Test Case Name |
Steps |
Expected Results |
Priority
(P1 | P2 |P3) |
Test Case Type( Sanity | Functional |
Negative) |
Status |
verify the ldapconfiguration Api
functionality with valid values |
1.create cloudstack user and make sure same user exists in AD(Active directory)
2.call the ldapconfig API with valid values
eg:[http://localhost:8096/client/api?command=ldapConfig&hostname=ADHost1&searchbase=DC%3Dhyd-qa&queryfilter=(%26(mail%3D%25e))&port=389&response=json
]
Note:Here ADHost is Active Directoy Hostname/IP address |
2.
a)ldap should be configured successfully
b)on db fields related ldap in the Configuration table should have new assigned values. |
P1 |
Functional/Sanity |
Pass |
Verify the ldapconfig API functionality
with invalid values |
1..call the ldapconfig API with in-valid values
eg:http://localhost:8096/client/api?command=ldapConfig&hostname=ADHost&searchbase=DC%3Dhyd-&queryfilter=(%26(mail%3D%25e))&port=389&response=json |
It should through proper error message |
P1 |
Functional |
Fail(CLOUDSTACK-1172) |
ldap creation with In-valid values from UI |
1.Open the LDAP configuration Wizard(Navigate Global Setting-LdapConfiguration)
2.Provide in-valid values for displayed attributes In the wizard window(hostname,searchbase, queryfilter
binddn, bindpass port)
3.Click On Ok button |
It should through proper error message |
P2 |
Funcational/Negative |
Pass(UI side validation happening but API levvel need to identify the when we pass invlid seach baxce values and return the proper response) so I am passing UI side testcase |
|
List LDAP configuration detaisl from UI |
1.Open the LDAP configuration Wizard(Navigate Global Setting-LdapConfiguration)
2.Provide valid values for displayed attributes In the wizard window(hostname,searchbase, queryfilter
binddn, bindpass >
port)
3.Click On Ok button
4. ON Select View list box,Select the "LDAP configuration" list item |
Newly configured LDAP details should be displayed properly |
|
Functional/Sanity |
Pass |
|
Verify the Ldapbind with simple
authentication |
Pre-req:
1.create a user in AD and with email id
2.create cloudstack userwith same email id and with different password
Steps:
1.call the ldapconfig API with query filter as email ID
eg:[http://localhost:8096/client/api?command=ldapConfig&hostname=ADHost&searchbase=DC%3Dhyd-qa&queryfilter=(%26(mail%3D%25e))&port=389&response=json
] 2. verify the login to MS console with valid/invalid values |
4.when default authentication fails , user credentials are validated against external domain users credentials using lDAP |
P1 |
Functional |
Pass |
|
Verify the Ldapbind with anonymous |
1.create a user in AD and with email id
2. perform the ldapconfig with anonymous
http://10.147.29.101:8096/client/api?command=ldapConfig&hostname=ADHost&searchbase=DC%3Dhyd-qa&queryfilter=(%26(uid%3D%25u))&port=389&response=json |
2.
a)ldap should be configured successfully
b)on db fields related ldap in the Configuration table should have new assigned values. |
P2 |
Functional |
Pass |
|
Verify LDAPBind with SSL from UI |
1.Open the LDAP configuration Wizard(Navigate Global Setting-LdapConfiguration)
2.Provide valid values for displayed attributes In the wizard window(hostname,searchbase, queryfilter
binddn, bindpass : <password field>
port)
3.Check the "SSL" check box and provide the values for "trust store" and truststrorepass" fields
3.Click On Ok button |
1)ldap should be configured successfully
2)on db fields related ldap in the Configuration table should have new assigned values |
P1 |
Functional |
Fail
ON UI side:raised a bug:CLOUDSTACK-1637 (case1)
from API level getting the following exception:simple bind failed: hyd-qa12:636; Caused by:java.lang.RuntimeException:
Unexpected error: java.security.InvalidAlgorithmParameterException:
the trustAnchors parameter must be non-empty |
|
verfiythe Ldapauthentication by using
Query filter as email through API |
Pre-req:
1.create a user in AD and with email id
2.create cloudstack userwith same email id and with different password
Steps:
1.call the ldapconfig API with query filter as email ID
eg:[http://localhost:8096/client/api?command=ldapConfig&hostname=ADHost&searchbase=DC%3Dhyd-qa&queryfilter=(%26(mail%3D%25e))&port=389&response=json
] 2. verify the login to MS console with valid/invalid values |
4.when default authentication fails , user credentials are validated against external domain users credentials using lDAP |
P2 |
Functional/Sanity |
Pass |
|
verfiythe Ldapauthentication by using
Query filter as email through UI |
Pre-req:
1.create a user in AD and with email id
2.create cloudstack userwith same email id and with different password
1.Open the LDAP configuration Wizard(Navigate Global Setting-LdapConfiguration)
2.Provide valid values for displayed attributes In the wizard window(hostname,searchbase, queryfilter AS EMAIL
binddn, bindpass : <password field>
port)
3.Click On Ok button
4. verify the login to MS console with valid/invalid values |
