Test Case Name | Steps | Expected Results | Priority (P1 | P2 |P3) | Test Case Type( Sanity | Functional | Negative) | Execution Time | Executed on Release | Reviewed By | Status | Comments |
verify the ldapconfiguration Api functionality with valid values | 1.create cloudstack user and make sure same user exists in AD(Active directory) 2.call the ldapconfig API with valid values eg: http://localhost:8096/client/api?command=ldapConfig&hostname=ADHost1&searchbase=DC%3Dhyd-qa&queryfilter=(%26(mail%3D%25e))&port=389&response=json\\ Note:Here ADHost is Active Directoy Hostname/IP address
| 2. a)ldap should be configured successfully b)on db fields related ldap in the Configuration table should have new assigned values. | P1 | Functional/Sanity | | | | Pass | |
Check ldap creation with valid values from UI | 1.Open the LDAP configuration Wizard(Navigate Global Setting-LdapConfiguration) 2.Provide valid values for displayed attributes In the wizard window(hostname,searchbase, queryfilter binddn, bindpass : <password field> port) 3.Click On Ok button
|
1)ldap should be configured successfully 2)on db, fields related ldap in the Configuration table should have new assigned values. | P1 | Functional/Sanity | | | Pass | |
Verify the ldapconfig API functionality with invalid values | 1..call the ldapconfig API with in-valid values eg: http://localhost:8096/client/api?command=ldapConfig&hostname=ADHost&searchbase=DC%3Dhyd-&queryfilter=(%26(mail%3D%25e))&port=389&response=json | It should through proper error message
| P1 | Functional | | | | Fail(CLOUDSTACK-1172)
|
|
ldap creation with In-valid values from UI | 1.Open the LDAP configuration Wizard(Navigate Global Setting-LdapConfiguration) 2.Provide in-valid values for displayed attributes In the wizard window(hostname,searchbase, queryfilter binddn, bindpass port) 3.Click On Ok button | It should through proper error message | P2 | Funcational/Negative | | | | Fail(CLOUDSTACK-1398) | |
List LDAP configuration detaisl from UI | 1.Open the LDAP configuration Wizard(Navigate Global Setting-LdapConfiguration) 2.Provide valid values for displayed attributes In the wizard window(hostname,searchbase, queryfilter binddn, bindpass > port) 3.Click On Ok button 4. ON Select View list box,Select the "LDAP configuration" list item | Newly configuread LDAP details should be displayed properly | | Functional/Sanity | | | Pass | |
Verify the Ldapbind with simple authentication | Pre-req: 1.create a user in AD and with email id 2.create cloudstack userwith same email id and with different password Steps: 1.call the ldapconfig API with query filter as email ID eg: http://localhost:8096/client/api?command=ldapConfig&hostname=ADHost&searchbase=DC%3Dhyd-qa&queryfilter=(%26(mail%3D%25e))&port=389&response=json\\ 2. verify the login to MS console with valid/invalid values | 4.when default authentication fails , user credentials are validated against external domain users credentials using lDAP | P1 | Functional | | | Pass | |
Verify the Ldapbind with anonymous | 1.create a user in AD and with email id 2. perform the ldapconfig with anonymous
http://10.147.29.101:8096/client/api?command=ldapConfig&hostname=ADHost&searchbase=DC%3Dhyd-qa&queryfilter=(%26(uid%3D%25u))&port=389&response=json | 2. a)ldap should be configured successfully b)on db fields related ldap in the Configuration table should have new assigned values.
