Hi Yumani;

Please find a set of suggested QA test cases with the attachment, which may be helpful to develop more around.

Also, please find the OpenID use cases with the attachment - which you may find useful as well.

Please let me know if you need further clarifications.

Thanks & regards.

- Prabath

QA Test Cases
--------------

OpenID Issue
-------------

1. Signup for a new user [User A] by manually entering required/optional 
attributes
   An OpenID should be generated and displayed for the user in the following 
format
   [OpenID Provider Server Url]\user\[user name]

2. Signup for a new user [User B] with a self-issued information card
   An OpenID should be generated and displayed for the user in the following 
format
   [OpenID Provider Server Url]\user\[user name]

OpenID Login
-------------
   
3. Login to the IdP with User A's OpenID
   Prompted to enter password or a registered self-issued information card
   Enter password
   Select 'Default Profile'
   Should login successfully.
   Verify 'OpenID relying party site settings' reflects correct information

4. Login to the IdP with User B's OpenID
   Prompted to enter password or a registered self-issued information card
   Present the self-issued inormation card used in signup
   Select 'Default Profile' & select Only Once'
   Should login successfully.
   Verify 'OpenID relying party site settings' reflects correct information

5. Login to the IdP with User A's OpenID
   Prompted to enter password or a registered self-issued information card
   Enter password and select 'Remember me on this computer'
   Select 'Default Profile' & select 'Always'
   Should login successfully.
   Verify 'OpenID relying party site settings' reflects correct information
   Close the browser & open a new one
   Login to the IdP with User A's OpenID
   No password prompted or user approval required.
   Should login successfully.

6. Login to the IdP with User B's OpenID [you have already logged in with this 
OpenID in "4"]
   Card Selector prompts up [No password page is displayed as in "4"]
   Present the self-issued information card used in signup
   Select 'Default Profile' & select 'Always'
   Should login successfully.
   Verify 'OpenID relying party site settings' reflects correct information
   Close the browser & open a new one
   Login to the IdP with User B's OpenID 
   Card Selector prompts up [No password page is displayed as in "4"]
   Present the self-issued information card used in signup
   No user approval required.
   Should login successfully.

7. Login to IdP with User A's username/password
   Register a self-issued information card
   Logout
   Login to the IdP with User A's OpenID
   Prompted to enter password or a registered self-issued information card
   Present the registered self-issued information card
   User approval not required since we already set it to 'Always.
   Should login successfully.

8. Login to IdP with User B's infocard
   Register a self-issued information card
   Logout
   Login to the IdP with User B's OpenID
   Card Selector prompts up
   Present the registered self-issued information card
   User approval not required since we already set it to 'Always.
   Should login successfully.


Download Information Cards
---------------------------

9. Login to IdP with OpenID
   Download OpenIDInfo Card and install it in Card Selector

10.Login to IdP with OpenID
   Download Information Card and install it in Card Selector

OpenID InfoCard Login
----------------------

11.Click on OpenID on the login page
   Instead of typing the OpenID, click on the OpenID InfoCard image
   Present the OpenID InfoCard you downloaded in test case '9'
   Should login successfully.


Multiple Profiles
------------------

12.Login to IdP with User A
   Add multiple profiles
   Under 'OpenID relying party site settings' de-select 'Trust Always'
   Logout
   Login with User A's OpenID
   Enter OpenID Url
   Enter password
   All the profiles are available for user selection
   Select one profile
   Click on 'Once'
   Should login successfully.
   
javarp
-------

13.Login with OpenID Url
   Attributes displayed on successfull login
   Attributes displayed should reflect the selecetd profile

14.Login with OpenID InforCard
   Attributes displayed on successful login
   

   

OpenID integration with WSO2 Identity Solution
-----------------------------------------------

1. Definitions
2. Use cases for User
3. Use cases for Admin
4. DBSchema changes required by OpenID integration
5. Configuration file changes


