Test Case Name | Steps | Expected Results | Priority (P1 | P2 |P3) | Test Case Type( Sanity | Functional | Negative) | Execution Time | Executed on Release | Reviewed By | Status Comments |
verify the ldapconfiguration Api functionality with valid values | 1.create cloudstack user and make sure same user exists in AD(Active directory) 2.call the ldapconfig API with valid values eg:[http://localhost:8096/client/api?command=ldapConfig&hostname=ADHost1&searchbase=DC%3Dhyd-qa&queryfilter=(%26(mail%3D%25e))&port=389&response=json \\ Image Removed ] Note:Here ADHost is Active Directoy Hostname/IP address
| 2. a)ldap should be configured successfully b)on db fields related ldap in the Configuration table should have new assigned values. | P1 | Functional/Sanity | | | | Pass | |
Check ldap creation with valid values from UI | 1.Open the LDAP configuration Wizard(Navigate Global Setting-LdapConfiguration) 2.Provide valid values for displayed attributes In the wizard window(hostname,searchbase, queryfilter binddn, bindpass : <password field> port) 3.Click On Ok button
|
1)ldap should be configured successfully 2)on db , fields related ldap in the Configuration table should have new assigned values. | P1 | Functional/Sanity | | | | Pass |
Verify the ldapconfig API functionality with invalid values | 1..call the ldapconfig API with in-valid values eg:http://localhost:8096/client/api?command=ldapConfig&hostname=ADHost&searchbase=DC%3Dhyd-&queryfilter=(%26(mail%3D%25e))&port=389&response=json Image Removed | It should through proper error message
| P1 | Functional | | | | Fail(CLOUDSTACK-1172)
|
ldap creation with In-valid values from UI | 1.Open the LDAP configuration Wizard(Navigate Global Setting-LdapConfiguration) 2.Provide in-valid values for displayed attributes In the wizard window(hostname,searchbase, queryfilter binddn, bindpass port) 3.Click On Ok button | It should through proper error message | P2 | Funcational/Negative | | | | Pass(UI side validation happening but API levvel need to identify the when we pass invlid seach baxce values and return the proper response) so I am passing UI side testcase Fail(CLOUDSTACK-1398)
| |
List LDAP configuration detaisl from UI | 1.Open the LDAP configuration Wizard(Navigate Global Setting-LdapConfiguration) 2.Provide valid values for displayed attributes In the wizard window(hostname,searchbase, queryfilter binddn, bindpass > port) 3.Click On Ok button 4. ON Select View list box,Select the "LDAP configuration" list item | Newly configuread configured LDAP details should be displayed properly | | Functional/Sanity | | | | Pass | |
Verify the Ldapbind with simple authentication | Pre-req: 1.create a user in AD and with email id 2.create cloudstack userwith same email id and with different password Steps: 1.call the ldapconfig API with query filter as email ID eg:[http://localhost:8096/client/api?command=ldapConfig&hostname=ADHost&searchbase=DC%3Dhyd-qa&queryfilter=(%26(mail%3D%25e))&port=389&response=json \\ Image Removed ] 2. verify the login to MS console with valid/invalid values
| 4.when default authentication fails , user credentials are validated against external domain users credentials using lDAP | P1 | Functional | | | | Pass | |
Verify the Ldapbind with anonymous | 1.create a user in AD and with email id 2. perform the ldapconfig with anonymous http://10.147.29.101:8096/client/api?command=ldapConfig&hostname=ADHost&searchbase=DC%3Dhyd-qa&queryfilter=(%26(uid%3D%25u))&port=389&response=json Image Removed | 2. a)ldap should be configured successfully b)on db fields related ldap in the Configuration table should have new assigned values.
