Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

[SAML] Verify SAML flows #18348

Closed
aaujayasena opened this issue Dec 3, 2023 · 4 comments
Closed

[SAML] Verify SAML flows #18348

aaujayasena opened this issue Dec 3, 2023 · 4 comments
Assignees
Labels
DB/postgres postgres DB related Issues will be tracked under this label. Fixed/7.0.0 QA/Task Type/Test Issues requesting tests

Comments

@aaujayasena
Copy link
Contributor

Is your suggestion a test requirement/change or improvements of the test framework? Please describe.

Describe the solution you would prefer

Optional Fields

Additional context

Related Issues:

@aaujayasena aaujayasena added Type/Test Issues requesting tests DB/postgres postgres DB related Issues will be tracked under this label. labels Dec 3, 2023
@aaujayasena aaujayasena self-assigned this Dec 3, 2023
@aaujayasena
Copy link
Contributor Author

aaujayasena commented Dec 4, 2023

  • SAML application creation -Manual
  • SAML application creation - Filebase
  • SAML application creation -urlbase
  • SSO
  • SLO

@aaujayasena
Copy link
Contributor Author

similor issue : #18287

@aaujayasena
Copy link
Contributor Author

aaujayasena commented Jan 16, 2024

Reported issues, https://github.com/wso2/product-is/issues?q=is%3Aissue+is%3Aopen++label%3AComponent%2FSAML+label%3ASeverity%2FCritical

Test completed with ,

Title Description DB: PostgressBuild : 5005JDBCJava17Fireforx
Enusre user can create SAML application in Manual base Register WSO2 sample application using manual option. Use this option to manually specify the required SAML configurations. Passed
Ensure user can create SAML application File Based Register SAML sample application using File Based option. Here use Upload Metadata File option. Upload a Service Provider's SAML metadata file with the required configurations. MetaDataFile Passed
Ensure user can update added metadata file when creating SAML application via File Based Register SAML sample application application using File Based option. Remove added metadata file Browse below URL and download the SAML application's metadata fileMetaDataFile Passed
User attempt to create file based SAML application and metadata file is unavailable. Register SAML sample application application using File Based option without Metadata file Passed
Ensure user can create SAML application URL Based Register SAML sample application application using URL Based option. Passed
User attempt to create SAML application URL Based - without URL Try to register SAML sample application application without using meta URL Passed
User attempt to register SAML application using existing name Register SAML application using the name of a previously created application.Aplicable for both WSO2 samples Passed
User attempt to register Register SAML application using existing Issuer value Register SAML application using before created SAML application's Issuer valueAplicable for both WSO2 samples Passed
Ensure user can register SAML application using multiple Assertion Consumer URLs Adding multiple assertion consumer URLs for the application Aplicable for both WSO2 samples Passed
User attempt to register SAML application using Invalid name Register application using invalid characters ex: !@#$%@aplicable for both WSO2 samples Passed
Ensure user can Delete Application There is a delete icon in the every single application in the application section. Click this icon and delete created sample applicationAplicable for both WSO2 samples Passed
Ensure user Integrate with external sample app Integrate with SAML sample {Ex: saml2-web-app-pickup-dispatch,saml2-web-app-pickup-manager } Passed
Try out WSO2 sample application Try out the integrated WSO2 sample application Passed
Search operation on created applications - filter starts with Tenant admin do advanced search operation created 3 SAML applications. The filter type should be start with Passed
Search operation on created applications - filter starts with(negative case) Tenant admin do advanced search operation created 3 SAML applications. The filter type should be start with (negative case) Passed
Search operation on created applications - filter Ends with Tenant admin do advanced search operation created 3 SAML applications. The filter type should be Ends with Passed
Search operation on created applications - filter Ends with (negative case) Tenant admin do advanced search operation created 3 SAML applications. The filter type should be Ends with (negative case) Passed
Search operation on created applications - filter Contains Tenant admin do advanced search operation created 3 SAML applications. The filter type should be Contains Passed
Search operation on created applications - filter Contains (negative case) Tenant admin do advanced search operation created 3 SAML applications. The filter type should be Contains (negative case) Passed
Search operation on created applications - filter Equals Tenant admin do advanced search operation created 3 SAML applications. The filter type should be Equals Passed
Search operation on created applications - filter Equals (negative case) Tenant admin do advanced search operation created 3 SAML applications. The filter type should be Equals (negative case) Passed
Enusre user can create SAML application in Manual base Register WSO2 sample application using manual option. Use this option to manually specify the required SAML configurations. Passed
Ensure user can create SAML application File Based Register SAML sample application using File Based option. Here use Upload Metadata File option. Upload a Service Provider's SAML metadata file with the required configurations. MetaDataFile Passed
Ensure user can update added metadata file when creating SAML application via File Based Register SAML sample application application using File Based option. Remove added metadata file Browse below URL and download the SAML application's metadata fileMetaDataFile Passed
User attempt to create file based SAML application and metadata file is unavailable. Register SAML sample application application using File Based option without Metadata file Passed
Ensure user can create SAML application URL Based Register SAML sample application application using URL Based option. Passed
User attempt to create SAML application URL Based - without URL Try to register SAML sample application application without using meta URL Passed
User attempt to register SAML application using existing name Register SAML application using the name of a previously created application.Aplicable for both WSO2 samples Passed
User attempt to register Register SAML application using existing Issuer value Register SAML application using before created SAML application's Issuer valueAplicable for both WSO2 samples Passed
Ensure user can register SAML application using multiple Assertion Consumer URLs Adding multiple assertion consumer URLs for the application Aplicable for both WSO2 samples Passed
User attempt to register SAML application using Invalid name Register application using invalid characters ex: !@#$%@aplicable for both WSO2 samples Passed
Ensure user can Delete Application There is a delete icon in the every single application in the application section. Click this icon and delete created sample applicationAplicable for both WSO2 samples Passed
Ensure user Integrate with external sample app Integrate with SAML sample {Ex: saml2-web-app-pickup-dispatch,saml2-web-app-pickup-manager } Passed
Try out WSO2 sample application Try out the integrated WSO2 sample application Passed
Search operation on created applications - filter starts with Tenant admin do advanced search operation created 3 SAML applications. The filter type should be start with Passed
Search operation on created applications - filter starts with(negative case) Tenant admin do advanced search operation created 3 SAML applications. The filter type should be start with (negative case) Passed
Search operation on created applications - filter Ends with Tenant admin do advanced search operation created 3 SAML applications. The filter type should be Ends with Passed
