Versions Compared

Key

  • This line was added.
  • This line was removed.
  • Formatting was changed.

Test Case Name

Steps

Expected Results

Priority 
(P1 | P2 |P3)

Test Case Type( Sanity | Functional |
Negative)

Status

verify the ldapconfiguration Api
functionality with valid values

1.create cloudstack user and make sure same  user exists in AD(Active directory)
2.call the  ldapconfig API with valid values
<ac:structured-macro ac:name="unmigrated-wiki-markup" ac:schema-version="1" ac:macro-id="e5771d6d89e1e342-07ed1f8a-4c834730-b192ac97-e51e50cb53b70ae823f44120"><ac:plain-text-body><![CDATA[eg:[http://localhost:8096/client/api?command=ldapConfig&hostname=ADHost1&searchbase=DC%3Dhyd-qa&queryfilter=(%26(mail%3D%25e))&port=389&response=json
]]></ac:plain-text-body></ac:structured-macro>
]
Note:Here ADHost is Active Directoy Hostname/IP address

2.
a)ldap should be configured successfully
b)on db fields related ldap in the Configuration table should have  new assigned values.

P1

Functional/Sanity

Pass

Verify the ldapconfig API functionality 
with invalid values

1..call the  ldapconfig API with in-valid values
eg:http://localhost:8096/client/api?command=ldapConfig&hostname=ADHost&searchbase=DC%3Dhyd-&queryfilter=(%26(mail%3D%25e))&port=389&response=json

It should through proper error message

P1

Functional

Fail(CLOUDSTACK-1172)

ldap creation with In-valid values from UI

1.Open the LDAP configuration Wizard(Navigate Global Setting-LdapConfiguration)
2.Provide in-valid values for displayed attributes In the wizard window(hostname,searchbase, queryfilter
 binddn, bindpass  port)
3.Click On Ok button

It should through proper error message

P2

Funcational/Negative

Pass(UI side validation happening but API levvel need to identify the when we pass invlid seach baxce values and return the proper response) so I am passing UI side testcase Fail(CLOUDSTACK-1398)

 

List LDAP configuration detaisl from UI

1.Open the LDAP configuration Wizard(Navigate Global Setting-LdapConfiguration)
2.Provide valid values for displayed attributes In the wizard window(hostname,searchbase, queryfilter
 binddn, bindpass >
 port)
3.Click On Ok button
4. ON Select View list box,Select the "LDAP configuration" list item

Newly configured LDAP details should be displayed properly

 

Functional/Sanity

Pass

 

Verify the Ldapbind with simple
authentication

Pre-req:
1.create a user in AD and with email id
2.create cloudstack userwith same email id  and  with different password
Steps:
1.call the  ldapconfig API with query filter as email ID
<ac:structured-macro ac:name="unmigrated-wiki-markup" ac:schema-version="1" ac:macro-id="c913d35c4896de26-bd368ce9-43b047dd-a406a17a-5014241c691e4f3d2c947178"><ac:plain-text-body><![CDATA[eg:[http://localhost:8096/client/api?command=ldapConfig&hostname=ADHost&searchbase=DC%3Dhyd-qa&queryfilter=(%26(mail%3D%25e))&port=389&response=json
]]></ac:plain-text-body></ac:structured-macro>
] 2. verify the  login to MS console with valid/invalid values

4.when default authentication fails , user credentials are validated against external domain users credentials using lDAP

P1

Functional

Pass

 

Verify the Ldapbind with anonymous

1.create a user in AD and with email id
2. perform the ldapconfig with anonymous
http://10.147.29.101:8096/client/api?command=ldapConfig&hostname=ADHost&searchbase=DC%3Dhyd-qa&queryfilter=(%26(uid%3D%25u))&port=389&response=json

2.
a)ldap should be configured successfully
b)on db fields related ldap in the Configuration table should have  new assigned values.

