Files
zitadel/acceptance/tests/username-password-u2f.spec.ts

25 lines
955 B
TypeScript
Raw Normal View History

2024-11-19 11:33:42 +01:00
import { test } from "@playwright/test";
2024-11-18 10:36:13 +01:00
2024-11-19 11:33:42 +01:00
test("username, password and u2f login", async ({ page }) => {
2024-11-19 16:19:45 +01:00
// Given u2f is enabled on the organization of the user
2024-11-18 18:01:47 +01:00
// Given the user has only u2f configured as second factor
// User enters username
// User enters password
// Popup for u2f is directly opened
// User verifies u2f
// User is redirected to the app (default redirect url)
2024-11-18 10:36:13 +01:00
});
2024-11-19 11:33:42 +01:00
test("username, password and u2f login, multiple mfa options", async ({ page }) => {
2024-11-19 16:19:45 +01:00
// Given u2f and semailms otp is enabled on the organization of the user
2024-11-18 18:01:47 +01:00
// Given the user has u2f and email otp configured as second factor
// User enters username
// User enters password
// Popup for u2f is directly opened
// User aborts u2f verification
// User clicks button to use email otp as second factor
// User receives an email with a verification code
// User enters code in ui
// User is redirected to the app (default redirect url)
2024-11-18 10:36:13 +01:00
});