| P2 | Functional | | | | Pass | | | | | | | | | | | |
Verify LDAPBind with SSL from UI | 1.Open the LDAP configuration Wizard(Navigate Global Setting-LdapConfiguration) 2.Provide valid values for displayed attributes In the wizard window(hostname,searchbase, queryfilter binddn, bindpass : <password field> port) 3.Check the "SSL" check box and provide the values for "trust store" and truststrorepass" fields 3.Click On Ok button | 1)ldap should be configured successfully 2)on db fields related ldap in the Configuration table should have new assigned values | P1 | Functional
| Funational | | | | Fail ON UI side:raised a bug:CLOUDSTACK-1637 (case1) from API level getting the following exception:simple bind failed: hyd-qa12:636; Caused by:java.lang.RuntimeException: Unexpected error: java.security.InvalidAlgorithmParameterException: the trustAnchors parameter must be non-empty | |
verfiythe Ldapauthentication by using Query filter as email through API | Pre-req: 1.create a user in AD and with email id 2.create cloudstack userwith same email id and with different password Steps: 1.call the ldapconfig API with query filter as email ID eg:[http://localhost:8096/client/api?command=ldapConfig&hostname=ADHost&searchbase=DC%3Dhyd-qa&queryfilter=(%26(mail%3D%25e))&port=389&response=json \\ Image Removed ] 2. verify the login to MS console with valid/invalid values
| 4.when default authentication fails , user credentials are validated against external domain users credentials using lDAP | P2 | Functional/Sanity | | | | Pass | |
verfiythe Ldapauthentication by using Query filter as email through UI | Pre-req: 1.create a user in AD and with email id 2.create cloudstack userwith same email id and with different password
1.Open the LDAP configuration Wizard(Navigate Global Setting-LdapConfiguration) 2.Provide valid values for displayed attributes In the wizard window(hostname,searchbase, queryfilter AS EMAIL binddn, bindpass : <password field> port) 3.Click On Ok button 4. verify the login to MS console with valid/invalid values | when default authentication fails , user credentials are validated against external domain users credentials using lDAP and it maches matches then login should be successful or else it should fail with proper error message. | P1 | Functional/Sanity | | | | Pass | |
verfiythe Ldapauthentication by using Query filter as displayName | 1. create cloudstack user and make sure same user exists in AD(Active directory)
2.call the ldapconfig API with query filter as email ID eg:[http://localhost:8096/client/api?command=ldapConfig&hostname=ADHost&searchbase=DC%3Dhyd-qa&queryfilter=%28%26%28displayName%3D%25u%29%29&binddn=%22CN%3DAdministrator%2CCN%3DUsers%2CDC%3Dhyd-qa%22&bindpass=1111_aaaa&port=389&response=json \\ Image Removed ] 3. verify the login to MS console with valid/invalid values
| when default authentication fails , user credentials are validated against external domain users credentials using lDAP and it maches matches then login should be successful or else it should fail with proper error message. | P1 | Functional | | | | Pass | |
verfiythe Ldapauthentication by using Query filter as display name | 1.create a user in AD and with email id 2.create cloudstack userwith same email id and with different password
3.call the ldapconfig API with query filter as display name eg: [http://localhost:8096/client/api?command=ldapConfig&hostname=10.147.28.251&searchbase=DC%3Dhyd-qa1&queryfilter=(%26(displayName%3D%25u))&binddn=CN%3Dtest%20123%2CCN%3DUsers%2CDC%3Dhyd-qa&bindpass=aaaa&port=389&response=json \\ Image Removed ] 4. verify the login to MS console with valid/invalid values
| when default authentication fails , user credentials are validated against external domain users credentials using lDAP and it maches matches then login should be successful or else it should fail with proper error message. | P2 | Functional | | | | Pass | |
verfiythe Ldapauthentication on account belongs to specific organization under domain | 1.create a user in AD and with email id 2.create cloudstack userwith same email id and with different password
3.call the ldapconfig API with query filter as display name eg: [http://localhost:8096/client/api?command=ldapConfig&hostname=ADHost&searchbase=OU%3Dcitrix%2COU%3DDomain%20Controllers%2CDC%3Dhyd-qa&queryfilter=%28%26%28mail%3D%25e%29%29&binddn=CN%3DAdministrator%2CCN%3DUsers%2CDC%3Dhyd-qa&port=389&bindpass=1111_aaaa&response=json \\ Image Removed ] 4. verify the login to MS console with valid/invalid values
| 4.when default authentication fails , user credentials are validated against external domain users credentials using lDAP | P2 | Functional | | | | Pass | |
check the logs and alerts for Ldap related erros | 1.perform ldapconfig 2.verify the logs and alerts for ldap related to errors | No error should be shown while configuring with valid values and in invalid case it should through meanigful meaningful error message | P2 | Sanity | | | | Fail(CLOUDSTACK-1172) | |
Check the UI validation by not passing any value | 1.Open the LDAP configuration Wizard(Navigate Global Setting-LdapConfiguration)
2.with out providing any values,Click on "Ok" button | UI should alert the end user with required field to fill | P2 | Functional/Negative | | | | Pass | |
reset the password and check the authentication | Pre-req: 1.create a user in AD and with email id 2.create cloudstack userwith same email id and with different password Steps: 1.call the ldapconfig API with query filter as email ID eg:[http://localhost:8096/client/api?command=ldapConfig&hostname=ADHost&searchbase=DC%3Dhyd-qa&queryfilter=(%26(mail%3D%25e))&port=389&response=json \\ Image Removed ] 2. verify the login to MS console with valid/invalid values 3.reset the Ldap user password from AD(Active directory) 4.Verify the Login to MS console to newly changed passward
| user credentials are validated against external domain users credentials using lDAP and login should be successful | P1 | Functional
| Funcational | | | | Pass | |