-
Notifications
You must be signed in to change notification settings - Fork 1
Commit
This commit does not belong to any branch on this repository, and may belong to a fork outside of the repository.
Merge pull request #43 from OpenConext/feature/update-layout
Update layout
- Loading branch information
Showing
15 changed files
with
67 additions
and
48 deletions.
There are no files selected for viewing
Loading
Sorry, something went wrong. Reload?
Sorry, we cannot display this file.
Sorry, this file is invalid so it cannot be displayed.
Binary file not shown.
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
|
@@ -3,8 +3,8 @@ Feature: When using AzureAD directly | |
Scenario: When a user is authenticating a token | ||
Given I send an authentication request to "https://azure-mfa.stepup.example.com/saml/sso" without NameID | ||
Then I should see "Registration" | ||
And I fill in "Email address" with "[email protected]" | ||
When I press "Submit" | ||
And I fill in "email_address_emailAddress" with "[email protected]" | ||
When I press "email_address_submit" | ||
Given the login with Azure MFA succeeds and the following attributes are released: | ||
| name | value | | ||
| urn:mace:dir:attribute-def:mail | test-user@institution-b.example.com | | ||
|
@@ -15,8 +15,8 @@ Feature: When using AzureAD directly | |
Scenario: Should fail when a authnmethodsreferences attribute is not released | ||
Given I send an authentication request to "https://azure-mfa.stepup.example.com/saml/sso" without NameID | ||
Then I should see "Registration" | ||
And I fill in "Email address" with "[email protected]" | ||
When I press "Submit" | ||
And I fill in "email_address_emailAddress" with "[email protected]" | ||
When I press "email_address_submit" | ||
Given the login with Azure MFA succeeds and the following attributes are released: | ||
| name | value | | ||
| urn:mace:dir:attribute-def:mail | test-user@institution-b.example.com | | ||
|
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
|
@@ -3,8 +3,8 @@ Feature: When using AzureAD directly | |
Scenario: When a user is registering a new token | ||
Given I send a registration request to "https://azure-mfa.stepup.example.com/saml/sso" | ||
Then I should see "Registration" | ||
And I fill in "Email address" with "[email protected]" | ||
When I press "Submit" | ||
And I fill in "email_address_emailAddress" with "[email protected]" | ||
When I press "email_address_submit" | ||
Given the login with Azure MFA succeeds and the following attributes are released: | ||
| name | value | | ||
| urn:mace:dir:attribute-def:mail | test-user@institution-b.example.com | | ||
|
@@ -15,8 +15,8 @@ Feature: When using AzureAD directly | |
Scenario: Should fail when a authnmethodsreferences attribute is not released | ||
Given I send a registration request to "https://azure-mfa.stepup.example.com/saml/sso" | ||
Then I should see "Registration" | ||
And I fill in "Email address" with "[email protected]" | ||
When I press "Submit" | ||
And I fill in "email_address_emailAddress" with "[email protected]" | ||
When I press "email_address_submit" | ||
Given the login with Azure MFA succeeds and the following attributes are released: | ||
| name | value | | ||
| urn:mace:dir:attribute-def:mail | test-user@institution-b.example.com | | ||
|
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
|
@@ -20,11 +20,11 @@ Feature: When an user needs switch it's preferred locale | |
Then I should see "Registratie" | ||
And I follow "EN" | ||
Then I should see "Registration" | ||
And I fill in "Email address" with "[email protected]" | ||
When I press "Submit" | ||
And I fill in "email_address_emailAddress" with "[email protected]" | ||
When I press "email_address_submit" | ||
Given the login with Azure MFA succeeds and the following attributes are released: | ||
| name | value | | ||
| urn:mace:dir:attribute-def:mail | test-user@institution-a.example.com | | ||
Then I should be on "https://azure-mfa.stepup.example.com/saml/sso_return" | ||
And the SAML Response should contain element "StatusCode" with attribute "Value" with attribute value "urn:oasis:names:tc:SAML:2.0:status:Success" | ||
And the SAML Response should contain element "NameID" with value containing "[email protected]" | ||
And the SAML Response should contain element "NameID" with value containing "[email protected]" |
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
|
@@ -6,8 +6,8 @@ Feature: When an user needs to register for a new token | |
Scenario: When a user is registering a new token | ||
Given I send a registration request to "https://azure-mfa.stepup.example.com/saml/sso" | ||
Then I should see "Registration" | ||
