparison.OrdinalIgnoreCase)); var success = false; IAuthenticationProvider authenticationProvider = null; if (user != null) { var authResult = await AuthenticateLocalUser(username, password, hashedPassword, user, remoteEndPoint).ConfigureAwait(false); authenticationProvider = authResult.authenticationProvider; success = authResult.success; } else { // user is null var authResult = await AuthenticateLocalUser(username, password, hashedPassword, null, remoteEndPoint).ConfigureAwait(false); authenticationProvider = authResult.authenticationProvider; string updatedUsername = authResult.username; success = authResult.success; if (success && authenticationProvider != null && !(authenticationProvider is DefaultAuthenticationProvider)) { // We should trust the user that the authprovider says, not what was typed username = updatedUsername; // Search the database for the user again; the authprovider might have created it user = Users .FirstOrDefault(i => string.Equals(username, i.Name, StringComparison.OrdinalIgnoreCase)); if (authenticationProvider is IHasNewUserPolicy hasNewUserPolicy) { var policy = hasNewUserPolicy.GetNewUserPolicy(); UpdateUserPolicy(user, policy, true); } } } if (success && user != null && authenticationProvider != null) { var providerId = GetAuthenticationProviderId(authenticationProvider); if (!string.Equals(providerId, user.Policy.AuthenticationProviderId, StringComparison.OrdinalIgnoreCase)) { user.Policy.AuthenticationProviderId = providerId; UpdateUserPolicy(user, user.Policy, true); } } if (user == null) { throw new AuthenticationException("Invalid username or password entered."); } if (user.Policy.IsDisabled) { throw new AuthenticationException( string.Format( CultureInfo.InvariantCulture, "The {0} account is currently disabled. Please consult with your administrator.", user.Name)); } if (!user.Policy.EnableRemoteAccess && !_networkManager.IsInLocalNetwork(remoteEndPoint)) { throw new AuthenticationException("Forbidden."); } if (!user.IsParentalScheduleAllowed()) { throw new AuthenticationException("User is not allowed access at this time."); } // Update LastActivityDate and LastLoginDate, then save if (success) { if (isUserSession) { user.LastActivityDate = user.LastLoginDate = DateTime.UtcNow; UpdateUser(user); } ResetInvalidLoginAttemptCount(user); } else { IncrementInvalidLoginAttemptCount(user); } _logger.LogInformation("Authentication request for {0} {1}.", user.Name, success ? "has succeeded" : "has been denied"); return success ? user : null; } #nullable enable private static string GetAuthenticationProviderId(IAuthenticationProvider provider) { return provider.GetType().FullName; } private static string GetPasswordResetProviderId(IPasswordResetProvider provider) { return provider.GetType().FullName; } private IAuthenticationProvider GetAuthenticationProvider(User user) { return GetAuthenticationProviders(user)[0]; } private IPasswordResetProvider GetPasswordResetProvider(User user) { return GetPasswordResetProviders(user)[0]; } private IAuthenticationProvider[] GetAuthenticationProviders(User? user) { var authenticationProviderId = user?.Policy.AuthenticationProviderId; var providers = _authenticationProviders.Where(i => i.IsEnabled).ToArray(); if (!string.IsNullOrEmpty(authenticationProviderId)) { providers = providers.Where(i => string.Equals(authenticationProviderId, GetAuthenticationProviderId(i), StringComparison.OrdinalIgnoreCase)).ToArray(); } if (providers.Length == 0) { // Assign the user to the InvalidAuthProvider since no configured auth provider was valid/found _logger.LogWarning("User {UserName} was found with invalid/missing Authentication Provider {AuthenticationProviderId}. Assigning user to InvalidAuthProvider until this is corrected", user.Name, user.Policy.AuthenticationProviderId); providers = new IAuthenticationProvider[] { _invalidAuthProvider }; } return providers; } private IPasswordResetProvider[] GetPasswordResetProviders(User? user) { var passwordResetProviderId = user?.Policy.PasswordResetProviderId; var providers = _passwordResetProviders.Where(i => i.IsEnabled).ToArray(); if (!string.IsNullOrEmpty(passwordResetProviderId)) { providers = providers.Where(i => string.Equals(passwordResetProviderId, GetPasswordResetProviderId(i), StringComparison.OrdinalIgnoreCase)).ToArray(); } if (providers.Length == 0) { providers = new IPasswordResetProvider[] { _defaultPasswordResetProvider }; } return providers; } private async Task<(string username, bool success)> AuthenticateWithProvider( IAuthenticationProvider provider, string username, string password, User? resolvedUser) { try { var authenticationResult = provider is IRequiresResolvedUser requiresResolvedUser ? await requiresResolvedUser.Authenticate(username, password, resolvedUser).ConfigureAwait(false) : await provider.Authenticate(username, password).ConfigureAwait(false); if (authenticationResult.Username != username) { _logger.LogDebug("Authentication provider provided updated username {1}", authenticationResult.Username); username = authenticationResult.Username; } return (username, true); } catch (AuthenticationException ex) { _logger.LogError(ex, "Error authenticating with provider {Provider}", provider.Name); return (username, false); } } private async Task<(IAuthenticationProvider? authenticationProvider, string username, bool success)> AuthenticateLocalUser( string username, string password, string hashedPassword, User? user, string remoteEndPoint) { bool success = false; IAuthenticationProvider? authenticationProvider = null; foreach (var provider in GetAuthenticationProviders(user)) { var providerAuthResult = await AuthenticateWithProvider(provider, username, password, user).ConfigureAwait(false); var updatedUsername = providerAuthResult.username; success = providerAuthResult.success; if (success) { authenticationProvider = provider; username = updatedUsername; break; } } if (!success && _networkManager.IsInLocalNetwork(remoteEndPoint) && user.Configuration.EnableLocalPassword && !string.IsNullOrEmpty(user.EasyPassword)) { // Check easy password var passwordHash = PasswordHash.Parse(user.EasyPassword); var hash = _cryptoProvider.ComputeHash( passwordHash.Id, Encoding.UTF8.GetBytes(password), passwordHash.Salt); success = passwordHash.Hash.SequenceEqual(hash); } return (authenticationProvider, username, success); } private void ResetInvalidLoginAttemptCount(User user) { user.Policy.InvalidLoginAttemptCount = 0; UpdateUserPolicy(user, user.Policy, false); } private void IncrementInvalidLoginAttemptCount(User user) { int invalidLogins = ++user.Policy.InvalidLoginAttemptCount; int maxInvalidLogins = user.Policy.LoginAttemptsBeforeLockout; if (maxInvalidLogins > 0 && invalidLogins >= maxInvalidLogins) { user.Policy.IsDisabled = true; UserLockedOut?.Invoke(this, new GenericEventArgs(user)); _logger.LogWarning( "Disabling user {UserName} due to {Attempts} unsuccessful login attempts.", user.Name, invalidLogins); } UpdateUserPolicy(user, user.Policy, false); } /// /// Loads the users from the repository. /// private void LoadUsers() { var users = _userRepository.RetrieveAllUsers(); // There always has to be at least one user. if (users.Count != 0) { _users = new ConcurrentDictionary( users.Select(x => new KeyValuePair(x.Id, x))); return; } var defaultName = Environment.UserName; if (string.IsNullOrWhiteSpace(defaultName)) { defaultName = "MyJellyfinUser"; } _logger.LogWarning("No users, creating one with username {UserName}", defaultName); var name = MakeValidUsername(defaultName); var user = InstantiateNewUser(name); user.DateLastSaved = DateTime.UtcNow; _userRepository.CreateUser(user); user.Policy.IsAdministrator = true; user.Policy.EnableContentDeletion = true; user.Policy.EnableRemoteControlOfOtherUsers = true; UpdateUserPolicy(user, user.Policy, false); _users = new ConcurrentDictionary(); _users[user.Id] = user; } #nullable