Test Case Name Steps

Download as xlsx, pdf, or txt
Download as xlsx, pdf, or txt
You are on page 1of 15

Test Case Name Steps

1.create cloudstack user and make sure same user exists


in AD(Active directory)
2.call the ldapconfig API with valid values
eg:http://localhost:8096/client/api?
command=ldapConfig&hostname=ADHost1&searchbase
=DC%3Dhyd-qa&queryfilter=(%26(mail%3D
%25e))&port=389&response=json

verify the ldapconfiguration Api Note:Here ADHost is Active Directoy Hostname/IP


functionality with valid values address
1.Open the LDAP configuration Wizard(Navigate Global
Setting-LdapConfiguration)
2.Provide valid values for displayed attributes In the
wizard window(hostname,searchbase, queryfilter
binddn, bindpass : <password field>
port)
3.Click On Ok button

Check ldap creation with valid values


from UI

1..call the ldapconfig API with in-valid values


eg:http://localhost:8096/client/api?
command=ldapConfig&hostname=ADHost&searchbase=
Verify the ldapconfig API functionality DC%3Dhyd-&queryfilter=(%26(mail%3D
with invalid values %25e))&port=389&response=json

1.Open the LDAP configuration Wizard(Navigate Global


Setting-LdapConfiguration)
2.Provide in-valid values for displayed attributes In the
wizard window(hostname,searchbase, queryfilter
ldap creation with In-valid values from binddn, bindpass port)
UI 3.Click On Ok button

1.Open the LDAP configuration Wizard(Navigate Global


Setting-LdapConfiguration)
2.Provide valid values for displayed attributes In the
wizard window(hostname,searchbase, queryfilter
binddn, bindpass >
port)
3.Click On Ok button
4. ON Select View list box,Select the "LDAP
List LDAP configuration detaisl from UI configuration" list item
Pre-req:
1.create a user in AD and with email id
2.create cloudstack userwith same email id and with
different password
Steps:
1.call the ldapconfig API with query filter as email ID
eg:http://localhost:8096/client/api?
command=ldapConfig&hostname=ADHost&searchbase=
DC%3Dhyd-qa&queryfilter=(%26(mail%3D
%25e))&port=389&response=json
Verify the Ldapbind with simple 2. verify the login to MS console with valid/invalid
authentication values

1.create a user in AD and with email id


2. perform the ldapconfig with anonymous
http://10.147.29.101:8096/client/api?
command=ldapConfig&hostname=ADHost&searchbase=
DC%3Dhyd-qa&queryfilter=(%26(uid%3D
Verify the Ldapbind with anonymous %25u))&port=389&response=json

Pre-req:
1.create a user in AD and with email id
2.create cloudstack userwith same email id and with
different password
Steps:
1.call the ldapconfig API+ssl + query filter as email ID
eg:
http://localhost:8096/client/api?
command=ldapConfig&hostname=ADHost&searchbase=
OU%3Dcitrix%2COU%3DDomain%20Controllers%2CDC
%3Dhyd-qa&queryfilter=(%26(mail%3D
%25e))&binddn=CN%3DAdministrator%2CCN%3DUsers
%2CDC%3Dhyd-
qa&bindpass=1111_aaaa&port=636&ssl=true&truststor
e=%2Fusr%2Fshare%2Fcloud%2Fmanagement%2Fconf
%2Fhyd-
qa.ks&truststorepass=1111_aaaa&response=json
2. verify the login to MS console with valid/invalid
Verify the Ldapbind with ssl values
1.Open the LDAP configuration Wizard(Navigate Global
Setting-LdapConfiguration)
2.Provide valid values for displayed attributes In the
wizard window(hostname,searchbase, queryfilter
binddn, bindpass : <password field>
port)
3.Check the "SSL" check box and provide the values for
"trust store" and truststrorepass" fields
Verify LDAPBind with SSL from UI 3.Click On Ok button

Pre-req:
1.create a user in AD and with email id
2.create cloudstack userwith same email id and with
different password
Steps:
1.call the ldapconfig API with query filter as email ID
eg:http://localhost:8096/client/api?
command=ldapConfig&hostname=ADHost&searchbase=
DC%3Dhyd-qa&queryfilter=(%26(mail%3D
%25e))&port=389&response=json
verfiythe Ldapauthentication by using 2. verify the login to MS console with valid/invalid
Query filter as email through API values

Pre-req:
1.create a user in AD and with email id
2.create cloudstack userwith same email id and with
different password

