mirror of
https://github.com/goharbor/harbor.git
synced 2024-12-30 20:48:23 +01:00
dfe360040b
* addition * attribute * auditing * availability * available * bandwidth * browser * business * cadence * chartmuseum * client * column * content * demonstrate * described * endpoints * facilitate * github * harbor * information * instance * manual * meaningful * operation * overridden * password * possible * project * refactor * replication * requires * running * scanned * settings * signup * those * unsigned * vulnerability -- Also removes trailing space from a filename Signed-off-by: Josh Soref <jsoref@users.noreply.github.com>
41 lines
2.3 KiB
Markdown
41 lines
2.3 KiB
Markdown
Test 1-05 - LDAP User Log In and Log Out (LDAP Mode)
|
|
=======
|
|
|
|
# Purpose:
|
|
|
|
To verify that a non-admin user can log in and log out when users are managed externally by an LDAP server (LDAP mode).
|
|
|
|
# References:
|
|
User guide
|
|
|
|
# Environment:
|
|
* This test requires that a Harbor instance is running and available.
|
|
* Harbor is set to authenticate against an LDAP server. (auth_mode is set to **ldap_auth** .) The user data is stored in an LDAP server.
|
|
* A linux host with Docker CLI installed (Docker client).
|
|
* An LDAP server has been set up and it has a few users available for testing.
|
|
|
|
# Test Steps:
|
|
|
|
1. A user has **NEVER** logged in to Harbor. He/she logs in to the UI for the first time by his/her id in LDAP. The id could be the uid attribute (or what is configured in ldap_uid) of his/her LDAP user DN.
|
|
2. The user logs out from the UI.
|
|
3. The user logs in again to the UI, should not see his/her own account settings and cannot change password(need to go to LDAP/AD for this).
|
|
4. The user logs out from the UI.
|
|
5. Use the incorrect password and username of the user to log in to the UI and check the error message.
|
|
6. On a Docker client host, use `docker login <harbor_host>` command to verify the user can log in by username/password.
|
|
7. Run `docker login <harbor_host>` command to log in with incorrect password of the user.
|
|
8. Log in as a system admin to UI, go to "admin Options" and should see above LDAP user in the list. System admin can assign or remove system admin role to the above LDAP user.
|
|
9. Disable or remove the user in LDAP.
|
|
10. The user should no longer log in to UI or by Docker client.
|
|
|
|
# Expected Outcome:
|
|
* The user can log in to UI by LDAP id in Step 1 & 3, verify the dashboard and navigation bar are for a non-admin user. (should not see admin options)
|
|
* In Step 3, also verify that the user cannot update his/her account settings and cannot change password.
|
|
* After the user logged out in Step 2 & 4, the login page will be displayed again.
|
|
* The error message in Step 5 should not show which input value is incorrect. It should only display the username(email) and password combination is incorrect.
|
|
* Docker client can log in in Step 6.
|
|
* Docker client fails to log in in Step 7.
|
|
* LDAP user should have no difference from a user in local database in Step 8.
|
|
* The user's login should fail in Step 10.
|
|
|
|
# Possible Problems:
|
|
None |