Offboard Users via Directory Connector from both Organization and Personal Vault
Feature function
What will this feature do differently?
Currently, automatic sync via Bitwarden Directory Connector will offboard users from Organization, but not from Personal Vault. We would like Personal Vault not to be accessible when user is de-provisioned from the source directory. Currently, user has to be deleted from the System Administrator Portal.
What benefits will this feature bring?
Easier user termination process - fully automated.
Hi @MilicaMij, itâs on our 2022 Roadmap, but we donât have a specific ETA at this time, subscribe to the release notes to be notified of changes automatically.
Hi, is there any update on this? We are an Enterprise customer with 285 seats and really would love to this implemented. Mostly all other self hosted software we use that is integrated with our Active Directory automatically blocks or deletes users as soon as they are blocked in our AD. We have several people coming and leaving our organization every month. Removing them manually each time from Bitwarden is really annoying and error prone, especially in fast offboardings.
Just to give a quick update on this. This will be part of âAccount Management and De-Provisioningâ which is on our Roadmap
Depending on your environment and requirements, you might be able to use SCIM instead. SCIM is a standardized way of integrating with IdPs and supports the On/Off-boarding process.
We use SCIM already and it doesnât block access to the personal vault when an account in AD is deleted, just the company vault.
Iâve looked at the roadmap for 2023 and donât see any callouts that would resolve this.
Resetting a userâs master password logs the user out of all active Bitwarden sessions and resets their login credentials to the ones specified by the administrator, meaning that administrator (and only that administrator) will have the keys to the userâs vault data, including items in the individual vault. This vault takeover tactic is commonly used by organizations to ensure that employees donât retain access to individual vault items that may be work-related and can be used to facilitate audits of every credential an employee may have been using.
@bw-admin
Thank you for the information. We have reviewed the master password reset option in the past but it does not allow the âzero admin accessâ we require since an admin can reset the users password.
Compare this with LastPass where you can trigger a delete without knowing the password or signing in as the user. You can also suspend a users access totally or just revoke from company access.
Today we can only revoke company access, but cannot delete without access to the mailbox nor can we suspend access to personal vault (disable account, for example if employee is on FMLA and we lock out their accounts for the months they are away from work). We work around the suspend issue by requiring SSO and stopping it on the SSO side, but that doesnât work for admin accounts.
I believe they meant more so âcannot delete without having to access the mailboxâ
See the comments from their related feature request.
So it seems they are already taking advantage of and using advanced off-boarding procedures in place currently with Admin Password Reset, and passwordless email-only account deletion.
As mentioned, I am personally very eager to see what additional features this will bring and how this can add to better management and deprovisioning of corporate user accounts.
One thing though as an aside, I wonder how much of this becomes moot seeing as a user can currently alter their login email. There are no enterprise policies to restrict users to a specific domain or prevent email changes.
Perhaps with the introduction of the domain verification this could be used to require a user of the Org has an associated email with that domain, or possibly just an enterprise policy to restrict users from changing their login email.
Oh wow, I somehow had no idea this was possible and this opens up so many other issues.
Really the only way I can see to get around this is disabling personal vaults and forcing each user to have their own collection, but thatâs a major issue at scale. Plus it doesnât allow for âzero admin knowledgeâ of passwords.
I too will be waiting eagerly for this to complete.
Hey @martin.tig the team is also working on âflexible collectionsâ which will allow for self-serve collection creation, even at the user level (donât have to be a manager), as well as functionality to enable zero admin knowledge.
@bw-admin this is great news, because if I am understanding this correct, when implemented, we can disable personal vault and when a person is revoked from the org their passwords are gone too, regardless of it they changed the login email or not. And they can make the collection themselves and manage it without an Admin having access.