mirror of
https://github.com/zitadel/zitadel.git
synced 2025-12-13 01:49:23 +00:00
# Conflicts: # acceptance/tests/idp-apple.spec.ts # acceptance/tests/idp-generic-jwt.spec.ts # acceptance/tests/idp-generic-oauth.spec.ts # acceptance/tests/idp-generic-oidc.spec.ts # acceptance/tests/idp-github-enterprise.spec.ts # acceptance/tests/idp-github.spec.ts # acceptance/tests/idp-gitlab-self-hosted.spec.ts # acceptance/tests/idp-gitlab.spec.ts # acceptance/tests/idp-google.spec.ts # acceptance/tests/idp-ldap.spec.ts # acceptance/tests/idp-microsoft.spec.ts # acceptance/tests/idp-saml.spec.ts # acceptance/tests/login-configuration-possiblities.spec.ts
52 lines
2.5 KiB
TypeScript
52 lines
2.5 KiB
TypeScript
import test from "@playwright/test";
|
|
|
|
test("login with mfa setup, mfa setup prompt", async ({ page }) => {
|
|
// Given the organization has enabled at least one mfa types
|
|
// Given the user has a password but no mfa registered
|
|
// User authenticates with login name and password
|
|
// User is prompted to setup a mfa, mfa providers are listed, the user can choose the provider
|
|
});
|
|
|
|
test("login with mfa setup, no mfa setup prompt", async ({ page }) => {
|
|
// Given the organization has set "multifactor init check time" to 0
|
|
// Given the organization has enabled mfa types
|
|
// Given the user has a password but no mfa registered
|
|
// User authenticates with loginname and password
|
|
// user is directly loged in and not prompted to setup mfa
|
|
});
|
|
|
|
test("login with mfa setup, force mfa for local authenticated users", async ({ page }) => {
|
|
// Given the organization has enabled force mfa for local authentiacted users
|
|
// Given the organization has enabled all possible mfa types
|
|
// Given the user has a password but no mfa registered
|
|
// User authenticates with loginname and password
|
|
// User is prompted to setup a mfa, all possible mfa providers are listed, the user can choose the provider
|
|
});
|
|
|
|
test("login with mfa setup, force mfa - local user", async ({ page }) => {
|
|
// Given the organization has enabled force mfa for local authentiacted users
|
|
// Given the organization has enabled all possible mfa types
|
|
// Given the user has a password but no mfa registered
|
|
// User authenticates with loginname and password
|
|
// User is prompted to setup a mfa, all possible mfa providers are listed, the user can choose the provider
|
|
});
|
|
|
|
test("login with mfa setup, force mfa - external user", async ({ page }) => {
|
|
// Given the organization has enabled force mfa
|
|
// Given the organization has enabled all possible mfa types
|
|
// Given the user has an idp but no mfa registered
|
|
// enter login name
|
|
// redirect to configured external idp
|
|
// User is prompted to setup a mfa, all possible mfa providers are listed, the user can choose the provider
|
|
});
|
|
|
|
test("login with mfa setup, force mfa - local user, wrong password", async ({ page }) => {
|
|
// Given the organization has a password lockout policy set to 1 on the max password attempts
|
|
// Given the user has only a password as auth methos
|
|
// enter login name
|
|
// enter wrong password
|
|
// User will get an error "Wrong password"
|
|
// enter password
|
|
// User will get an error "Max password attempts reached - user is locked. Please reach out to your administrator"
|
|
});
|