| P2 | Functional | | | | Pass | |
| | | | | | | | | |
Verify LDAPBind with SSL from UI | 1.Open the LDAP configuration Wizard(Navigate Global Setting-LdapConfiguration) 2.Provide valid values for displayed attributes In the wizard window(hostname,searchbase, queryfilter binddn, bindpass : <password field> port) 3.Check the "SSL" check box and provide the values for "trust store" and truststrorepass" fields 3.Click On Ok button | 1)ldap should be configured successfully 2)on db fields related ldap in the Configuration table should have new assigned values | P1 | Funational | | | | |
verfiythe Ldapauthentication by using Query filter as email through API | Pre-req: 1.create a user in AD and with email id 2.create cloudstack userwith same email id and with different password Steps: 1.call the ldapconfig API with query filter as email ID eg: http://localhost:8096/client/api?command=ldapConfig&hostname=ADHost&searchbase=DC%3Dhyd-qa&queryfilter=(%26(mail%3D%25e))&port=389&response=json\\ 2. verify the login to MS console with valid/invalid values | 4.when default authentication fails , user credentials are validated against external domain users credentials using lDAP | P2 | Functional/Sanity | | | | Pass | |
verfiythe Ldapauthentication by using Query filter as email through UI | Pre-req: 1.create a user in AD and with email id 2.create cloudstack userwith same email id and with different password
1.Open the LDAP configuration Wizard(Navigate Global Setting-LdapConfiguration) 2.Provide valid values for displayed attributes In the wizard window(hostname,searchbase, queryfilter AS EMAIL binddn, bindpass : <password field> port) 3.Click On Ok button 4. verify the login to MS console with valid/invalid values | when default authentication fails , user credentials are validated against external domain users credentials using lDAP and it maches then login should be successful or else it should fail with proper error message. | P1 | Functional/Sanity | | | | Pass | |
verfiythe Ldapauthentication by using Query filter as displayName | 1. create cloudstack user and make sure same user exists in AD(Active directory)
2.call the ldapconfig API with query filter as email ID eg: http://localhost:8096/client/api?command=ldapConfig&hostname=ADHost&searchbase=DC%3Dhyd-qa&queryfilter=%28%26%28displayName%3D%25u%29%29&binddn=%22CN%3DAdministrator%2CCN%3DUsers%2CDC%3Dhyd-qa%22&bindpass=1111_aaaa&port=389&response=json\\ 3. verify the login to MS console with valid/invalid values | when default authentication fails , user credentials are validated against external domain users credentials using lDAP and it maches then login should be successful or else it should fail with proper error message. | P1 | Functional | | | | Pass | |
verfiythe Ldapauthentication by using Query filter as display name | 1.create a user in AD and with email id 2.create cloudstack userwith same email id and with different password
3.call the ldapconfig API with query filter as display name eg:
http://localhost:8096/client/api?command=ldapConfig&hostname=10.147.28.251&searchbase=DC%3Dhyd-qa1&queryfilter=(%26(displayName%3D%25u))&binddn=CN%3Dtest%20123%2CCN%3DUsers%2CDC%3Dhyd-qa&bindpass=aaaa&port=389&response=json\\ 4. verify the login to MS console with valid/invalid values
| when default authentication fails , user credentials are validated against external domain users credentials using lDAP and it maches then login should be successful or else it should fail with proper error message. | P2 | Functional | | | | Pass | |
verfiythe Ldapauthentication on account belongs to specific organization under domain | 1.create a user in AD and with email id 2.create cloudstack userwith same email id and with different password
3.call the ldapconfig API with query filter as display name eg:
http://localhost:8096/client/api?command=ldapConfig&hostname=ADHost&searchbase=OU%3Dcitrix%2COU%3DDomain%20Controllers%2CDC%3Dhyd-qa&queryfilter=%28%26%28mail%3D%25e%29%29&binddn=CN%3DAdministrator%2CCN%3DUsers%2CDC%3Dhyd-qa&port=389&bindpass=1111_aaaa&response=json\\ 4. verify the login to MS console with valid/invalid values
| 4.when default authentication fails , user credentials are validated against external domain users credentials using lDAP | P2 | Functional | | | | Pass | |
check the logs and alerts for Ldap related erros | 1.perform ldapconfig 2.verify the logs and alerts for ldap related to errors | No error should be shown while configuring with valid values and in invalid case it should through meanigful error message | P2 | Sanity | | | | Fail(CLOUDSTACK-1172) | |
Check the UI validation by not passing any value | 1.Open the LDAP configuration Wizard(Navigate Global Setting-LdapConfiguration)
2.with out providing any values,Click on "Ok" button | UI should alert the end user with required field to fill | P2 | Functional/Negative | | | Pass | |
reset the password and check the authentication | Pre-req: 1.create a user in AD and with email id 2.create cloudstack userwith same email id and with different password Steps: 1.call the ldapconfig API with query filter as email ID eg: http://localhost:8096/client/api?command=ldapConfig&hostname=ADHost&searchbase=DC%3Dhyd-qa&queryfilter=(%26(mail%3D%25e))&port=389&response=json\\ 2. verify the login to MS console with valid/invalid values 3.reset the Ldap user password from AD(Active directory) 4.Verify the Login to MS console to newly changed passward | user credentials are validated against external domain users credentials using lDAP and login should be successful | P1 | Funcational | | | | Pass | |