restore public UserDto GetUserDto(User user, string remoteEndPoint = null) { if (user == null) { throw new ArgumentNullException(nameof(user)); } bool hasConfiguredPassword = GetAuthenticationProvider(user).HasPassword(user); bool hasConfiguredEasyPassword = !string.IsNullOrEmpty(GetAuthenticationProvider(user).GetEasyPasswordHash(user)); bool hasPassword = user.Configuration.EnableLocalPassword && !string.IsNullOrEmpty(remoteEndPoint) && _networkManager.IsInLocalNetwork(remoteEndPoint) ? hasConfiguredEasyPassword : hasConfiguredPassword; UserDto dto = new UserDto { Id = user.Id, Name = user.Name, HasPassword = hasPassword, HasConfiguredPassword = hasConfiguredPassword, HasConfiguredEasyPassword = hasConfiguredEasyPassword, LastActivityDate = user.LastActivityDate, LastLoginDate = user.LastLoginDate, Configuration = user.Configuration, ServerId = _appHost.SystemId, Policy = user.Policy }; if (!hasPassword && _users.Count == 1) { dto.EnableAutoLogin = true; } ItemImageInfo image = user.GetImageInfo(ImageType.Primary, 0); if (image != null) { dto.PrimaryImageTag = GetImageCacheTag(user, image); try { _dtoServiceFactory().AttachPrimaryImageAspectRatio(dto, user); } catch (Exception ex) { // Have to use a catch-all unfortunately because some .net image methods throw plain Exceptions _logger.LogError(ex, "Error generating PrimaryImageAspectRatio for {User}", user.Name); } } return dto; } public UserDto GetOfflineUserDto(User user) { var dto = GetUserDto(user); dto.ServerName = _appHost.FriendlyName; return dto; } private string GetImageCacheTag(BaseItem item, ItemImageInfo image) { try { return _imageProcessorFactory().GetImageCacheTag(item, image); } catch (Exception ex) { _logger.LogError(ex, "Error getting {ImageType} image info for {ImagePath}", image.Type, image.Path); return null; } } /// /// Refreshes metadata for each user /// /// The cancellation token. /// Task. public async Task RefreshUsersMetadata(CancellationToken cancellationToken) { foreach (var user in Users) { await user.RefreshMetadata(new MetadataRefreshOptions(new DirectoryService(_fileSystem)), cancellationToken).ConfigureAwait(false); } } /// /// Renames the user. /// /// The user. /// The new name. /// Task. /// user /// public async Task RenameUser(User user, string newName) { if (user == null) { throw new ArgumentNullException(nameof(user)); } if (string.IsNullOrWhiteSpace(newName)) { throw new ArgumentException("Invalid username", nameof(newName)); } if (user.Name.Equals(newName, StringComparison.OrdinalIgnoreCase)) { throw new ArgumentException("The new and old names must be different."); } if (Users.Any( u => u.Id != user.Id && u.Name.Equals(newName, StringComparison.OrdinalIgnoreCase))) { throw new ArgumentException(string.Format( CultureInfo.InvariantCulture, "A user with the name '{0}' already exists.", newName)); } await user.Rename(newName).ConfigureAwait(false); OnUserUpdated(user); } /// /// Updates the user. /// /// The user. /// user /// public void UpdateUser(User user) { if (user == null) { throw new ArgumentNullException(nameof(user)); } if (user.Id == Guid.Empty) { throw new ArgumentException("Id can't be empty.", nameof(user)); } if (!_users.ContainsKey(user.Id)) { throw new ArgumentException( string.Format( CultureInfo.InvariantCulture, "A user '{0}' with Id {1} does not exist.", user.Name, user.Id), nameof(user)); } user.DateModified = DateTime.UtcNow; user.DateLastSaved = DateTime.UtcNow; _userRepository.UpdateUser(user); OnUserUpdated(user); } /// /// Creates the user. /// /// The name. /// User. /// name /// public User CreateUser(string name) { if (string.IsNullOrWhiteSpace(name)) { throw new ArgumentNullException(nameof(name)); } if (!IsValidUsername(name)) { throw new ArgumentException("Usernames can contain unicode symbols, numbers (0-9), dashes (-), underscores (_), apostrophes ('), and periods (.)"); } if (Users.Any(u => u.Name.Equals(name, StringComparison.OrdinalIgnoreCase))) { throw new ArgumentException(string.Format("A user with the name '{0}' already exists.", name)); } var user = InstantiateNewUser(name); _users[user.Id] = user; user.DateLastSaved = DateTime.UtcNow; _userRepository.CreateUser(user); EventHelper.QueueEventIfNotNull(UserCreated, this, new GenericEventArgs { Argument = user }, _logger); return user; } /// /// Deletes the user. /// /// The user. /// Task. /// user /// public void DeleteUser(User user) { if (user == null) { throw new ArgumentNullException(nameof(user)); } if (!