pta_basic_tests.xml revision 5908
5541N/A ! trunk/opends/resource/legal-notices/CDDLv1_0.txt. If applicable,
5541N/A #@TestPurpose Verify user with a LDAP PTA mapped-search policy can authenticated to remote server
5546N/A #@TestPurpose Verify user with a LDAP PTA unmapped policy can authenticated to remote server
5546N/A options.append('--backend-name "AD"')
5546N/A options.append('--set enabled:true')
5546N/A { 'location' : local_ldap_server.getHostname(),
5546N/A % (local_ldap_server.getDir(),OPENDSNAME),
5546N/A 'dsInstanceHost' : local_ldap_server.getHostname(),
5546N/A 'dsInstanceAdminPort' : local_ldap_server.getAdminPort(),
5546N/A 'dsInstanceDn' : local_ldap_server.getRootDn(),
5546N/A 'dsInstancePswd' : local_ldap_server.getRootPwd(),
5546N/A options.append('--set primary-remote-ldap-server:%s:%s' % (primaryHost,primaryPort))
5546N/A options.append('--set mapping-policy:unmapped')
5546N/A options.append('--set secondary-remote-ldap-server:%s:%s' % (secondaryHost,secondaryPort))
5546N/A options.append('--type ldap-pass-through')
5546N/A #@TestPurpose Verify user with a LDAP PTA mapped-bind policy can authenticated to remote server
5546N/A options.append('--set primary-remote-ldap-server:%s:%s' % (primaryHost,primaryPort))
5546N/A options.append('--set mapped-attribute:seealso')
5546N/A options.append('--set mapping-policy:mapped-bind')
5546N/A options.append('--set secondary-remote-ldap-server:%s:%s' % (secondaryHost,secondaryPort))
5546N/A options.append('--type ldap-pass-through')
5546N/A #@TestPurpose Verify user with a LDAP PTA mapped-search policy can authenticated to remote server
5546N/A options.append('--set primary-remote-ldap-server:%s:%s' % (primaryHost,primaryPort))
5546N/A options.append('--set mapped-attribute:cn')
5546N/A options.append('--set mapped-search-base-dn:dc=AD,dc=com')
5546N/A options.append('--set mapping-policy:mapped-search')
5546N/A options.append('--set secondary-remote-ldap-server:%s:%s' % (secondaryHost,secondaryPort))
5546N/A options.append('--type ldap-pass-through')
5541N/A #@TestPurpose Verify user with a LDAP PTA mapped-search policy can authenticated to remote server
5541N/A options.append('--set primary-remote-ldap-server:%s:%s' % (primaryHost,primaryPort))
5541N/A options.append('--set mapped-attribute:cn')
5541N/A options.append('--set mapped-search-base-dn:dc=AD,dc=com')
5541N/A options.append('--set mapped-search-bind-dn:"cn=Directory Manager"')
5541N/A options.append('--set mapped-search-bind-password:secret12')
5541N/A options.append('--set mapping-policy:mapped-search')
5541N/A options.append('--set secondary-remote-ldap-server:%s:%s' % (secondaryHost,secondaryPort))
5541N/A options.append('--type ldap-pass-through')
5541N/A #@TestPurpose Verify user with a LDAP PTA mapped-search policy can authenticated to remote server
5546N/A #@TestPurpose Verify user with a LDAP PTA mapped-search policy can authenticated to remote server
5541N/A options.append('--set primary-remote-ldap-server:%s:%s' % (primaryHost,primaryPort))
5541N/A options.append('--set mapped-attribute:cn')
5541N/A options.append('--set mapped-search-base-dn:dc=AD,dc=com')
5541N/A options.append('--set mapped-search-bind-dn:"cn=Directory Manager"')
5541N/A options.append('--set mapped-search-bind-password-file:%s' % remotePTAuserPswdFile)
5546N/A options.append('--set mapping-policy:mapped-search')
5546N/A options.append('--set secondary-remote-ldap-server:%s:%s' % (secondaryHost,secondaryPort))
5546N/A options.append('--type ldap-pass-through')
5541N/A #@TestPurpose Verify user with a LDAP PTA mapped-search policy can authenticated to remote server
5546N/A #@TestPurpose Verify user with a LDAP PTA mapped-search policy can authenticated to remote server
5541N/A options.append('--set primary-remote-ldap-server:%s:%s' % (primaryHost,primarySslPort))
5541N/A options.append('--set mapped-attribute:cn')
options.append('--set mapped-search-base-dn:dc=AD,dc=com')
options.append('--set mapping-policy:mapped-search')
options.append('--set secondary-remote-ldap-server:%s:%s' % (secondaryHost,secondarySslPort))
options.append('--set trust-manager-provider:JKS')
options.append('--set use-ssl:true')
options.append('--type ldap-pass-through')
options.append('--set primary-remote-ldap-server:%s:%s' % (primaryHost,primarySslPort))
options.append('--set mapped-attribute:cn')
options.append('--set mapped-search-base-dn:dc=AD,dc=com')
options.append('--set mapped-search-bind-dn:"cn=Directory Manager"')
options.append('--set mapped-search-bind-password:secret12')
options.append('--set mapping-policy:mapped-search')
options.append('--set secondary-remote-ldap-server:%s:%s' % (secondaryHost,secondarySslPort))
options.append('--set trust-manager-provider:JKS')
options.append('--set use-ssl:true')
options.append('--type ldap-pass-through')
options.append('--set primary-remote-ldap-server:%s:%s' % (primaryHost,primaryPort))
options.append('--set mapped-attribute:cn')
options.append('--set mapped-search-base-dn:dc=AD,dc=com')
options.append('--set mapped-search-bind-dn:"cn=Directory Manager"')
options.append('--set mapped-search-bind-password:secret12')
options.append('--set mapping-policy:mapped-search')
options.append('--set secondary-remote-ldap-server:%s:%s' % (secondaryHost,secondaryPort))
options.append('--type ldap-pass-through')
options.append('--set primary-remote-ldap-server:%s:%s' % (primaryHost,primarySslPort))
options.append('--set mapped-attribute:cn')
options.append('--set mapped-search-base-dn:dc=AD,dc=com')
options.append('--set mapped-search-bind-dn:"cn=Directory Manager"')
options.append('--set mapped-search-bind-password:secret12')
options.append('--set mapping-policy:mapped-search')
options.append('--set secondary-remote-ldap-server:%s:%s' % (secondaryHost,secondarySslPort))
options.append('--set trust-manager-provider:JKS')
options.append('--set use-ssl:true')
options.append('--type ldap-pass-through')
options.append('--set primary-remote-ldap-server:%s:%s' % (primaryHost,primaryPort))
options.append('--set mapped-attribute:cn')
options.append('--set mapped-search-base-dn:dc=AD,dc=com')
options.append('--set mapped-search-bind-dn:"cn=Directory Manager"')
options.append('--set mapped-search-bind-password:secret12')
options.append('--set mapping-policy:mapped-search')
options.append('--set secondary-remote-ldap-server:%s:%s' % (secondaryHost,secondaryPort))
options.append('--type ldap-pass-through')
options.append('--backend-name "AD"')
options.append('--set enabled:true')
{ 'location' : local_ldap_server.getHostname(),
% (local_ldap_server.getDir(),OPENDSNAME),
'dsInstanceHost' : local_ldap_server.getHostname(),
'dsInstanceAdminPort' : local_ldap_server.getAdminPort(),
'dsInstanceDn' : local_ldap_server.getRootDn(),
'dsInstancePswd' : local_ldap_server.getRootPwd(),
options.append('--set primary-remote-ldap-server:%s:%s' % (primaryHost,primaryPort))
options.append('--set mapping-policy:unmapped')
options.append('--set cached-password-storage-scheme:Clear')
options.append('--set secondary-remote-ldap-server:%s:%s' % (secondaryHost,secondaryPort))
options.append('--set use-password-caching:true')
options.append('--type ldap-pass-through')
in="userNamePswd.keys()"
ldapObject.append('userPassword:secret12')
{ 'location' : server.getHostname(),
% (server.getDir(),OPENDSNAME),
'dsInstanceHost' : server.getHostname() ,
'dsInstancePort' : server.getPort(),
'dsInstanceDn' : server.getRootDn(),
'dsInstancePswd' : server.getRootPwd(),
in="userNamePswd.keys()"
{ 'location' : local_ldap_server.getHostname(),
% (local_ldap_server.getDir(),OPENDSNAME),
'dsInstanceHost' : local_ldap_server.getHostname() ,
'dsInstancePort' : local_ldap_server.getPort(),
{ 'stepMessage' : 'User logs in with new password - should succeed and password cache/date refreshed.' }
in="userNamePswd.keys()"
{ 'location' : local_ldap_server.getHostname(),
