Closed aaujayasena closed 7 months ago
similor issue : https://github.com/wso2/product-is/issues/18287
Reported issues, https://github.com/wso2/product-is/issues?q=is%3Aissue+is%3Aopen++label%3AComponent%2FSAML+label%3ASeverity%2FCritical
Test completed with ,
Title | Description | DB: PostgressBuild : 5005JDBCJava17Fireforx |
---|---|---|
Enusre user can create SAML application in Manual base | Register WSO2 sample application using manual option. Use this option to manually specify the required SAML configurations. | Passed |
Ensure user can create SAML application File Based | Register SAML sample application using File Based option. Here use Upload Metadata File option. Upload a Service Provider's SAML metadata file with the required configurations. MetaDataFile | Passed |
Ensure user can update added metadata file when creating SAML application via File Based | Register SAML sample application application using File Based option. Remove added metadata file Browse below URL and download the SAML application's metadata fileMetaDataFile | Passed |
User attempt to create file based SAML application and metadata file is unavailable. | Register SAML sample application application using File Based option without Metadata file | Passed |
Ensure user can create SAML application URL Based | Register SAML sample application application using URL Based option. | Passed |
User attempt to create SAML application URL Based - without URL | Try to register SAML sample application application without using meta URL | Passed |
User attempt to register SAML application using existing name | Register SAML application using the name of a previously created application.Aplicable for both WSO2 samples | Passed |
User attempt to register Register SAML application using existing Issuer value | Register SAML application using before created SAML application's Issuer valueAplicable for both WSO2 samples | Passed |
Ensure user can register SAML application using multiple Assertion Consumer URLs | Adding multiple assertion consumer URLs for the application Aplicable for both WSO2 samples | Passed |
User attempt to register SAML application using Invalid name | Register application using invalid characters ex: !@#$%@Aplicable for both WSO2 samples | Passed |
Ensure user can Delete Application | There is a delete icon in the every single application in the application section. Click this icon and delete created sample applicationAplicable for both WSO2 samples | Passed |
Ensure user Integrate with external sample app | Integrate with SAML sample {Ex: saml2-web-app-pickup-dispatch,saml2-web-app-pickup-manager } | Passed |
Try out WSO2 sample application | Try out the integrated WSO2 sample application | Passed |
Search operation on created applications - filter starts with | Tenant admin do advanced search operation created 3 SAML applications. The filter type should be start with | Passed |
Search operation on created applications - filter starts with(negative case) | Tenant admin do advanced search operation created 3 SAML applications. The filter type should be start with (negative case) | Passed |
Search operation on created applications - filter Ends with | Tenant admin do advanced search operation created 3 SAML applications. The filter type should be Ends with | Passed |
Search operation on created applications - filter Ends with (negative case) | Tenant admin do advanced search operation created 3 SAML applications. The filter type should be Ends with (negative case) | Passed |
Search operation on created applications - filter Contains | Tenant admin do advanced search operation created 3 SAML applications. The filter type should be Contains | Passed |
Search operation on created applications - filter Contains (negative case) | Tenant admin do advanced search operation created 3 SAML applications. The filter type should be Contains (negative case) | Passed |
Search operation on created applications - filter Equals | Tenant admin do advanced search operation created 3 SAML applications. The filter type should be Equals | Passed |
Search operation on created applications - filter Equals (negative case) | Tenant admin do advanced search operation created 3 SAML applications. The filter type should be Equals (negative case) | Passed |
Enusre user can create SAML application in Manual base | Register WSO2 sample application using manual option. Use this option to manually specify the required SAML configurations. | Passed |
Ensure user can create SAML application File Based | Register SAML sample application using File Based option. Here use Upload Metadata File option. Upload a Service Provider's SAML metadata file with the required configurations. MetaDataFile | Passed |
Ensure user can update added metadata file when creating SAML application via File Based | Register SAML sample application application using File Based option. Remove added metadata file Browse below URL and download the SAML application's metadata fileMetaDataFile | Passed |
User attempt to create file based SAML application and metadata file is unavailable. | Register SAML sample application application using File Based option without Metadata file | Passed |
Ensure user can create SAML application URL Based | Register SAML sample application application using URL Based option. | Passed |
User attempt to create SAML application URL Based - without URL | Try to register SAML sample application application without using meta URL | Passed |
User attempt to register SAML application using existing name | Register SAML application using the name of a previously created application.Aplicable for both WSO2 samples | Passed |
User attempt to register Register SAML application using existing Issuer value | Register SAML application using before created SAML application's Issuer valueAplicable for both WSO2 samples | Passed |
Ensure user can register SAML application using multiple Assertion Consumer URLs | Adding multiple assertion consumer URLs for the application Aplicable for both WSO2 samples | Passed |
User attempt to register SAML application using Invalid name | Register application using invalid characters ex: !@#$%@Aplicable for both WSO2 samples | Passed |
Ensure user can Delete Application | There is a delete icon in the every single application in the application section. Click this icon and delete created sample applicationAplicable for both WSO2 samples | Passed |
Ensure user Integrate with external sample app | Integrate with SAML sample {Ex: saml2-web-app-pickup-dispatch,saml2-web-app-pickup-manager } | Passed |
Try out WSO2 sample application | Try out the integrated WSO2 sample application | Passed |
Search operation on created applications - filter starts with | Tenant admin do advanced search operation created 3 SAML applications. The filter type should be start with | Passed |
Search operation on created applications - filter starts with(negative case) | Tenant admin do advanced search operation created 3 SAML applications. The filter type should be start with (negative case) | Passed |
