Test Case Name | Steps | Expected Results | Priority (P1 | P2 |P3) | Test Case Type( Sanity | Functional | Negative) | Status |
verify the ldapconfiguration Api functionality with valid values | 1.create cloudstack user and make sure same user exists in AD(Active directory) 2.call the ldapconfig API with valid values <ac:structured-macro ac:name="unmigrated-wiki-markup" ac:schema-version="1" ac:macro-id="157293c740ccb8e6-f48f783c-451147d8-b1cc8e04-00b9d672e8988b4163aaf67c"><ac:plain-text-body><![CDATA[eg:[http://localhost:8096/client/api?command=ldapConfig&hostname=ADHost1&searchbase=DC%3Dhyd-qa&queryfilter=(%26(mail%3D%25e))&port=389&response=json ]]></ac:plain-text-body></ac:structured-macro> ] Note:Here ADHost is Active Directoy Hostname/IP address | 2. a)ldap should be configured successfully b)on db fields related ldap in the Configuration table should have new assigned values. | P1 | Functional/Sanity | Pass |
Verify the ldapconfig API functionality with invalid values | 1..call the ldapconfig API with in-valid values eg:http://localhost:8096/client/api?command=ldapConfig&hostname=ADHost&searchbase=DC%3Dhyd-&queryfilter=(%26(mail%3D%25e))&port=389&response=json | It should through proper error message
| P1 | Functional | Fail(CLOUDSTACK-1172)
|
ldap creation with In-valid values from UI | 1.Open the LDAP configuration Wizard(Navigate Global Setting-LdapConfiguration) 2.Provide in-valid values for displayed attributes In the wizard window(hostname,searchbase, queryfilter binddn, bindpass port) 3.Click On Ok button | It should through proper error message | P2 | Funcational/Negative | Fail(CLOUDSTACK-1398) | |
List LDAP configuration detaisl from UI | 1.Open the LDAP configuration Wizard(Navigate Global Setting-LdapConfiguration) 2.Provide valid values for displayed attributes In the wizard window(hostname,searchbase, queryfilter binddn, bindpass > port) 3.Click On Ok button 4. ON Select View list box,Select the "LDAP configuration" list item | Newly configured LDAP details should be displayed properly | | Functional/Sanity | Pass | |
Verify the Ldapbind with simple authentication | Pre-req: 1.create a user in AD and with email id 2.create cloudstack userwith same email id and with different password Steps: 1.call the ldapconfig API with query filter as email ID <ac:structured-macro ac:name="unmigrated-wiki-markup" ac:schema-version="1" ac:macro-id="edf59f5bc39f114b-a019e150-49d442ca-8b51b2e4-0282c32a61c15702e42726c6"><ac:plain-text-body><![CDATA[eg:[http://localhost:8096/client/api?command=ldapConfig&hostname=ADHost&searchbase=DC%3Dhyd-qa&queryfilter=(%26(mail%3D%25e))&port=389&response=json ]]></ac:plain-text-body></ac:structured-macro> ] 2. verify the login to MS console with valid/invalid values | 4.when default authentication fails , user credentials are validated against external domain users credentials using lDAP | P1 | Functional | Pass | |
Verify the Ldapbind with anonymous | 1.create a user in AD and with email id 2. perform the ldapconfig with anonymous http://10.147.29.101:8096/client/api?command=ldapConfig&hostname=ADHost&searchbase=DC%3Dhyd-qa&queryfilter=(%26(uid%3D%25u))&port=389&response=json | 2. a)ldap should be configured successfully b)on db fields related ldap in the Configuration table should have new assigned values.
| P2 | Functional | Pass | |
Verify LDAPBind with SSL from UI | 1.Open the LDAP configuration Wizard(Navigate Global Setting-LdapConfiguration) 2.Provide valid values for displayed attributes In the wizard window(hostname,searchbase, queryfilter binddn, bindpass : <password field> port) 3.Check the "SSL" check box and provide the values for "trust store" and truststrorepass" fields 3.Click On Ok button | 1)ldap should be configured successfully 2)on db fields related ldap in the Configuration table should have new assigned values | P1 | Functional
| Fail ON UI side:raised a bug:CLOUDSTACK-1637 (case1) from API level getting the following exception:simple bind failed: hyd-qa12:636; Caused by:java.lang.RuntimeException: Unexpected error: java.security.InvalidAlgorithmParameterException: the trustAnchors parameter must be non-empty | |
verfiythe Ldapauthentication by using Query filter as email through API | Pre-req: 1.create a user in AD and with email id 2.create cloudstack userwith same email id and with different password Steps: 1.call the ldapconfig API with query filter as email ID <ac:structured-macro ac:name="unmigrated-wiki-markup" ac:schema-version="1" ac:macro-id="6d97786df3af6910-38a3faac-4e6d4093-a74199b4-26c9b51edc0ea6225939b35f"><ac:plain-text-body><![CDATA[eg:[http://localhost:8096/client/api?command=ldapConfig&hostname=ADHost&searchbase=DC%3Dhyd-qa&queryfilter=(%26(mail%3D%25e))&port=389&response=json ]]></ac:plain-text-body></ac:structured-macro> ] 2. verify the login to MS console with valid/invalid values | 4.when default authentication fails , user credentials are validated against external domain users credentials using lDAP | P2 | Functional/Sanity | Pass | |
verfiythe Ldapauthentication by using Query filter as email through UI | Pre-req: 1.create a user in AD and with email id 2.create cloudstack userwith same email id and with different password
1.Open the LDAP configuration Wizard(Navigate Global Setting-LdapConfiguration) 2.Provide valid values for displayed attributes In the wizard window(hostname,searchbase, queryfilter AS EMAIL binddn, bindpass : <password field> port) 3.Click On Ok button 4. verify the login to MS console with valid/invalid values | when default authentication fails , user credentials are validated against external domain users credentials using lDAP and it matches then login should be successful or else it should fail with proper error message. | P1 | Functional/Sanity | Pass | |
verfiythe Ldapauthentication by using Query filter as displayName | 1. create cloudstack user and make sure same user exists in AD(Active directory)
2.call the ldapconfig API with query filter as email ID <ac:structured-macro ac:name="unmigrated-wiki-markup" ac:schema-version="1" ac:macro-id="03caec67408e5b2e-c83a4d8a-42fe4037-b4d5beb8-f814d932c82878c40bcf71a1"><ac:plain-text-body><![CDATA[eg:[http://localhost:8096/client/api?command=ldapConfig&hostname=ADHost&searchbase=DC%3Dhyd-qa&queryfilter=%28%26%28displayName%3D%25u%29%29&binddn=%22CN%3DAdministrator%2CCN%3DUsers%2CDC%3Dhyd-qa%22&bindpass=1111_aaaa&port=389&response=json ]]></ac:plain-text-body></ac:structured-macro> ] 3. verify the login to MS console with valid/invalid values | when default authentication fails , user credentials are validated against external domain users credentials using lDAP and it matches then login should be successful or else it should fail with proper error message. | P1 | Functional | Pass | |
verfiythe Ldapauthentication by using Query filter as display name | 1.create a user in AD and with email id 2.create cloudstack userwith same email id and with different password
3.call the ldapconfig API with query filter as display name eg: <ac:structured-macro ac:name="unmigrated-wiki-markup" ac:schema-version="1" ac:macro-id="140ddde50c61c838-55f2998c-40ba498d-816788e7-d26fef43eb704f4aec836bed"><ac:plain-text-body><![CDATA[[http://localhost:8096/client/api?command=ldapConfig&hostname=10.147.28.251&searchbase=DC%3Dhyd-qa1&queryfilter=(%26(displayName%3D%25u))&binddn=CN%3Dtest%20123%2CCN%3DUsers%2CDC%3Dhyd-qa&bindpass=aaaa&port=389&response=json ]]></ac:plain-text-body></ac:structured-macro> ] 4. verify the login to MS console with valid/invalid values | when default authentication fails , user credentials are validated against external domain users credentials using lDAP and it matches then login should be successful or else it should fail with proper error message. | P2 | Functional | Pass | |
