Run the tests below with freeotp and/or google authenticator. Optionally also some tests with another app.
Test Case
Expected Result
Result
Related Comment
Enable the app.
No problems found.
:heavy_check_mark:
Using a non admin user user1, enable totp in the personal settings, security. Having the app freeotp (android or ios) scan the QR code provided and set it up. Login using user1, get a new code in the freeotp app. Introduce it in the login view. Login.
User1 is asked the code during login and login succeeds.
:heavy_check_mark:
Using a non admin user user1, enable totp in the personal settings. Having the app freeotp (android or ios) scan the QR code provided - enter a random verification code
code is not verified
:heavy_check_mark:
Using a non admin user user1, enable totp in the personal settings. Having the app freeotp (android or ios) scan the QR code provided and set it up. Login using user1, get a new code in the freeotp app. Introduce it in the login view. Login. Logout. Login again using same code
User1 cannot login without a new code
:heavy_check_mark:
Using users user1 & user2, enable totp and set it up in the personal settings. Login using user1, get a new code in the freeotp app for user2. Introduce it in the login view. Login.
user1 cannot login
:heavy_check_mark:
Using users user1, enable totp and set it up in the personal settings. Login using user1, totp. Disable TOTP in the personal settings of user1. Login again
user1 can login without TOTP token
:heavy_check_mark:
Using users user1, enable totp and set it up in the personal settings. Login using user1, totp. Disable TOTP in the personal settings of user1 Enable it again, set it up scanning the new QR code.
new verification code is accepted
:heavy_check_mark:
Using users user1, enable totp and set it up in the personal settings. Login using user1, totp. Disable TOTP in the personal settings of user1 Enable it again, do not scan the new QR code but use a current code from the first setup to verify
code is not accepted
:heavy_check_mark:
Using a non admin user user1, enable totp in the personal settings. Having the app freeotp (android or ios) scan the QR code provided and set it up. Try to login with user1 using his password. When the totp input appears introduce random numbers, emojis, negative numbers and empty string.
User1 cannot login in any of this situations.
:heavy_check_mark:
Using a LDAP user ldap_user, enable totp in the personal settings. Having the app freeotp (android or ios) scan the QR code provided and set it up. Login using ldap_user, get a new code in the freeotp app. Introduce it in the login view. Login.
User_ldap can login without problems.
:kangaroo:
Using a non admin user user1, enable totp in the personal settings. Having the app google authenticator (android or ios) scan the QR code provided and set it up. Login using user1, get a new code in the google authenticator app. Introduce it in the login view. Login.
User1 can login without problems.
:heavy_check_mark:
Using a non admin user user1, enable totp in the personal settings. Having the app google authenticator (android or ios) set up the account in the app using the TOTP secret key. Login using user1, get a new code in the google authenticator app. Introduce it in the login view. Login.
User1 can login without problems.
:heavy_check_mark:
CLI
Test 1/2 Having a user 'user1' with a working enabled two factor authentication, use the CLI command to disable it twofactorauth:disable
'user1' now can login without using 2FA
:heavy_check_mark:
Test 2/2 Use the CLI command twofactorauth:enable to enable again 2FA for 'user1'
'user1' has to use 2FA mandatory to login
:heavy_check_mark:
Browsers
Check the login process is possible using chrome
:heavy_check_mark:
Check the login process is possible using firefox
:heavy_check_mark:
Check the login process is possible using edge
:heavy_check_mark:
Check the login process is possible using internet explorer 11
Setup
Twofactor TOTP Test Plan
Run the tests below with freeotp and/or google authenticator. Optionally also some tests with another app.
Having the app freeotp (android or ios) scan the QR code provided and set it up.
Login using user1, get a new code in the freeotp app. Introduce it in the login view. Login.
Having the app freeotp (android or ios) scan the QR code provided - enter a random verification code
Having the app freeotp (android or ios) scan the QR code provided and set it up.
Login using user1, get a new code in the freeotp app. Introduce it in the login view. Login. Logout. Login again using same code
Login using user1, get a new code in the freeotp app for user2. Introduce it in the login view. Login.
Login using user1, totp.
Disable TOTP in the personal settings of user1. Login again
Login using user1, totp.
Disable TOTP in the personal settings of user1
Enable it again, set it up scanning the new QR code.
Login using user1, totp.
Disable TOTP in the personal settings of user1
Enable it again, do not scan the new QR code but use a current code from the first setup to verify
Having the app freeotp (android or ios) scan the QR code provided and set it up.
Try to login with user1 using his password. When the totp input appears introduce random numbers, emojis, negative numbers and empty string.
Having the app freeotp (android or ios) scan the QR code provided and set it up.
Login using ldap_user, get a new code in the freeotp app. Introduce it in the login view. Login.
Having the app google authenticator (android or ios) scan the QR code provided and set it up.
Login using user1, get a new code in the google authenticator app. Introduce it in the login view. Login.
Having the app google authenticator (android or ios) set up the account in the app using the TOTP secret key.
Login using user1, get a new code in the google authenticator app. Introduce it in the login view. Login.