Versions Compared

Key

  • This line was added.
  • This line was removed.
  • Formatting was changed.

...

  1. Break down these feature tests into smaller chunks? What makes sense? The list of supporting clauses will be huge once we fill it in. Some candidates: MTI "bearer" RPT support vs. other profiles.
  2. "User policies" isn't testable; how do we shore up this wording in FT-as-give-authz-data?
  3. Need more rptbearer-specific tests?
  4. Add claimoidc-specific tests?
  5. Add optasc-specific tests?
  6. Regarding FT-rs-respect-authz-data: Is this truly a testable assertion, or is it in the realm of Binding Obs? Doublecheck what language we really have in the current spec about this need for "respecting" permissions. See Section 2 of the Core spec.
Test IDTypeRoleDescriptionSuccess
FT-unprotected-resourcereqRSRS responds to access request for unprotected resource without including anything UMA-specific in the responseRS responds in non-UMA fashion
FT-no-rptreqRSRS responds to client not bearing an RPT with HTTP 401 and correct as_uri corresponding to resource to which access was attemptedRS responds with HTTP 401 and as_uri
FT-c-get-rptreqCClient presents valid AAT at AS's RPT endpoint to get RPT; if an existing RPT associated with this AAT was still valid, it is invalidated when the new RPT is issuedClient qualifies for and gets new or refreshed RPT
FT-as-issue-rptreqASAS issues RPT in response to client's request for an RPT at the correct endpoint with a valid AATAS issues RPT
FT-rs-introspect-rptreqRSRS presents valid RPT at AS's token introspection endpoint to get token's statusRS gets well-formed RPT status
FT-as-introspect-rptreqASAS returns RPT's status in response to RS requestAS returns well-formed RPT status
FT-rs-invalid-rptreqRSRS responds to client bearing invalid RPT with HTTP 401 and correct as_uri corresponding to resource to which access was attemptedRS responds with HTTP 401 and as_uri
FT-rs-register-permissionreqRSRS presents valid PAT at AS's permission registration endpoint to register a requested permission that would suit for the type of access attemptedRS registers requested permission
FT-as-permission-ticketreqASAS registers permission associated with correct resource owner and resource set and returns securely random permission ticket in response to RS registration of requested permissionAS returns permission ticket that is securely random
FT-rs-insufficient-permsreq, rptbearerRSRS responds to client bearing valid bearer RPT with insufficient permissions with HTTP 403, as_uri, and permission ticket corresponding to resource for which access was attemptedRS responds with HTTP 403, as_uri, and permission ticket
FT-c-add-authz-datareqCClient presents valid AAT, valid RPT, and permission ticket at AS's authorization endpoint to POST request that authorization data be associated with RPTClient receives back normal success or error message
FT-as-deny-authz-datareqASAS determines that the client should not get authorization data, and returns either an invalid_ticket error, an expired_ticket error, or a not_authorized_permission errorAS returns one of the errors
FT-as-give-authz-datareqASAS associates new authorization data with the RPT that the client presented and responds with success, based on "user policies" ?AS adds authorization data and responds with success
FT-as-need-claimsreq, rptbearerASAS indicates it needs requesting party claims to considering adding permission to "bearer" RPTAS responds to the client with a need_claims error
FT-c-claims-redirectreq, humanrqpCClient redirects human requesting party to AS to provide claims, providing whatever data is required by the selected claim profileAS redirects requesting party to AS
FT-rs-respect-authz-datareqRSRS limits access to resource that is currently under protection at an AS for which a valid RPT with valid authorization data has not been presented by a clientRS blocks and grants client's access according to RPT's current status