verfiythe Ldapauthentication on account belongs to specific organization under domain | 1.create a user in AD and with email id 2.create cloudstack userwith same email id and with different password
3.call the ldapconfig API with query filter as display name eg: <ac:structured-macro ac:name="unmigrated-wiki-markup" ac:schema-version="1" ac:macro-id="2a50017e06911681-ed23668f-4919495d-b0ea8694-fbbe69a96cfe57c9a0f3d544"><ac:plain-text-body><![CDATA[[http://localhost:8096/client/api?command=ldapConfig&hostname=ADHost&searchbase=OU%3Dcitrix%2COU%3DDomain%20Controllers%2CDC%3Dhyd-qa&queryfilter=%28%26%28mail%3D%25e%29%29&binddn=CN%3DAdministrator%2CCN%3DUsers%2CDC%3Dhyd-qa&port=389&bindpass=1111_aaaa&response=json ]]></ac:plain-text-body></ac:structured-macro> ] 4. verify the login to MS console with valid/invalid values | 4.when default authentication fails , user credentials are validated against external domain users credentials using lDAP | P2 | Functional | Pass | |
check the logs and alerts for Ldap related erros | 1.perform ldapconfig 2.verify the logs and alerts for ldap related to errors | No error should be shown while configuring with valid values and in invalid case it should through meaningful error message | P2 | Sanity | Fail(CLOUDSTACK-1172) | |
Check the UI validation by not passing any value | 1.Open the LDAP configuration Wizard(Navigate Global Setting-LdapConfiguration)
2.with out providing any values,Click on "Ok" button | UI should alert the end user with required field to fill | P2 | Functional/Negative | Pass | |
reset the password and check the authentication | Pre-req: 1.create a user in AD and with email id 2.create cloudstack userwith same email id and with different password Steps: 1.call the ldapconfig API with query filter as email ID <ac:structured-macro ac:name="unmigrated-wiki-markup" ac:schema-version="1" ac:macro-id="cae796e79442971e-956f9f1b-49994341-aebf8bbb-4dd599c1e7335dbe4f793c88"><ac:plain-text-body><![CDATA[eg:[http://localhost:8096/client/api?command=ldapConfig&hostname=ADHost&searchbase=DC%3Dhyd-qa&queryfilter=(%26(mail%3D%25e))&port=389&response=json ]]></ac:plain-text-body></ac:structured-macro> ] 2. verify the login to MS console with valid/invalid values 3.reset the Ldap user password from AD(Active directory) 4.Verify the Login to MS console to newly changed passward | user credentials are validated against external domain users credentials using lDAP and login should be successful | P1 | Functional
| Pass | |
Check ldap creation with valid values from UI
| 1.Open the LDAP configuration Wizard(Navigate Global Setting-LdapConfiguration) 2.Provide valid values for displayed attributes In the wizard window(hostname,searchbase, queryfilter binddn, bindpass : <password field> port) 3.Click On Ok button
| 1)ldap should be configured successfully 2)on db, fields related ldap in the Configuration table should have new assigned values. | P1
| Functional
| Pass
| |
Check ldap creation with valid values from UI | 1.Open the LDAP configuration Wizard(Navigate Global Setting-LdapConfiguration) 2.Provide valid values for displayed attributes In the wizard window(hostname,searchbase, queryfilter binddn, bindpass : <password field> port) 3.Click On Ok button | 1)ldap should be configured successfully 2)on db, fields related ldap in the Configuration table should have new assigned values | P1
| Functional/Sanity | Pass
| |
Verify LdapRemove functionality
| Prereq: make sure Ldap configured
steps: 1.remove the ldap configuration by calling ldapremove API
http://localhost:8096/client/api?command=ldapRemove&response=json\\ Image Added | ldap configuration should be removed successfully.
| P1
| Functional/Sanity | Pass
| |