1. Definitions
---------------

1. A user profile : A set of claims with corresponding values
2. OpenID Provider [OP] : Can be treated equivalent to an IdP in this context

2. Use cases for User
--------------------

1. Get an OpenID url 

      - User signs up with WSO2 IdP
        - An OpenID url will be created automatically to him

2. Download an OpenIDInfo Card 
        - User logs into the WSO2 IdP
      - User downloads an OpenID InfoCard

3. Login with OpenID Url - issued by WSO2 IdP

4. Login with OpenIDInfoCard issued by WSO2 IdP 

5. View the Urls, which accepted the user's OpenID Url 

        - User logs into the WSO2 IdP with valid credentials
      - View the sites which accepted the user's OpenID Url
        [Site Url| Number of times being used|Last login|Trust Always|Deafult 
Profile]

6. Add/Remove sites as 'Always Trusted' by login in directly 

        - User logs into the WSO2 IdP with valid credentials
      - View the sites which accepted the user's OpenID Url
      - User adds/removes sites[urls] as always trusted sites, from the sites 
which already accepted his OpenID url

7. Add/Remove sites as 'Always Trusted' during redirection

        - User being redirected to the WSO2 IdP.
      - User logs into the WSO2 IdP with valid credentials
      - User decides, whether to trust the RP Only Once, Always or Deny sending 
profile info

8. Login into the WSO2 IdP during redirection, using a registered self-issued 
InfoCard

        - User being redirected to the WSO2 IdP.
      - User logs into the WSO2 IdP with a registered self-issued InfoCard


9. Maintain different "user profiles" and set one as default against each RP - 
requests authentication


3. Use cases for Admin
-----------------------

1. Add claims related to OpenID as 'supported claims' 

    [Note 1 - OpenID related claims will have a additional attribute called 
'OpenID Tag"]

2. Add new claims related to OpenID to a given dialect

   [Note 1 - OpenID related claims will have a additional attribute called 
'OpenID Tag"]
   [Note 2 - Admin should not add any claims to the dialect 
http://schema.openid.net/2007/05/claims - Simple Atrribute Registration]
   [Note 3 - Admin can add any claim to the dialect http://openid.net/schema - 
Attribute Exchange]
   [Note 4 - Adding the OpenID Tag to any claim wil make it available as an 
OpenID claim]

3. View issued InfoCards against Token Type

4. Revoke issued OpenIDInfoCards

5. Enable/Disable OpenID/OpenIDInfoCard support


4. DBSchema changes required by OpenID integration
---------------------------------------------------

4.1. Table Name : CLAIMS
-------------------------

Columns to be added : 

1. OPENID_TAG [IS_NULL = YES, VARCHAR]

   Purpose: This column will contain all the OpenID related tags against the 
Claim Uri.
            And also will allow to map, even an Inforcard claim to an OpenID 
attribute.


   Example: Give Name
            uri : 
http://schemas.xmlsoap.org/ws/2005/05/identity/claims/givenname
            OPENID_TAG : givenname

              Date of Birth
            uri: http://schema.openid.net/2007/05/claims/dob
            OPENID_TAG: dob

4.2. Table Name : OPENID_USER_RP [NEW}
---------------------------------

Columns:

1. RP_URL
2. USER_ID
3. C_LAST_UPDATED
4. IS_TRUSTED_ALWAYS
5. VISIT_COUNT
6. LAST_VISIT
7. DEFAULT_PROFILE


5. Configuration file changes
------------------------------
1. modules\identity-provider\conf\initial-claims.xml 

   - Added new dialects for OpenID
   - Introduced a new element <OpenIDTag>

2. modules\identity-provider\conf\wsas-server.xml

   - Added <OpenIDServerUrl>

3. modules\identity-provider\conf\wso2identity.hbm.xml

   - DBSchema changes Ref [4.1]

  
_______________________________________________
Identity-dev mailing list
[email protected]
http://wso2.org/cgi-bin/mailman/listinfo/identity-dev

Reply via email to