Test Case Name | Steps | Expected Results | Priority (P1 | P2 |P3) | Test Case Type( Sanity | Functional | Negative) | Status |
verify the ldapconfiguration Api functionality with valid values | 1.create cloudstack user and make sure same user exists in AD(Active directory) 2.call the ldapconfig API with valid values <ac:structured-macro ac:name="unmigrated-wiki-markup" ac:schema-version="1" ac:macro-id="1bf98f79-2d73-4e5b-9754-4b38020ba862"><ac:plain-text-body><![CDATA[eg:[http://localhost:8096/client/api?command=ldapConfig&hostname=ADHost1&searchbase=DC%3Dhyd-qa&queryfilter=(%26(mail%3D%25e))&port=389&response=json ]]></ac:plain-text-body></ac:structured-macro> ] Note:Here ADHost is Active Directoy Hostname/IP address | 2. a)ldap should be configured successfully b)on db fields related ldap in the Configuration table should have new assigned values. | P1 | Functional/Sanity | Pass | |
Verify the ldapconfig API functionality with invalid values | 1..call the ldapconfig API with in-valid values eg:http://localhost:8096/client/api?command=ldapConfig&hostname=ADHost&searchbase=DC%3Dhyd-&queryfilter=(%26(mail%3D%25e))&port=389&response=json | It should through proper error message
| P1 | Functional | Fail(CLOUDSTACK-1172)
|
ldap creation with In-valid values from UI | 1.Open the LDAP configuration Wizard(Navigate Global Setting-LdapConfiguration) 2.Provide in-valid values for displayed attributes In the wizard window(hostname,searchbase, queryfilter binddn, bindpass port) 3.Click On Ok button | It should through proper error message | P2 | Funcational/Negative | Fail(CLOUDSTACK-1398) | |
List LDAP configuration detaisl from UI | 1.Open the LDAP configuration Wizard(Navigate Global Setting-LdapConfiguration) 2.Provide valid values for displayed attributes In the wizard window(hostname,searchbase, queryfilter binddn, bindpass > port) 3.Click On Ok button 4. ON Select View list box,Select the "LDAP configuration" list item | Newly configuread configured LDAP details should be displayed properly | | Functional/Sanity | Pass | |
Verify the Ldapbind with simple authentication | Pre-req: 1.create a user in AD and with email id 2.create cloudstack userwith same email id and with different password Steps: 1.call the ldapconfig API with query filter as email ID <ac:structured-macro ac:name="unmigrated-wiki-markup" ac:schema-version="1" ac:macro-id="e9c9d66c-30ad-4d5e-aad3-18680c2ad363"><ac:plain-text-body><![CDATA[eg:[http://localhost:8096/client/api?command=ldapConfig&hostname=ADHost&searchbase=DC%3Dhyd-qa&queryfilter=(%26(mail%3D%25e))&port=389&response=json ]]></ac:plain-text-body></ac:structured-macro> ] 2. verify the login to MS console with valid/invalid values | 4.when default authentication fails , user credentials are validated against external domain users credentials using lDAP | P1 | Functional | Pass | |
Verify the Ldapbind with anonymous | 1.create a user in AD and with email id 2. perform the ldapconfig with anonymous http://10.147.29.101:8096/client/api?command=ldapConfig&hostname=ADHost&searchbase=DC%3Dhyd-qa&queryfilter=(%26(uid%3D%25u))&port=389&response=json | 2. a)ldap should be configured successfully b)on db fields related ldap in the Configuration table should have new assigned values.
| P2 | Functional | Pass | | | | | | | | |
Verify LDAPBind with SSL from UI | 1.Open the LDAP configuration Wizard(Navigate Global Setting-LdapConfiguration) 2.Provide valid values for displayed attributes In the wizard window(hostname,searchbase, queryfilter binddn, bindpass : <password field> port) 3.Check the "SSL" check box and provide the values for "trust store" and truststrorepass" fields 3.Click On Ok button | 1)ldap should be configured successfully 2)on db fields related ldap in the Configuration table should have new assigned values | P1 | Funational | | Functional
| ON UI side:raised a bug:CLOUDSTACK-1637 (case1) from API level getting the following exception:simple bind failed: hyd-qa12:636; Caused by:java.lang.RuntimeException: Unexpected error: java.security.InvalidAlgorithmParameterException: the trustAnchors parameter must be non-empty | |
verfiythe Ldapauthentication by using Query filter as email through API | Pre-req: 1.create a user in AD and with email id 2.create cloudstack userwith same email id and with different password Steps: 1.call the ldapconfig API with query filter as email ID <ac:structured-macro ac:name="unmigrated-wiki-markup" ac:schema-version="1" ac:macro-id="da664c7a-2a29-4541-b3e2-dfdd549843d0"><ac:plain-text-body><![CDATA[eg:[http://localhost:8096/client/api?command=ldapConfig&hostname=ADHost&searchbase=DC%3Dhyd-qa&queryfilter=(%26(mail%3D%25e))&port=389&response=json ]]></ac:plain-text-body></ac:structured-macro> ] 2. verify the login to MS console with valid/invalid values | 4.when default authentication fails , user credentials are validated against external domain users credentials using lDAP | P2 | Functional/Sanity | Pass | |
verfiythe Ldapauthentication by using Query filter as email through UI | Pre-req: 1.create a user in AD and with email id 2.create cloudstack userwith same email id and with different password
1.Open the LDAP configuration Wizard(Navigate Global Setting-LdapConfiguration) 2.Provide valid values for displayed attributes In the wizard window(hostname,searchbase, queryfilter AS EMAIL binddn, bindpass : <password field> port) 3.Click On Ok button 4. verify the login to MS console with valid/invalid values | when default authentication fails , user credentials are validated against external domain users credentials using lDAP and it matches then login should be successful or else it should fail with proper error message. | P1 | Functional/Sanity | Pass | |