P2

Functional

Pass

 

Verify LDAPBind with SSL from UI

1.Open the LDAP configuration Wizard(Navigate Global Setting-LdapConfiguration)
2.Provide valid values for displayed attributes In the wizard window(hostname,searchbase, queryfilter
 binddn, bindpass : <password field>
 port)
3.Check the "SSL" check box and provide the values for "trust store" and truststrorepass" fields
3.Click On Ok button

1)ldap should be configured successfully
2)on db fields related ldap in the Configuration table should have  new assigned values

P1

Functional

Fail
ON UI side:raised a bug:CLOUDSTACK-1637 (case1)
 from API level getting the following exception:simple bind failed: hyd-qa12:636; Caused by:java.lang.RuntimeException:
Unexpected error: java.security.InvalidAlgorithmParameterException:
the trustAnchors parameter must be non-empty

 

verfiythe Ldapauthentication by using
Query filter as email through API

Pre-req:
1.create a user in AD and with email id
2.create cloudstack userwith same email id  and  with different password
Steps:
1.call the  ldapconfig API with query filter as email ID
<ac:structured-macro ac:name="unmigrated-wiki-markup" ac:schema-version="1" ac:macro-id="cc02cc21fe50c74d-3b2df7e7-4dd341ed-b0f6926e-7c5e0be5d67bc39e19686662"><ac:plain-text-body><![CDATA[eg:[http://localhost:8096/client/api?command=ldapConfig&hostname=ADHost&searchbase=DC%3Dhyd-qa&queryfilter=(%26(mail%3D%25e))&port=389&response=json
]]></ac:plain-text-body></ac:structured-macro>
] 2. verify the  login to MS console with valid/invalid values

4.when default authentication fails , user credentials are validated against external domain users credentials using lDAP

P2

Functional/Sanity

Pass

 

verfiythe Ldapauthentication by using
Query filter as email through UI

Pre-req:
1.create a user in AD and with email id
2.create cloudstack userwith same email id  and  with different password

1.Open the LDAP configuration Wizard(Navigate Global Setting-LdapConfiguration)
2.Provide valid values for displayed attributes In the wizard window(hostname,searchbase, queryfilter  AS  EMAIL
 binddn, bindpass : <password field>
 port)
3.Click On Ok button
4. verify the  login to MS console with valid/invalid values

when default authentication fails , user credentials are validated against external domain users credentials using lDAP  and it matches then login should be successful or else it should fail with proper error message.

P1

Functional/Sanity

Pass

 

verfiythe Ldapauthentication by using 
Query filter as displayName

1. create cloudstack user and make sure same  user exists in AD(Active directory)

2.call the  ldapconfig API with query filter as email ID
<ac:structured-macro ac:name="unmigrated-wiki-markup" ac:schema-version="1" ac:macro-id="3263d341c4bdfa51-91aaf5af-45d743cf-ae13b2b4-3815e274b436ca2e9a119b43"><ac:plain-text-body><![CDATA[eg:[http://localhost:8096/client/api?command=ldapConfig&hostname=ADHost&searchbase=DC%3Dhyd-qa&queryfilter=%28%26%28displayName%3D%25u%29%29&binddn=%22CN%3DAdministrator%2CCN%3DUsers%2CDC%3Dhyd-qa%22&bindpass=1111_aaaa&port=389&response=json
]]></ac:plain-text-body></ac:structured-macro>
] 3. verify the  login to MS console with valid/invalid values

when default authentication fails , user credentials are validated against external domain users credentials using lDAP  and it matches then login should be successful or else it should fail with proper error message.

P1

Functional

Pass

 

verfiythe Ldapauthentication by using 
Query filter as display name

1.create a user in AD and with email id
2.create cloudstack userwith same email id  and  with different password

3.call the  ldapconfig API with query filter as display name
eg:
<ac:structured-macro ac:name="unmigrated-wiki-markup" ac:schema-version="1" ac:macro-id="288ab6b4c3a177d7-0aedbd96-47fd459f-91b0a53f-891c5089263338a096dc3619"><ac:plain-text-body><![CDATA[[http://localhost:8096/client/api?command=ldapConfig&hostname=10.147.28.251&searchbase=DC%3Dhyd-qa1&queryfilter=(%26(displayName%3D%25u))&binddn=CN%3Dtest%20123%2CCN%3DUsers%2CDC%3Dhyd-qa&bindpass=aaaa&port=389&response=json
]]></ac:plain-text-body></ac:structured-macro>
]
4. verify the  login to MS console with valid/invalid values

when default authentication fails , user credentials are validated against external domain users credentials using lDAP  and it matches then login should be successful or else it should fail with proper error message.