Search operation on created applications - filter Ends with (negative case) Tenant admin do advanced search operation created 3 SAML applications. The filter type should be Ends with (negative case) Passed
Search operation on created applications - filter Contains Tenant admin do advanced search operation created 3 SAML applications. The filter type should be Contains Passed
Search operation on created applications - filter Contains (negative case) Tenant admin do advanced search operation created 3 SAML applications. The filter type should be Contains (negative case) Passed
Search operation on created applications - filter Equals Tenant admin do advanced search operation created 3 SAML applications. The filter type should be Equals Passed
Search operation on created applications - filter Equals (negative case) Tenant admin do advanced search operation created 3 SAML applications. The filter type should be Equals (negative case) Passed
Ensure Application can be cofigure as Discoverable applications Configure Discoverable applications. Customers can access this application from the My Account portal.Aplicable for both WSO2 sample sample Passed
User attempt to enable Discoverable application without adding Access URL Enable discoverable application and try to update without adding access URL. Aplicable for both WSO2 sample sample Passed
User attempt to update Access URL without using URL Update Access URL without using URL. Aplicable for both WSO2 sample sampleex : application.com Passed
Ensure user can add logo for the created SAML application Add image for created application Passed
User attempt to update the created application Issuer Try to update issuer after registered the application. Aplicable for WSO2 sample Passed
User configure mulitiple Assertion Consumer URLs and set Default assertion consumer URL Add multiple Assertion Consumer URLs and set one of URLs as a Default ACS URL Aplicable for WSO2 sample Passed
User attempt to add Invalid Assertion URL Add invalid Asserion Consumer URL to the application Assertion consumer service URLs input field. Aplicable for WSO2 sample Passed
Ensure user can update the Idp entityId alias Update correct URL/URI for IdP entity ID alias Support for both WSO2 sample applications Passed
User attempt to add Idp entityId alias with Invalid URL Add an invalid URL for the Idp entityId alias. This URL does not match the IdP metadata file entityID value. Passed
User attempt to add Idp entityId alias with Invalid value Input invalid value for IdP entity ID alias (Not an URL). Support WSO2 sample Passed
Ensure user can upload Certificate Upload SP public certificate. Support WSO2 samples Passed
Ensure user can add Certificate with Paste option Paste SP public certificate. Support for both WSO2
User attempt to paste certifcate with invalid content Paste SP public certificate. Support for WSO2 samples Passed
Ensure user can Change Certificate After adding a new certificate user can change the added certificate. Support WSO2 samples Passed
Ensure user can View Added Certificate After adding a cert user can view the added cert details. Support for WSO2 samples Passed
Ensure user can Delete Certificate Delete before added certificate. Support WSO2 samples Passed
User attepmt to Delete Certificate when enabled request signature or assertion encryption. User attempt to delete certificate when the enable request signature. Passed
User attepmt to Delete Certificate when enable assertion encryption. User attempt to delete certificate when the enable assertion encryption. Passed
User attempt to authenticate while request validation fail Verify request validation fail due to invalid certifcation Passed
Ensure user can auneticate to the SAML application while enable the Request signature validation User can login to application while Enable request signature validation using WSO2 sample application Passed
Ensure user can authenticate to the application with enable Response Signing Enable Response Signing with default Digest algorithm and Signing algorithm. WSO2 sample Passed
Ensure user can authenticate to the application with enable Response Signing Enable Response Signing and authenticate to the application. Support WSO2 sample Passed
Ensure user can enable Artifact binding and SSO with application Enable Artifact binding SSO to SAML application Failed
Ensure user can Enable IDP initiated SSO Enable IdP initiated SSO The Request URL is used by the IDP to forward the users directly to the service provider. WSO2 sample application Passed
Ensure user can configure NameID format User update the nameId format Passed
Ensure user can authenticate to Audiences Check default audiences value. The issuer of the application will be added as the default audience Passed
Assertion - add values for audience Add values for audience  
Assertion - Recipients Check default Recipients value. By default, Asgardeo sends ACS URL as the recipient value.  
Assertion - Add values for Recipients Add valuees for Recipients  
Disable Enable encryption Enable encryption must be disabled until the certificate is uploaded  
Enable Encryption Enable assertion encryption  
Enable Encryption Enable encryption with default Assertion encryption algorithm and default Key encryption algorithm  
Single Logout Profile Enable single logout using Back Channel method with Wso2 application Passed
Single Logout Profile Enable single logout using Front-Channel Logout HTTP POST Binding method with Spring sample application Passed
Single Logout Profile Enable single logout using Front Channel HTTP Redirect Binding method with Spring sample application Passed
Single Logout Profile Enable single logout with WSO2 sample application  
Attribute Profile Enable the attribute profile for SAML apps without configured the user attributes in user attributes section  
Attribute Profile Enable the attribute profile for SAML apps  
Attribute Profile Unable the attribute profile  
IdP initiated single logout Identity server initiated single logout to the application  
IdP initiated single logout Identity server initiated single logout to the application and add return URL to which the user redirected after the logout  

@aaujayasena
Copy link
Contributor Author

This is completed with the effort #18348 (comment). If required to test on future builds, it can be address with different issue. Closing the issue.

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
DB/postgres postgres DB related Issues will be tracked under this label. Fixed/7.0.0 QA/Task Type/Test Issues requesting tests
Projects
Archived in project
Development

No branches or pull requests

2 participants