_users.ContainsKey(user.Id)) { throw new ArgumentException(string.Format( CultureInfo.InvariantCulture, "The user cannot be deleted because there is no user with the Name {0} and Id {1}.", user.Name, user.Id)); } if (_users.Count == 1) { throw new ArgumentException(string.Format( CultureInfo.InvariantCulture, "The user '{0}' cannot be deleted because there must be at least one user in the system.", user.Name)); } if (user.Policy.IsAdministrator && Users.Count(i => i.Policy.IsAdministrator) == 1) { throw new ArgumentException( string.Format( CultureInfo.InvariantCulture, "The user '{0}' cannot be deleted because there must be at least one admin user in the system.", user.Name), nameof(user)); } var configPath = GetConfigurationFilePath(user); _userRepository.DeleteUser(user); try { _fileSystem.DeleteFile(configPath); } catch (IOException ex) { _logger.LogError(ex, "Error deleting file {path}", configPath); } DeleteUserPolicy(user); _users.TryRemove(user.Id, out _); OnUserDeleted(user); } /// /// Resets the password by clearing it. /// /// Task. public Task ResetPassword(User user) { return ChangePassword(user, string.Empty); } public void ResetEasyPassword(User user) { ChangeEasyPassword(user, string.Empty, null); } public async Task ChangePassword(User user, string newPassword) { if (user == null) { throw new ArgumentNullException(nameof(user)); } await GetAuthenticationProvider(user).ChangePassword(user, newPassword).ConfigureAwait(false); UpdateUser(user); UserPasswordChanged?.Invoke(this, new GenericEventArgs(user)); } public void ChangeEasyPassword(User user, string newPassword, string newPasswordHash) { if (user == null) { throw new ArgumentNullException(nameof(user)); } GetAuthenticationProvider(user).ChangeEasyPassword(user, newPassword, newPasswordHash); UpdateUser(user); UserPasswordChanged?.Invoke(this, new GenericEventArgs(user)); } /// /// Instantiates the new user. /// /// The name. /// User. private static User InstantiateNewUser(string name) { return new User { Name = name, Id = Guid.NewGuid(), DateCreated = DateTime.UtcNow, DateModified = DateTime.UtcNow }; } public async Task StartForgotPasswordProcess(string enteredUsername, bool isInNetwork) { var user = string.IsNullOrWhiteSpace(enteredUsername) ? null : GetUserByName(enteredUsername); var action = ForgotPasswordAction.InNetworkRequired; if (user != null && isInNetwork) { var passwordResetProvider = GetPasswordResetProvider(user); return await passwordResetProvider.StartForgotPasswordProcess(user, isInNetwork).ConfigureAwait(false); } else { return new ForgotPasswordResult { Action = action, PinFile = string.Empty }; } } public async Task RedeemPasswordResetPin(string pin) { foreach (var provider in _passwordResetProviders) { var result = await provider.RedeemPasswordResetPin(pin).ConfigureAwait(false); if (result.Success) { return result; } } return new PinRedeemResult { Success = false, UsersReset = Array.Empty() }; } public UserPolicy GetUserPolicy(User user) { var path = GetPolicyFilePath(user); if (!File.Exists(path)) { return GetDefaultPolicy(user); } try { lock (_policySyncLock) { return (UserPolicy)_xmlSerializer.DeserializeFromFile(typeof(UserPolicy), path); } } catch (IOException) { return GetDefaultPolicy(user); } catch (Exception ex) { _logger.LogError(ex, "Error reading policy file: {path}", path); return GetDefaultPolicy(user); } } private