Versions Compared

Key

  • This line was added.
  • This line was removed.
  • Formatting was changed.

UMA1 Interop Features and Feature Tests

...

Table of Contents
maxLevel4
minLevel2

The feature tests provided below are historical. We are redesigning them in light of feedback from the OpenID Connect interop and conformance testing process and Roland Hedberg's UMA test suite implementation process. The tests below may be inaccurate with respect to UMA V1.0 Candidate specs, as they date from the pre-V0.9 era.

...

These feature tests relate exclusively to the core protocol specification, any other normatively referenced technical specifications, and the software entities that serve as protocol endpoints implementing these specifications. None relate to the Binding Obligations specification because that spec describes expected behaviors of operators and users of these endpoints, which makes them untestable for the purposes of an interop. Feature tests are marked as either required (req) or optional (opt) based on the optionality of the underlying spec clauses they're derived from, where req is for all testable MUST/REQUIRED clauses and opt is for all other testable clauses. We have not yet defined what "full conformance" means in any formal sense. (A few untestable clauses do appear in the technical specifications.)

...

IDreq/optDescriptionSuccess
FT-as-config-datareqAS provides configuration data that conforms to specified formats and provides all required properties and values.

Data conforms and is complete

 

FT-as-config-endpt

reqAS makes config data available through https://as_uri/.well-known/uma-configuration.AS config data endpoint uses https: scheme with specific URL form, with a valid certificate
FT-rs-get-config-dataoptRS successfully accesses and parses AS config data properties it needs at https://as_uri/.well-known/uma-configuration, including all endpoint-related properties not specific to the RS and including handling of non-understood extension properties.RS successfully accesses and parses AS config data
FT-c-get-config-dataoptClient successfully accesses and parses AS config data properties it needs at https://as_uri/.well-known/uma-configuration, including all endpoint-related properties not specific to the client and including handling of non-understood extension properties.Client successfully accesses and parses AS config data


Feature tests for "dynreg"

Client registration of resource servers (which are clients of the AS's protection API) and clients of resource servers (which are also clients of the AS's authorization API) at run time when services have not "met" before a resource owner or requesting party forces the issue.

...

IDreq/optRoleDescriptionSuccess
FT-rs-no-rptreqRSRS responds to client not bearing an RPT with HTTP 401 and correct as_uri corresponding to AS protecting the resource to which access was attempted.RS responds with HTTP 401 and as_uri
FT-rs-invalid-rptreqRSRS responds to client bearing an invalid RPT with HTTP 401 and correct as_uri corresponding to AS protecting the resource to which access was attempted.RS responds with HTTP 401 and as_uri
FT-c-rptreqCC requests access to a resource by providing a correctly formed and located RPT. 
FT-rs-insufficient-permreqRSRS responds to client bearing a valid "bearer" profile RPT that has insufficient permissions with HTTP 403, as_uri, and permission ticket corresponding to resource for which access was attempted. NOTE: Conducting this test depends on RS-specific API and scope details.RS responds with HTTP 403, as_uri, and permission ticket
FT-rs-respect-authzreqRSRS limits access to resource that is currently under protection at an AS for which a valid RPT with valid authorization data has not been presented by a client. NOTE: Conducting this test depends on RS-specific API and scope details.RS blocks and grants client's access according to RPT's current status

Feature tests for "claims"

TBS.