when default authentication fails , user credentials are validated against external domain users credentials using lDAP and it matches then login should be successful or else it should fail with proper error message. |
P1 |
Functional/Sanity |
Pass |
|
verfiythe Ldapauthentication by using
Query filter as displayName |
1. create cloudstack user and make sure same user exists in AD(Active directory)
2.call the ldapconfig API with query filter as email ID
eg:[http://localhost:8096/client/api?command=ldapConfig&hostname=ADHost&searchbase=DC%3Dhyd-qa&queryfilter=%28%26%28displayName%3D%25u%29%29&binddn=%22CN%3DAdministrator%2CCN%3DUsers%2CDC%3Dhyd-qa%22&bindpass=1111_aaaa&port=389&response=json
] 3. verify the login to MS console with valid/invalid values |
when default authentication fails , user credentials are validated against external domain users credentials using lDAP and it matches then login should be successful or else it should fail with proper error message. |
P1 |
Functional |
Pass |
|
verfiythe Ldapauthentication by using
Query filter as display name |
1.create a user in AD and with email id
2.create cloudstack userwith same email id and with different password
3.call the ldapconfig API with query filter as display name
eg:
[http://localhost:8096/client/api?command=ldapConfig&hostname=10.147.28.251&searchbase=DC%3Dhyd-qa1&queryfilter=(%26(displayName%3D%25u))&binddn=CN%3Dtest%20123%2CCN%3DUsers%2CDC%3Dhyd-qa&bindpass=aaaa&port=389&response=json
]
4. verify the login to MS console with valid/invalid values |
when default authentication fails , user credentials are validated against external domain users credentials using lDAP and it matches then login should be successful or else it should fail with proper error message. |
P2 |
Functional |
Pass |
|
verfiythe Ldapauthentication on account belongs to specific organization under domain |
1.create a user in AD and with email id
2.create cloudstack userwith same email id and with different password
3.call the ldapconfig API with query filter as display name
eg:
[http://localhost:8096/client/api?command=ldapConfig&hostname=ADHost&searchbase=OU%3Dcitrix%2COU%3DDomain%20Controllers%2CDC%3Dhyd-qa&queryfilter=%28%26%28mail%3D%25e%29%29&binddn=CN%3DAdministrator%2CCN%3DUsers%2CDC%3Dhyd-qa&port=389&bindpass=1111_aaaa&response=json
]
4. verify the login to MS console with valid/invalid values |
4.when default authentication fails , user credentials are validated against external domain users credentials using lDAP |
P2 |
Functional |
Pass |
|
check the logs and alerts for Ldap
related erros |
1.perform ldapconfig
2.verify the logs and alerts for ldap related to errors |
No error should be shown while configuring with valid values and in invalid case it should through meaningful error message |
P2 |
Sanity |
Fail(CLOUDSTACK-1172) |
|
Check the UI validation by not passing any value |
1.Open the LDAP configuration Wizard(Navigate Global Setting-LdapConfiguration)
2.with out providing any values,Click on "Ok" button |
UI should alert the end user with required field to fill |
P2 |
Functional/Negative |
Pass |
|
reset the password and check the authentication |
Pre-req:
1.create a user in AD and with email id
2.create cloudstack userwith same email id and with different password
Steps:
1.call the ldapconfig API with query filter as email ID
eg:[http://localhost:8096/client/api?command=ldapConfig&hostname=ADHost&searchbase=DC%3Dhyd-qa&queryfilter=(%26(mail%3D%25e))&port=389&response=json
] 2. verify the login to MS console with valid/invalid values
3.reset the Ldap user password from AD(Active directory)
4.Verify the Login to MS console to newly changed passward |
user credentials are validated against external domain users credentials using lDAP and login should be successful |
P1 |
Functional |
Pass |
|
Check ldap creation with valid values from UI |
1.Open the LDAP configuration Wizard(Navigate Global Setting-LdapConfiguration)
2.Provide valid values for displayed attributes In the wizard window(hostname,searchbase, queryfilter
binddn, bindpass : <password field>
port)
3.Click On Ok button |
1)ldap should be configured successfully
2)on db, fields related ldap in the Configuration table should have new assigned values. |
P1 |
Functional |
Pass |
|
Check ldap creation with valid values from UI |
1.Open the LDAP configuration Wizard(Navigate Global Setting-LdapConfiguration)
2.Provide valid values for displayed attributes In the wizard window(hostname,searchbase, queryfilter
binddn, bindpass : <password field>
port)
3.Click On Ok button |
1)ldap should be configured successfully
2)on db, fields related ldap in the Configuration table should have new assigned values |
P1 |
Functional/Sanity |
Pass |
|
Verify LdapRemove functionality |
Prereq:
make sure Ldap configured
steps:
1.remove the ldap configuration by calling ldapremove API
[http://localhost:8096/client/api?command=ldapRemove&response=json ] |
ldap configuration should be removed successfully. |
P1 |
Functional/Sanity |
Pass |
|