Hi Yumani;
Please find a set of suggested QA test cases with the attachment, which
may be helpful to develop more around.
Also, please find the OpenID use cases with the attachment - which you
may find useful as well.
Please let me know if you need further clarifications.
Thanks & regards.
- Prabath
QA Test Cases
--------------
OpenID Issue
-------------
1. Signup for a new user [User A] by manually entering required/optional
attributes
An OpenID should be generated and displayed for the user in the following
format
[OpenID Provider Server Url]\user\[user name]
2. Signup for a new user [User B] with a self-issued information card
An OpenID should be generated and displayed for the user in the following
format
[OpenID Provider Server Url]\user\[user name]
OpenID Login
-------------
3. Login to the IdP with User A's OpenID
Prompted to enter password or a registered self-issued information card
Enter password
Select 'Default Profile'
Should login successfully.
Verify 'OpenID relying party site settings' reflects correct information
4. Login to the IdP with User B's OpenID
Prompted to enter password or a registered self-issued information card
Present the self-issued inormation card used in signup
Select 'Default Profile' & select Only Once'
Should login successfully.
Verify 'OpenID relying party site settings' reflects correct information
5. Login to the IdP with User A's OpenID
Prompted to enter password or a registered self-issued information card
Enter password and select 'Remember me on this computer'
Select 'Default Profile' & select 'Always'
Should login successfully.
Verify 'OpenID relying party site settings' reflects correct information
Close the browser & open a new one
Login to the IdP with User A's OpenID
No password prompted or user approval required.
Should login successfully.
6. Login to the IdP with User B's OpenID [you have already logged in with this
OpenID in "4"]
Card Selector prompts up [No password page is displayed as in "4"]
Present the self-issued information card used in signup
Select 'Default Profile' & select 'Always'
Should login successfully.
Verify 'OpenID relying party site settings' reflects correct information
Close the browser & open a new one
Login to the IdP with User B's OpenID
Card Selector prompts up [No password page is displayed as in "4"]
Present the self-issued information card used in signup
No user approval required.
Should login successfully.
7. Login to IdP with User A's username/password
Register a self-issued information card
Logout
Login to the IdP with User A's OpenID
Prompted to enter password or a registered self-issued information card
Present the registered self-issued information card
User approval not required since we already set it to 'Always.
Should login successfully.
8. Login to IdP with User B's infocard
Register a self-issued information card
Logout
Login to the IdP with User B's OpenID
Card Selector prompts up
Present the registered self-issued information card
User approval not required since we already set it to 'Always.
Should login successfully.
Download Information Cards
---------------------------
9. Login to IdP with OpenID
Download OpenIDInfo Card and install it in Card Selector
10.Login to IdP with OpenID
Download Information Card and install it in Card Selector
OpenID InfoCard Login
----------------------
11.Click on OpenID on the login page
Instead of typing the OpenID, click on the OpenID InfoCard image
Present the OpenID InfoCard you downloaded in test case '9'
Should login successfully.
Multiple Profiles
------------------
12.Login to IdP with User A
Add multiple profiles
Under 'OpenID relying party site settings' de-select 'Trust Always'
Logout
Login with User A's OpenID
Enter OpenID Url
Enter password
All the profiles are available for user selection
Select one profile
Click on 'Once'
Should login successfully.
javarp
-------
13.Login with OpenID Url
Attributes displayed on successfull login
Attributes displayed should reflect the selecetd profile
14.Login with OpenID InforCard
Attributes displayed on successful login
OpenID integration with WSO2 Identity Solution
-----------------------------------------------
1. Definitions
2. Use cases for User
3. Use cases for Admin
4. DBSchema changes required by OpenID integration
5. Configuration file changes
1. Definitions
---------------
1. A user profile : A set of claims with corresponding values
2. OpenID Provider [OP] : Can be treated equivalent to an IdP in this context
2. Use cases for User
--------------------
1. Get an OpenID url
- User signs up with WSO2 IdP
- An OpenID url will be created automatically to him
2. Download an OpenIDInfo Card
- User logs into the WSO2 IdP
- User downloads an OpenID InfoCard
3. Login with OpenID Url - issued by WSO2 IdP
4. Login with OpenIDInfoCard issued by WSO2 IdP
5. View the Urls, which accepted the user's OpenID Url
- User logs into the WSO2 IdP with valid credentials
- View the sites which accepted the user's OpenID Url
[Site Url| Number of times being used|Last login|Trust Always|Deafult
Profile]
6. Add/Remove sites as 'Always Trusted' by login in directly
- User logs into the WSO2 IdP with valid credentials
- View the sites which accepted the user's OpenID Url
- User adds/removes sites[urls] as always trusted sites, from the sites
which already accepted his OpenID url
7. Add/Remove sites as 'Always Trusted' during redirection
- User being redirected to the WSO2 IdP.
- User logs into the WSO2 IdP with valid credentials
- User decides, whether to trust the RP Only Once, Always or Deny sending
profile info
8. Login into the WSO2 IdP during redirection, using a registered self-issued
InfoCard
- User being redirected to the WSO2 IdP.
- User logs into the WSO2 IdP with a registered self-issued InfoCard
9. Maintain different "user profiles" and set one as default against each RP -
requests authentication
3. Use cases for Admin
-----------------------
1. Add claims related to OpenID as 'supported claims'
[Note 1 - OpenID related claims will have a additional attribute called
'OpenID Tag"]
2. Add new claims related to OpenID to a given dialect
[Note 1 - OpenID related claims will have a additional attribute called
'OpenID Tag"]
[Note 2 - Admin should not add any claims to the dialect
http://schema.openid.net/2007/05/claims - Simple Atrribute Registration]
[Note 3 - Admin can add any claim to the dialect http://openid.net/schema -
Attribute Exchange]
[Note 4 - Adding the OpenID Tag to any claim wil make it available as an
OpenID claim]
3. View issued InfoCards against Token Type
4. Revoke issued OpenIDInfoCards
5. Enable/Disable OpenID/OpenIDInfoCard support
4. DBSchema changes required by OpenID integration
---------------------------------------------------
4.1. Table Name : CLAIMS
-------------------------
Columns to be added :
1. OPENID_TAG [IS_NULL = YES, VARCHAR]
Purpose: This column will contain all the OpenID related tags against the
Claim Uri.
And also will allow to map, even an Inforcard claim to an OpenID
attribute.
Example: Give Name
uri :
http://schemas.xmlsoap.org/ws/2005/05/identity/claims/givenname
OPENID_TAG : givenname
Date of Birth
uri: http://schema.openid.net/2007/05/claims/dob
OPENID_TAG: dob
4.2. Table Name : OPENID_USER_RP [NEW}
---------------------------------
Columns:
1. RP_URL
2. USER_ID
3. C_LAST_UPDATED
4. IS_TRUSTED_ALWAYS
5. VISIT_COUNT
6. LAST_VISIT
7. DEFAULT_PROFILE
5. Configuration file changes
------------------------------
1. modules\identity-provider\conf\initial-claims.xml
- Added new dialects for OpenID
- Introduced a new element <OpenIDTag>
2. modules\identity-provider\conf\wsas-server.xml
- Added <OpenIDServerUrl>
3. modules\identity-provider\conf\wso2identity.hbm.xml
- DBSchema changes Ref [4.1]
_______________________________________________
Identity-dev mailing list
[email protected]
http://wso2.org/cgi-bin/mailman/listinfo/identity-dev