Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

improve TOTP testplan #593

Merged
merged 1 commit into from
Sep 12, 2018
Merged
Changes from all commits
Commits
File filter

Filter by extension

Filter by extension

Conversations
Failed to load comments.
Loading
Jump to
Jump to file
Failed to load files.
Loading
Diff view
Diff view
27 changes: 16 additions & 11 deletions Server/Test_Plan_twofactor_totp.md
Original file line number Diff line number Diff line change
@@ -1,20 +1,25 @@
## Twofactor TOTP Test Plan



| Test Case | Expected Result | Result | Related Comment |
| ---------------------------------------- | ---------------------------------------- | -------------- | --------------- |
| Enable the app. | No problems found. | :construction: | |
| Using a non admin user user1, enable totp in the personal settings.<br />Having the app freeotp (android or ios) scan the QR code provided and set it up.<br />Login using user1, get a new code in the freeotp app. Introduce it in the login view. Login. | User1 can login without problems. | 🚧 | |
| Using a non admin user user1, enable totp in the personal settings.<br />Having the app freeotp (android or ios) scan the QR code provided and set it up.<br />Try to login with user1 using his password. When the totp input appears introduce random numbers, emojis, negative numbers and empty string. | User1 cannot login in any of this situations. | 🚧 | |
| Using a LDAP user ldap_user, enable totp in the personal settings.<br />Having the app freeotp (android or ios) scan the QR code provided and set it up.<br />Login using ldap_user, get a new code in the freeotp app. Introduce it in the login view. Login. | User_ldap can login without problems. | 🚧 | |
| Using a non admin user user1, enable totp in the personal settings.<br />Having the app google authenticator (android or ios) scan the QR code provided and set it up.<br />Login using user1, get a new code in the google authenticator app. Introduce it in the login view. Login. | User1 can login without problems. | 🚧 | |
| Enable the app. | No problems found. | 🚧 | |
| Using a non admin user user1, enable totp in the personal settings.<br />Having the app freeotp (android or ios) scan the QR code provided and set it up.<br />Login using user1, get a new code in the freeotp app. Introduce it in the login view. Login. | User1 can login without problems. | 🚧 | |
| Using a non admin user user1, enable totp in the personal settings.<br />Having the app freeotp (android or ios) scan the QR code provided - enter a random verification code | code is not verified | 🚧 | |
| Using a non admin user user1, enable totp in the personal settings.<br />Having the app freeotp (android or ios) scan the QR code provided and set it up.<br />Login using user1, get a new code in the freeotp app. Introduce it in the login view. Login. Logout. Login again using same code | User1 cannot login without a new code | 🚧 | |
| Using users user1 & user2, enable totp and set it up in the personal settings.<br />Login using user1, get a new code in the freeotp app for user2. Introduce it in the login view. Login. | user1 cannot login | 🚧 | |
| Using users user1, enable totp and set it up in the personal settings.<br />Login using user1, totp.<br />Disable TOTP in the personal settings of user1. Login again | user1 can login without TOTP token | 🚧 | |
| Using users user1, enable totp and set it up in the personal settings.<br />Login using user1, totp.<br />Disable TOTP in the personal settings of user1<br/> Enable it again, set it up scanning the new QR code. | new verification code is accepted | 🚧 | |
| Using users user1, enable totp and set it up in the personal settings.<br />Login using user1, totp.<br />Disable TOTP in the personal settings of user1<br/> Enable it again, do **not** scan the new QR code but use a current code from the first setup to verify | code is not accepted | 🚧 | |
| Using a non admin user user1, enable totp in the personal settings.<br />Having the app freeotp (android or ios) scan the QR code provided and set it up.<br />Try to login with user1 using his password. When the totp input appears introduce random numbers, emojis, negative numbers and empty string. | User1 cannot login in any of this situations. | 🚧 | |
| Using a LDAP user ldap_user, enable totp in the personal settings.<br />Having the app freeotp (android or ios) scan the QR code provided and set it up.<br />Login using ldap_user, get a new code in the freeotp app. Introduce it in the login view. Login. | User_ldap can login without problems. | 🚧 | |
| Using a non admin user user1, enable totp in the personal settings.<br />Having the app **google authenticator** (android or ios) scan the QR code provided and set it up.<br />Login using user1, get a new code in the **google authenticator** app. Introduce it in the login view. Login. | User1 can login without problems. | 🚧 | |
| Using a non admin user user1, enable totp in the personal settings.<br />Having the app **google authenticator** (android or ios) set up the account in the app using the key.<br />Login using user1, get a new code in the **google authenticator** app. Introduce it in the login view. Login. | User1 can login without problems. | 🚧 | |
| **CLI** | | | |
| Test 1/2 Having a user 'user1' with a working enabled two factor authentication, use the CLI command to disable it twofactorauth:disable | 'user1' now can login without using 2FA | 🚧 | |
| Test 2/2 Use the CLI command twofactorauth:enable to enable again 2FA for 'user1' | 'user1' has to use 2FA mandatory to login | 🚧 | |
| Test 1/2 Having a user 'user1' with a working enabled two factor authentication, use the CLI command to disable it twofactorauth:disable | 'user1' now can login without using 2FA | 🚧 | |
| Test 2/2 Use the CLI command twofactorauth:enable to enable again 2FA for 'user1' | 'user1' has to use 2FA mandatory to login | 🚧 | |
| **Browsers** | | | |
| Check the login process is possible using chrome | | 🚧 | |
| Check the login process is possible using firefox | | 🚧 | |
| Check the login process is possible using edge | | 🚧 | <br /> |
| Check the login process is possible using firefox | | 🚧 | |
| Check the login process is possible using edge | | 🚧 | |
| Check the login process is possible using internet explorer 11 | | 🚧 | <br /> |
| Check the login process is possible using safari | | 🚧 | |