Versions Compared

Key

  • This line was added.
  • This line was removed.
  • Formatting was changed.

...

Tests could be added to cover additional UMA WG-specified or third-party profiles, in which case the possible type values will expand. Generic high-level features of the protocol have an ID in the form "F-", and they group feature tests that have an ID in the form "FT-".

...

1. F-as-config: AS makes available its configuration data in the correct form at the correct location

The feature tests in this section have been reviewed.

...

Test IDTypeRoleDescriptionSuccess
FT-as-config-datareqASAS provides configuration data that conforms to specified formatData conforms to format requirements
FT-as-config-endptsreqASAS makes config data available through https://\{as_uri}/.well-known/uma-configurationAS config data endpoint uses https: scheme with specific URL form, with a valid certificate
FT-rs-get-config-dataoptRSRS successfully accesses and parses AS config data properties it needs at https://\{as_uri}/.well-known/uma-configuration, including all endpoint-related properties not specific to the RS and including handling of non-understood extension propertiesRS successfully accesses and parses AS config data
FT-c-get-config-dataoptCClient successfully accesses and parses AS config data properties it needs at http://\{as_uri}/.well-known/uma-configuration or https://{as_uri}/.well-known/uma-configuration, including all endpoint-related properties not specific to the client and including handling of non-understood extension propertiesClient successfully accesses and parses AS config data

2. F-dyn-client-reg: AS supports generating dynamic client credentials and RS and client support getting them

The feature tests in this section have been reviewed.

...

Test IDTypeRoleDescriptionSuccess
FT-as-dyn-client-regoptASAS config data "dynamic_client_endpoint" property is non-nullAS config data "dynamic_client_endpoint" property has a valid URL value for a DynClientReg endpoint
FT-rs-get-dyn-client-credsoptRSRS interacts with AS to request and receive client credentials dynamicallyRS gets client credentials dynamically
FT-c-get-dyn-client-credsoptCC interacts with AS to request and receive client credentials dynamicallyC gets client credentials dynamically

3. F-pat: AS successfully issues PAT to RS for use at AS's protection API

The feature tests in this section have been reviewed.

...

TestTypeRoleDescriptionSuccess
FT-rs-get-patreqASAS issues PAT to RS given correct OAuth authorization_code grant flow (required by the spec) and request for protection APIAS issues PAT to RS IFF RS engages correctly and with correct scope
FT-as-pat-samloptASAS issues PAT to RS given correct OAuth SAML (urn:ietf:params:oauth:grant-type:saml2-bearer) bearer token grant type and request for protection APIAS issues PAT to RS IFF RS engages correctly and with correct scope
FT-as-pat-configreqASAS supports PAT grant types as declared in configuration dataAS configuration data contains at least authorization_code grant type and optionally SAML bearer token grant type for PATs
FT-as-require-patreqASAS requires OAuth clients of protection API (definitionally, RSs) to present valid OAuth access tokens with protection API scope in order to use endpointsAS allows RSs to make protection API calls IFF they present protection API scope
FT-rs-use-patreqRSRS presents valid OAuth access token with protection API scope when making calls to all protection API endpointsRS presents PAT to all protection API endpoints

4. F-aat: AS successfully issues AAT to Client for use at AS's authorization API

The feature tests in this section have been reviewed.

...

TestTypeRoleDescriptionSuccess
FT-c-get-aatreqASAS issues AAT to Client given correct OAuth authorization_code grant flow (required by the spec) and request for authorizationAS issues AAT to client IFF client engages correctly and with correct scope
FT-as-aat-samloptASAS issues AAT to Client given correct OAuth SAML (urn:ietf:params:oauth:grant-type:saml2-bearer) bearer token grant type and request for authorizationAS issues AAT to client IFF client engages correctly and with correct scope
FT-as-aat-configreqASAS supports AAT grant types as declared in configuration dataAS configuration data contains at least authorization_code grant type and optionally SAML bearer token grant type for AATs
FT-as-require-aatreqASAS requires OAuth clients of authorization API (definitionally, Clients) to present valid OAuth access tokens with authorization API scope in order to use endpointsAS allows Client to make authorization API calls IFF they present authorization API scope
FT-c-use-aatreqCClient presents valid OAuth access token with authorization API scope when making calls to all authorization API endpointsClient presents AAT to all authorization API endpoints

5. F-rsr: RS registers resource sets at AS in order to put them under AS protection

The feature tests in this section have been reviewed.

...

TestTypeRoleDescriptionSuccess
FT-as-rsrreqASAS successfully presents all of the following methods at a resource set registration endpoint of form {rsreguri}/resource_set/{rsid}, and treats others as unsupported: PUT with unique ID to register new resource set description; GET with unique ID to read already-registered resource set description, handling the presence of any policy_uri property in AS's response; PUT with If-Match and unique ID to update already-registered resource set description, handling the presence of any policy_uri property in AS's response; DELETE with a unique ID to delete an already-registered resource set description; and GET on resource_set path to read list of already-registered resource set descriptions.AS presents all elements of resource set registration API correctly
FT-rs-rsrreqRSRS successfully uses: PUT with unique ID to register new resource set description; GET with unique ID to read already-registered resource set description, handling the presence of any policy_uri property in AS's response; PUT with If-Match and unique ID to update already-registered resource set description, handling the presence of any policy_uri property in AS's response; DELETE with a unique ID to delete an already-registered resource set description; and GET on resource_set path to read list of already-registered resource set descriptions. RS links to well-formed scope descriptions and provides well-formed resource set descriptions.RS uses all elements of resource set registration API and scope and resource set description formats correctly
FT-as-rsr-errorreqASAS issues errors for error conditions, including unsupported_method_type, not_found, and precondition_failed.AS issues resource set registration API errors for error conditions
FT-as-rsr-scope-extreqASIf a scope description contains extension properties, the AS proceeds normally in handling the scope descriptionAS does not produce an error on encountering extension properties in scope description

6. F-protect-rsrc: RS, AS, and client interact to enable authorized access to protected resources and block unauthorized access

The feature tests in this section have not yet been reviewed.

...