% (local_ldap_server.getDir(),OPENDSNAME),
'dsInstanceHost' : local_ldap_server.getHostname() ,
'dsInstancePort' : local_ldap_server.getPort(),
in="userNamePswd.keys()"
{ 'location' : local_ldap_server.getHostname(),
% (local_ldap_server.getDir(),OPENDSNAME),
'dsInstanceHost' : local_ldap_server.getHostname() ,
'dsInstancePort' : local_ldap_server.getPort(),
in="userNamePswd.keys()"
ldapObject.append('userPassword:%s' % userNamePswd[remotePTAuserName][0])
{ 'location' : server.getHostname(),
% (server.getDir(),OPENDSNAME),
'dsInstanceHost' : server.getHostname() ,
'dsInstancePort' : server.getPort(),
'dsInstanceDn' : server.getRootDn(),
'dsInstancePswd' : server.getRootPwd(),
in="userNamePswd.keys()"
options.append('--policy-name "%s"' % myldapPtaPolicyName)
{ 'location' : local_ldap_server.getHostname(),
% (local_ldap_server.getDir(),OPENDSNAME),
'dsInstanceHost' : local_ldap_server.getHostname(),
'dsInstanceAdminPort' : local_ldap_server.getAdminPort(),
'dsInstanceDn' : local_ldap_server.getRootDn(),
'dsInstancePswd' : local_ldap_server.getRootPwd(),
in="userNamePswd.keys()"
options.append('--policy-name "%s"' % myldapPtaPolicyName)
{ 'location' : local_ldap_server.getHostname(),
% (local_ldap_server.getDir(),OPENDSNAME),
'dsInstanceHost' : local_ldap_server.getHostname(),
'dsInstanceAdminPort' : local_ldap_server.getAdminPort(),
'dsInstanceDn' : local_ldap_server.getRootDn(),
'dsInstancePswd' : local_ldap_server.getRootPwd(),
in="userNamePswd.keys()"
ldapObject.append('ds-pwp-password-policy-dn:%s' % myldapPtaPolicyDn)
{ 'location' : local_ldap_server.getHostname(),
% (local_ldap_server.getDir(),OPENDSNAME),
'dsInstanceHost' : local_ldap_server.getHostname() ,
'dsInstancePort' : local_ldap_server.getPort(),
'dsInstanceDn' : local_ldap_server.getRootDn(),
'dsInstancePswd' : local_ldap_server.getRootPwd(),
in="userNamePswd.keys()"
{ 'location' : local_ldap_server.getHostname(),
% (local_ldap_server.getDir(),OPENDSNAME),
'dsInstanceHost' : local_ldap_server.getHostname() ,
'dsInstancePort' : local_ldap_server.getPort(),
'dsInstanceDn' : local_ldap_server.getRootDn(),
'dsInstancePswd' : local_ldap_server.getRootPwd(),
in="userNamePswd.keys()"
{ 'location' : local_ldap_server.getHostname(),
% (local_ldap_server.getDir(),OPENDSNAME),
'dsInstanceHost' : local_ldap_server.getHostname() ,
'dsInstancePort' : local_ldap_server.getPort(),
in="userNamePswd.keys()"
{ 'location' : local_ldap_server.getHostname(),
% (local_ldap_server.getDir(),OPENDSNAME),
'dsInstanceHost' : local_ldap_server.getHostname() ,
'dsInstancePort' : local_ldap_server.getPort(),
'dsInstanceDn' : local_ldap_server.getRootDn(),
'dsInstancePswd' : local_ldap_server.getRootPwd(),
ldapObject.append('description: i am now a remote LDAP PTA user')
in="userNamePswd.keys()"
{ 'location' : local_ldap_server.getHostname(),
% (local_ldap_server.getDir(),OPENDSNAME),
'dsInstanceHost' : local_ldap_server.getHostname() ,
'dsInstancePort' : local_ldap_server.getPort(),
in="userNamePswd.keys()"
{ 'location' : local_ldap_server.getHostname(),
% (local_ldap_server.getDir(),OPENDSNAME),
'dsInstanceHost' : local_ldap_server.getHostname() ,
'dsInstancePort' : local_ldap_server.getPort(),
ldapObject.append('description: i am now a remote LDAP PTA user')
in="userNamePswd.keys()"
{ 'location' : local_ldap_server.getHostname(),
% (local_ldap_server.getDir(),OPENDSNAME),
'dsInstanceHost' : local_ldap_server.getHostname() ,
'dsInstancePort' : local_ldap_server.getPort(),
in="userNamePswd.keys()"
{ 'location' : local_ldap_server.getHostname(),
% (local_ldap_server.getDir(),OPENDSNAME),
'dsInstanceHost' : local_ldap_server.getHostname() ,
'dsInstancePort' : local_ldap_server.getPort(),
in="userNamePswd.keys()"
{ 'location' : local_ldap_server.getHostname(),
% (local_ldap_server.getDir(),OPENDSNAME),
'dsInstanceHost' : local_ldap_server.getHostname() ,
'dsInstancePort' : local_ldap_server.getPort(),