P2

Functional

Pass

 

verfiythe Ldapauthentication on account belongs to specific organization under domain

1.create a user in AD and with email id
2.create cloudstack userwith same email id  and  with different password

3.call the  ldapconfig API with query filter as display name
eg:
<ac:structured-macro ac:name="unmigrated-wiki-markup" ac:schema-version="1" ac:macro-id="551d2f21e7e289be-cfac54eb-402e4ff0-a541b269-6ef5fb3221b2bdd18d2f4b37"><ac:plain-text-body><![CDATA[[http://localhost:8096/client/api?command=ldapConfig&hostname=ADHost&searchbase=OU%3Dcitrix%2COU%3DDomain%20Controllers%2CDC%3Dhyd-qa&queryfilter=%28%26%28mail%3D%25e%29%29&binddn=CN%3DAdministrator%2CCN%3DUsers%2CDC%3Dhyd-qa&port=389&bindpass=1111_aaaa&response=json
]]></ac:plain-text-body></ac:structured-macro>
]
4. verify the  login to MS console with valid/invalid values

4.when default authentication fails , user credentials are validated against external domain users credentials using lDAP

P2

Functional

Pass

 

check the logs and alerts for Ldap
related erros

1.perform ldapconfig
2.verify the logs  and alerts for ldap related to errors

No error should be shown while configuring with valid values and in invalid case it should through meaningful error message

P2

Sanity

Fail(CLOUDSTACK-1172)

 

Check the UI validation by not passing any value

1.Open the LDAP configuration Wizard(Navigate Global Setting-LdapConfiguration)

2.with out providing any values,Click on "Ok" button

UI should  alert the end user with required field to fill

P2

Functional/Negative

Pass

 

reset the password and check the authentication

Pre-req:
1.create a user in AD and with email id
2.create cloudstack userwith same email id  and  with different password
Steps:
1.call the  ldapconfig API with query filter as email ID
<ac:structured-macro ac:name="unmigrated-wiki-markup" ac:schema-version="1" ac:macro-id="e5aeeea18f5cc60d-2dc85aee-4b8c4bdc-bd5db625-f0f62d5c83d6f6d27c5faea5"><ac:plain-text-body><![CDATA[eg:[http://localhost:8096/client/api?command=ldapConfig&hostname=ADHost&searchbase=DC%3Dhyd-qa&queryfilter=(%26(mail%3D%25e))&port=389&response=json
]]></ac:plain-text-body></ac:structured-macro>
] 2. verify the  login to MS console with valid/invalid values
3.reset the Ldap user password from AD(Active directory)
4.Verify the Login  to MS console to newly changed passward

user credentials are validated against external domain users credentials using lDAP  and  login should be successful

P1

Functional

Pass

 

Check ldap creation with valid values from UI

1.Open the LDAP configuration Wizard(Navigate Global Setting-LdapConfiguration)
2.Provide valid values for displayed attributes In the wizard window(hostname,searchbase, queryfilter
 binddn, bindpass : <password field>
 port)
3.Click On Ok button

1)ldap should be configured successfully
2)on db, fields related ldap in the Configuration table should have  new assigned values.

P1

Functional

Pass

 

Check ldap creation with valid values from UI

1.Open the LDAP configuration Wizard(Navigate Global Setting-LdapConfiguration)
2.Provide valid values for displayed attributes In the wizard window(hostname,searchbase, queryfilter
 binddn, bindpass : <password field>
 port)
3.Click On Ok button

1)ldap should be configured successfully
2)on db, fields related ldap in the Configuration table should have  new assigned values

P1

Functional/Sanity

Pass

 

Verify LdapRemove functionality

Prereq:
make sure Ldap configured

steps:
1.remove the ldap configuration by calling ldapremove API
[http://localhost:8096/client/api?command=ldapRemove&response=json

\\Image Removed

]

ldap configuration should be removed successfully.

P1

Functional/Sanity

Pass