1.Open the LDAP configuration Wizard(Navigate Global


Setting-LdapConfiguration)
2.Provide valid values for displayed attributes In the
wizard window(hostname,searchbase, queryfilter AS
EMAIL
binddn, bindpass : <password field>
port)
3.Click On Ok button
verfiythe Ldapauthentication by using 4. verify the login to MS console with valid/invalid
Query filter as email through UI values
1. create cloudstack user and make sure same user
exists in AD(Active directory)

2.call the ldapconfig API with query filter as email ID


eg:http://localhost:8096/client/api?
command=ldapConfig&hostname=ADHost&searchbase=
DC%3Dhyd-qa&queryfilter=%28%26%28uid%3D%25u
%29%29&binddn=%22CN%3DAdministrator%2CCN
%3DUsers%2CDC%3Dhyd-qa
%22&bindpass=1111_aaaa&port=389&response=json
verfiythe Ldapauthentication by using 3. verify the login to MS console with valid/invalid
Query filter as user ID values

1.create a user in AD and with email id


2.create cloudstack userwith same email id and with
different password

3.call the ldapconfig API with query filter as display


name
eg:
http://localhost:8096/client/api?
command=ldapConfig&hostname=10.147.28.251&searc
hbase=DC%3Dhyd-qa1&queryfilter=(%26(displayName
%3D%25u))&binddn=CN%3Dtest%20123%2CCN
%3DUsers%2CDC%3Dhyd-
qa&bindpass=aaaa&port=389&response=json
verfiythe Ldapauthentication by using 4. verify the login to MS console with valid/invalid
Query filter as display name values
1.create a user in AD and with email id
2.create cloudstack userwith same email id and with
different password

3.call the ldapconfig API with query filter as display


name
eg:
http://localhost:8096/client/api?
command=ldapConfig&hostname=ADHost&searchbase=
OU%3Dcitrix%2COU%3DDomain%20Controllers%2CDC
%3Dhyd-qa&queryfilter=%28%26%28mail%3D%25e
%29%29&binddn=CN%3DAdministrator%2CCN%3DUsers
%2CDC%3Dhyd-
qa&port=389&bindpass=1111_aaaa&response=json
verfiythe Ldapauthentication on
account belongs to specific 4. verify the login to MS console with valid/invalid
organization under domain values

check the logs and alerts for Ldap 1.perform ldapconfig


related erros 2.verify the logs and alerts for ldap related to errors

1.Open the LDAP configuration Wizard(Navigate Global


Setting-LdapConfiguration)
Check the UI validation by not passing
any value 2.with out providing any values,Click on "Ok" button
Priority
Expected Results (P1 | P2 |P3)

2.
a)ldap should be configured successfully
b)on db fields related ldap in the
Configuration table should have new
assigned values. P1

1)ldap should be configured successfully


2)on db, fields related ldap in the
Configuration table should have new
assigned values. P1

It should through proper error message


P1

It should through proper error message P2

Newly configuread LDAP details should be


displayed properly
4.when default authentication fails , user
credentials are validated against external
domain users credentials using lDAP P1

2.
a)ldap should be configured successfully
b)on db fields related ldap in the
Configuration table should have new
assigned values.
P2

4.when default authentication fails , user


credentials are validated against external
domain users credentials using lDAP P1
1)ldap should be configured successfully
2)on db fields related ldap in the
Configuration table should have new
assigned values P1

4.when default authentication fails , user


credentials are validated against external
domain users credentials using lDAP P2

when default authentication fails , user


credentials are validated against external
domain users credentials using lDAP and
it maches then login should be successful
or else it should fail with proper error
message. P1
when default authentication fails , user
credentials are validated against external
domain users credentials using lDAP and
it maches then login should be successful
or else it should fail with proper error
message. P1

when default authentication fails , user


credentials are validated against external
domain users credentials using lDAP and
it maches then login should be successful
or else it should fail with proper error
message. P2
4.when default authentication fails , user
credentials are validated against external
domain users credentials using lDAP P2

No error should be shown while


configuring with valid values and in invalid
case it should through meanigful error
message P2

dialogue window should promt with


proper error meesage P2
Execution Executed on Reviewed Status Comment
Test Case Type( Sanity | Functional | Time Release By s
Negative)

Functional/Sanity

Functional/Sanity

Functional

Funcational/Negative

Functional/Sanity
Functional

Functional

Functional
Funational

Functional/Sanity

Functional/Sanity
Functional

Functional
Functional

Sanity

Functional/Negative

You might also like