Search operation on created applications - filter Ends with | Tenant admin do advanced search operation created 3 SAML applications. The filter type should be Ends with | Passed |
Search operation on created applications - filter Ends with (negative case) | Tenant admin do advanced search operation created 3 SAML applications. The filter type should be Ends with (negative case) | Passed |
Search operation on created applications - filter Contains | Tenant admin do advanced search operation created 3 SAML applications. The filter type should be Contains | Passed |
Search operation on created applications - filter Contains (negative case) | Tenant admin do advanced search operation created 3 SAML applications. The filter type should be Contains (negative case) | Passed |
Search operation on created applications - filter Equals | Tenant admin do advanced search operation created 3 SAML applications. The filter type should be Equals | Passed |
Search operation on created applications - filter Equals (negative case) | Tenant admin do advanced search operation created 3 SAML applications. The filter type should be Equals (negative case) | Passed |
Ensure Application can be cofigure as Discoverable applications | Configure Discoverable applications. Customers can access this application from the My Account portal.Aplicable for both WSO2 sample sample | Passed |
User attempt to enable Discoverable application without adding Access URL | Enable discoverable application and try to update without adding access URL. Aplicable for both WSO2 sample sample | Passed |
User attempt to update Access URL without using URL | Update Access URL without using URL. Aplicable for both WSO2 sample sampleex : application.com | Passed |
Ensure user can add logo for the created SAML application | Add image for created application | Passed |
User attempt to update the created application Issuer | Try to update issuer after registered the application. Aplicable for WSO2 sample | Passed |
User configure mulitiple Assertion Consumer URLs and set Default assertion consumer URL | Add multiple Assertion Consumer URLs and set one of URLs as a Default ACS URL Aplicable for WSO2 sample | Passed |
User attempt to add Invalid Assertion URL | Add invalid Asserion Consumer URL to the application Assertion consumer service URLs input field. Aplicable for WSO2 sample | Passed |
Ensure user can update the Idp entityId alias | Update correct URL/URI for IdP entity ID alias Support for both WSO2 sample applications | Passed |
User attempt to add Idp entityId alias with Invalid URL | Add an invalid URL for the Idp entityId alias. This URL does not match the IdP metadata file entityID value. | Passed |
User attempt to add Idp entityId alias with Invalid value | Input invalid value for IdP entity ID alias (Not an URL). Support WSO2 sample | Passed |
Ensure user can upload Certificate | Upload SP public certificate. Support WSO2 samples | Passed |
Ensure user can add Certificate with Paste option | Paste SP public certificate. Support for both WSO2 | |
User attempt to paste certifcate with invalid content | Paste SP public certificate. Support for WSO2 samples | Passed |
Ensure user can Change Certificate | After adding a new certificate user can change the added certificate. Support WSO2 samples | Passed |
Ensure user can View Added Certificate | After adding a cert user can view the added cert details. Support for WSO2 samples | Passed |
Ensure user can Delete Certificate | Delete before added certificate. Support WSO2 samples | Passed |
User attepmt to Delete Certificate when enabled request signature or assertion encryption. | User attempt to delete certificate when the enable request signature. | Passed |
User attepmt to Delete Certificate when enable assertion encryption. | User attempt to delete certificate when the enable assertion encryption. | Passed |
User attempt to authenticate while request validation fail | Verify request validation fail due to invalid certifcation | Passed |
Ensure user can auneticate to the SAML application while enable the Request signature validation | User can login to application while Enable request signature validation using WSO2 sample application | Passed |
Ensure user can authenticate to the application with enable Response Signing | Enable Response Signing with default Digest algorithm and Signing algorithm. WSO2 sample | Passed |
Ensure user can authenticate to the application with enable Response Signing | Enable Response Signing and authenticate to the application. Support WSO2 sample | Passed |
Ensure user can enable Artifact binding and SSO with application | Enable Artifact binding SSO to SAML application | Failed |
Ensure user can Enable IDP initiated SSO | Enable IdP initiated SSO The Request URL is used by the IDP to forward the users directly to the service provider. WSO2 sample application | Passed |
Ensure user can configure NameID format | User update the nameId format | Passed |
Ensure user can authenticate to Audiences | Check default audiences value. The issuer of the application will be added as the default audience | Passed |
Assertion - add values for audience | Add values for audience | |
Assertion - Recipients | Check default Recipients value. By default, Asgardeo sends ACS URL as the recipient value. | |
Assertion - Add values for Recipients | Add valuees for Recipients | |
Disable Enable encryption | Enable encryption must be disabled until the certificate is uploaded | |
Enable Encryption | Enable assertion encryption | |
Enable Encryption | Enable encryption with default Assertion encryption algorithm and default Key encryption algorithm | |
Single Logout Profile | Enable single logout using Back Channel method with Wso2 application | Passed |
Single Logout Profile | Enable single logout using Front-Channel Logout HTTP POST Binding method with Spring sample application | Passed |
Single Logout Profile | Enable single logout using Front Channel HTTP Redirect Binding method with Spring sample application | Passed |
Single Logout Profile | Enable single logout with WSO2 sample application | |
Attribute Profile | Enable the attribute profile for SAML apps without configured the user attributes in user attributes section | |
Attribute Profile | Enable the attribute profile for SAML apps | |
Attribute Profile | Unable the attribute profile | |
IdP initiated single logout | Identity server initiated single logout to the application | |
IdP initiated single logout | Identity server initiated single logout to the application and add return URL to which the user redirected after the logout |
This is completed with the effort https://github.com/wso2/product-is/issues/18348#issuecomment-1893131455. If required to test on future builds, it can be address with different issue. Closing the issue.
Is your suggestion a test requirement/change or improvements of the test framework? Please describe.
Describe the solution you would prefer
Optional Fields
Additional context
Related Issues: