Open yonatan-dp opened 7 months ago
Successfully validated AC1.3 - when I use a non-existent CDX account, I receive the appropriate error message displayed that refers to the "create an account" link and I am not redirected to the OIDC provider.
After entering a CDX username that has been migrated, the text should instruct the user to click the button to proceed to login.gov/ EPA gateway. The current text makes it seem like the users are automatically being redirected. When entering a CDX username that has not been migrated yet, the text advises users to proceed to CDX, and the log in button text changes to "Proceed to CDX".
Issue: Unable to login to ECMPS dev with my non-org account (401 error) and organization (OIDC mismatch error).
Non-org account error and session id:
Org account error and correlation id:
After entering a CDX username that has been migrated, the text should instruct the user to click the button to proceed to login.gov/ EPA gateway. The current text makes it seem like the users are automatically being redirected. When entering a CDX username that has not been migrated yet, the text advises users to proceed to CDX, and the log in button text changes to "Proceed to CDX".
We probably need to have a wholistic discussion on the exact label/text content for all the different scenarios. The text/labels were copied from CDX for the different scenarios for the different policy values of SIGNIN, MIGRATE, SIGNUP.
@ibarra-michelle This looks like a variation on the concurrent sign-in scenario that Mike asked Chris (ICAM team about). That error is coming back from the OIDC provider and, at least in the second scenario, the OIDC provider thinks there is an existing session and it can't log you in to that session automatically because of a mismatch in your claims. I will send an email to Chris with the details.
Verified AC1.1, AC1.2, AC1.3, AC6.1, AC6.2, and AC6.3 on dev with non-EPA CDX accounts.
After discussing internally, logins to the dev/test/beta environments will be the way test these changes to the application.
User Story
As an EASEY user, I want to be able to login using the new ICAM login process So that I can perform my authorized actions in the EASEY system as usual.
Development Notes
• Update “User Name” label to “CDX User ID” • Remove “Password field” • Add “EPA User?” check box (optional; default to unchecked • Update form action to call sur/determinePolicy action
Acceptance Criteria:
1) Login Functionality
2) Token Refreshing Functionality
AC2.1: The application must automatically refresh the OIDC token before it expires without user intervention. AC2.2: The refreshed token should be valid, and user sessions must continue without requiring a re-login. AC2.3: If a token refresh fails, the user should be redirected to the login page with an appropriate error message.
3) Retrieving Organization Information for Users
AC3.1: The application must correctly fetch and display use information (first and last names) from the OIDC token claims post-login. AC3.2: Changes in organization information on the OIDC provider side should reflect in the application after a new login.
4) Token Validation
AC4.1: The application must validate OIDC tokens using the provider’s public keys to ensure they are genuine. AC4.2: Expired or tampered tokens should be rejected.
6) Login Scenarios for Different User Types Across Multiple Paths