static UserPolicy GetDefaultPolicy(User user) { return new UserPolicy { EnableContentDownloading = true, EnableSyncTranscoding = true }; } public void UpdateUserPolicy(Guid userId, UserPolicy userPolicy) { var user = GetUserById(userId); UpdateUserPolicy(user, userPolicy, true); } private void UpdateUserPolicy(User user, UserPolicy userPolicy, bool fireEvent) { // The xml serializer will output differently if the type is not exact if (userPolicy.GetType() != typeof(UserPolicy)) { var json = _jsonSerializer.SerializeToString(userPolicy); userPolicy = _jsonSerializer.DeserializeFromString(json); } var path = GetPolicyFilePath(user); Directory.CreateDirectory(Path.GetDirectoryName(path)); lock (_policySyncLock) { _xmlSerializer.SerializeToFile(userPolicy, path); user.Policy = userPolicy; } if (fireEvent) { UserPolicyUpdated?.Invoke(this, new GenericEventArgs { Argument = user }); } } private void DeleteUserPolicy(User user) { var path = GetPolicyFilePath(user); try { lock (_policySyncLock) { _fileSystem.DeleteFile(path); } } catch (IOException) { } catch (Exception ex) { _logger.LogError(ex, "Error deleting policy file"); } } private static string GetPolicyFilePath(User user) { return Path.Combine(user.ConfigurationDirectoryPath, "policy.xml"); } private static string GetConfigurationFilePath(User user) { return Path.Combine(user.ConfigurationDirectoryPath, "config.xml"); } public UserConfiguration GetUserConfiguration(User user) { var path = GetConfigurationFilePath(user); if (!File.Exists(path)) { return new UserConfiguration(); } try { lock (_configSyncLock) { return (UserConfiguration)_xmlSerializer.DeserializeFromFile(typeof(UserConfiguration), path); } } catch (IOException) { return new UserConfiguration(); } catch (Exception ex) { _logger.LogError(ex, "Error reading policy file: {path}", path); return new UserConfiguration(); } } private readonly object _configSyncLock = new object(); public void UpdateConfiguration(Guid userId, UserConfiguration config) { var user = GetUserById(userId); UpdateConfiguration(user, config); } public void UpdateConfiguration(User user, UserConfiguration config) { UpdateConfiguration(user, config, true); } private void UpdateConfiguration(User user, UserConfiguration config, bool fireEvent) { var path = GetConfigurationFilePath(user); // The xml serializer will output differently if the type is not exact if (config.GetType() != typeof(UserConfiguration)) { var json = _jsonSerializer.SerializeToString(config); config = _jsonSerializer.DeserializeFromString(json); } Directory.CreateDirectory(Path.GetDirectoryName(path)); lock (_configSyncLock) { _xmlSerializer.SerializeToFile(config, path); user.Configuration = config; } if (fireEvent) { UserConfigurationUpdated?.Invoke(this, new GenericEventArgs { Argument = user }); } } } public class DeviceAccessEntryPoint : IServerEntryPoint { private IUserManager _userManager; private IAuthenticationRepository _authRepo; private IDeviceManager _deviceManager; private ISessionManager _sessionManager; public DeviceAccessEntryPoint(IUserManager userManager, IAuthenticationRepository authRepo, IDeviceManager deviceManager, ISessionManager sessionManager) { _userManager = userManager; _authRepo = authRepo; _deviceManager = deviceManager; _sessionManager = sessionManager; } public Task RunAsync() { _userManager.UserPolicyUpdated += _userManager_UserPolicyUpdated; return Task.CompletedTask; } private void _userManager_UserPolicyUpdated(object sender, GenericEventArgs e) { var user = e.Argument; if (!user.Policy.EnableAllDevices) { UpdateDeviceAccess(user); } } private void UpdateDeviceAccess(User user) { var existing = _authRepo.Get(new AuthenticationInfoQuery { UserId = user.Id }).Items; foreach (var authInfo in existing) { if (!string.IsNullOrEmpty(authInfo.DeviceId) && !_deviceManager.CanAccessDevice(user, authInfo.DeviceId)) { _sessionManager.Logout(authInfo); } } } public void Dispose() { } } }