verfiythe Ldapauthentication by using Query filter as displayName | 1. create cloudstack user and make sure same user exists in AD(Active directory)
2.call the ldapconfig API with query filter as email ID <ac:structured-macro ac:name="unmigrated-wiki-markup" ac:schema-version="1" ac:macro-id="4206ddb5-f72e-47d3-b880-fe173b3a3726"><ac:plain-text-body><![CDATA[eg:[http://localhost:8096/client/api?command=ldapConfig&hostname=ADHost&searchbase=DC%3Dhyd-qa&queryfilter=%28%26%28displayName%3D%25u%29%29&binddn=%22CN%3DAdministrator%2CCN%3DUsers%2CDC%3Dhyd-qa%22&bindpass=1111_aaaa&port=389&response=json ]]></ac:plain-text-body></ac:structured-macro> ] 3. verify the login to MS console with valid/invalid values | when default authentication fails , user credentials are validated against external domain users credentials using lDAP and it matches then login should be successful or else it should fail with proper error message. | P1 | Functional | Pass | |
verfiythe Ldapauthentication by using Query filter as display name | 1.create a user in AD and with email id 2.create cloudstack userwith same email id and with different password
3.call the ldapconfig API with query filter as display name eg: <ac:structured-macro ac:name="unmigrated-wiki-markup" ac:schema-version="1" ac:macro-id="a65c3f57-4b4a-4cd2-ba89-21bd3ffb09fa"><ac:plain-text-body><![CDATA[[http://localhost:8096/client/api?command=ldapConfig&hostname=10.147.28.251&searchbase=DC%3Dhyd-qa1&queryfilter=(%26(displayName%3D%25u))&binddn=CN%3Dtest%20123%2CCN%3DUsers%2CDC%3Dhyd-qa&bindpass=aaaa&port=389&response=json ]]></ac:plain-text-body></ac:structured-macro> ] 4. verify the login to MS console with valid/invalid values | when default authentication fails , user credentials are validated against external domain users credentials using lDAP and it matches then login should be successful or else it should fail with proper error message. | P2 | Functional | Pass | |
verfiythe Ldapauthentication on account belongs to specific organization under domain | 1.create a user in AD and with email id 2.create cloudstack userwith same email id and with different password
3.call the ldapconfig API with query filter as display name eg: <ac:structured-macro ac:name="unmigrated-wiki-markup" ac:schema-version="1" ac:macro-id="2f1eb93c-a2ce-4204-b9d6-328e474f5886"><ac:plain-text-body><![CDATA[[http://localhost:8096/client/api?command=ldapConfig&hostname=ADHost&searchbase=OU%3Dcitrix%2COU%3DDomain%20Controllers%2CDC%3Dhyd-qa&queryfilter=%28%26%28mail%3D%25e%29%29&binddn=CN%3DAdministrator%2CCN%3DUsers%2CDC%3Dhyd-qa&port=389&bindpass=1111_aaaa&response=json ]]></ac:plain-text-body></ac:structured-macro> ] 4. verify the login to MS console with valid/invalid values | 4.when default authentication fails , user credentials are validated against external domain users credentials using lDAP | P2 | Functional | Pass | |
check the logs and alerts for Ldap related erros | 1.perform ldapconfig 2.verify the logs and alerts for ldap related to errors | No error should be shown while configuring with valid values and in invalid case it should through meanigful meaningful error message | P2 | Sanity | Fail(CLOUDSTACK-1172) | |
Check the UI validation by not passing any value | 1.Open the LDAP configuration Wizard(Navigate Global Setting-LdapConfiguration)
2.with out providing any values,Click on "Ok" button | UI should alert the end user with required field to fill | P2 | Functional/Negative | Pass | |
reset the password and check the authentication | Pre-req: 1.create a user in AD and with email id 2.create cloudstack userwith same email id and with different password Steps: 1.call the ldapconfig API with query filter as email ID <ac:structured-macro ac:name="unmigrated-wiki-markup" ac:schema-version="1" ac:macro-id="db975251-1eb4-4d31-bb6d-364b508a8a29"><ac:plain-text-body><![CDATA[eg:[http://localhost:8096/client/api?command=ldapConfig&hostname=ADHost&searchbase=DC%3Dhyd-qa&queryfilter=(%26(mail%3D%25e))&port=389&response=json ]]></ac:plain-text-body></ac:structured-macro> ] 2. verify the login to MS console with valid/invalid values 3.reset the Ldap user password from AD(Active directory) 4.Verify the Login to MS console to newly changed passward | user credentials are validated against external domain users credentials using lDAP and login should be successful | P1 | Functional
| Pass | |
Check ldap creation with valid values from UI
| 1.Open the LDAP configuration Wizard(Navigate Global Setting-LdapConfiguration) 2.Provide valid values for displayed attributes In the wizard window(hostname,searchbase, queryfilter binddn, bindpass : <password field> port) 3.Click On Ok button
| 1)ldap should be configured successfully 2)on db, fields related ldap in the Configuration table should have new assigned values. | P1
| Functional
| Pass
| |
Check ldap creation with valid values from UI | 1.Open the LDAP configuration Wizard(Navigate Global Setting-LdapConfiguration) 2.Provide valid values for displayed attributes In the wizard window(hostname,searchbase, queryfilter binddn, bindpass : <password field> port) 3.Click On Ok button | 1)ldap should be configured successfully 2)on db, fields related ldap in the Configuration table should have new assigned values . | P1
| Functional/Sanity | Pass
| |