And I fill in "Email address" with "[email protected]" | ||
When I press "Submit" | ||
And I fill in "email_address_emailAddress" with "[email protected]" | ||
When I press "email_address_submit" | ||
Given the login with Azure MFA succeeds and the following attributes are released: | ||
| name | value | | ||
| urn:mace:dir:attribute-def:mail | test-user@institution-a.example.com | | ||
|
@@ -18,8 +18,8 @@ Feature: When an user needs to register for a new token | |
Scenario: When a user is registering a new token, and if an unknown mail address gets released authentication at Azure MFA fails | ||
Given I send a registration request to "https://azure-mfa.stepup.example.com/saml/sso" | ||
Then I should see "Registration" | ||
And I fill in "Email address" with "[email protected]" | ||
When I press "Submit" | ||
And I fill in "email_address_emailAddress" with "[email protected]" | ||
When I press "email_address_submit" | ||
Given the login with Azure MFA succeeds and the following attributes are released: | ||
| name | value | | ||
| urn:mace:dir:attribute-def:mail | unknown@institution-a.example.com | | ||
|
@@ -29,8 +29,8 @@ Feature: When an user needs to register for a new token | |
Scenario: When a user is registering a new token, and if no mail attribute gets released authentication at Azure MFA fails | ||
Given I send a registration request to "https://azure-mfa.stepup.example.com/saml/sso" | ||
Then I should see "Registration" | ||
And I fill in "Email address" with "[email protected]" | ||
When I press "Submit" | ||
And I fill in "email_address_emailAddress" with "[email protected]" | ||
When I press "email_address_submit" | ||
Given the login with Azure MFA succeeds and the following attributes are released: | ||
| name | value | | ||
Then I should be on "https://azure-mfa.stepup.example.com/saml/sso_return" | ||
|
@@ -39,17 +39,17 @@ Feature: When an user needs to register for a new token | |
Scenario: When a user is registering a new token, authentication at Azure MFA fails | ||
Given I send a registration request to "https://azure-mfa.stepup.example.com/saml/sso" | ||
Then I should see "Registration" | ||
And I fill in "Email address" with "[email protected]" | ||
When I press "Submit" | ||
And I fill in "email_address_emailAddress with "test-user@institution-a.example.com" | ||
When I press "email_address_submit" | ||
And the login with Azure MFA gets cancelled | ||
Then I should be on "https://azure-mfa.stepup.example.com/saml/sso_return" | ||
And the SAML Response should contain element "StatusCode" with attribute "Value" with attribute value "urn:oasis:names:tc:SAML:2.0:status:AuthnFailed" | ||
|
||
Scenario: When a user is registering a new token, authentication at Azure MFA fails | ||
Given I send a registration request to "https://azure-mfa.stepup.example.com/saml/sso" | ||
Then I should see "Registration" | ||
And I fill in "Email address" with "[email protected]" | ||
When I press "Submit" | ||
And I fill in "email_address_emailAddress" with "[email protected]" | ||
When I press "email_address_submit" | ||
Given the login with Azure MFA fails | ||
Then I should be on "https://azure-mfa.stepup.example.com/saml/sso_return" | ||
And the SAML Response should contain element "StatusCode" with attribute "Value" with attribute value "urn:oasis:names:tc:SAML:2.0:status:AuthnFailed" | ||
|
@@ -58,9 +58,9 @@ Feature: When an user needs to register for a new token | |
Given I send a registration request to "https://azure-mfa.stepup.example.com/saml/sso" | ||
# Fill an email address that does not match any of the configured email domains | ||
Then I should see "Registration" | ||
And I fill in "Email address" with "[email protected]" | ||
When I press "Submit" | ||
When I press "Submit" | ||
And I fill in "email_address_emailAddress" with "[email protected]" | ||
When I press "email_address_submit" | ||
When I press "email_address_submit" | ||
Then I should be on "https://azure-mfa.stepup.example.com/registration" | ||
And I should see "The provided email address did not match any of our configured email domains." | ||
|
||
|
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
|
@@ -15,8 +15,8 @@ Feature: When an user needs to register for a new token | |
And I should see "Registration" | ||
|
||
# GSSP assigns a subject name id to the user | ||
Given I fill in "Email address" with "[email protected]" | ||
When I press "Submit" | ||
Given I fill in "email_address_emailAddress" with "[email protected]" | ||
When I press "email_address_submit" | ||
|
||
# The MFA SSO page | ||
Then I should be on "https://azure-mfa.stepup.example.com/mock/sso" | ||
|
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters