Files
zitadel/acceptance/tests/login-configuration-possiblities.spec.ts
Stefan Benz ab96a8eaae Merge remote-tracking branch 'origin/acceptance-test-suite' into acceptance-test-suite
# Conflicts:
#	acceptance/tests/idp-apple.spec.ts
#	acceptance/tests/idp-generic-jwt.spec.ts
#	acceptance/tests/idp-generic-oauth.spec.ts
#	acceptance/tests/idp-generic-oidc.spec.ts
#	acceptance/tests/idp-github-enterprise.spec.ts
#	acceptance/tests/idp-github.spec.ts
#	acceptance/tests/idp-gitlab-self-hosted.spec.ts
#	acceptance/tests/idp-gitlab.spec.ts
#	acceptance/tests/idp-google.spec.ts
#	acceptance/tests/idp-ldap.spec.ts
#	acceptance/tests/idp-microsoft.spec.ts
#	acceptance/tests/idp-saml.spec.ts
#	acceptance/tests/login-configuration-possiblities.spec.ts
2024-11-19 11:12:57 +01:00

52 lines
2.5 KiB
TypeScript

import test from "@playwright/test";
test("login with mfa setup, mfa setup prompt", async ({ page }) => {
// Given the organization has enabled at least one mfa types
// Given the user has a password but no mfa registered
// User authenticates with login name and password
// User is prompted to setup a mfa, mfa providers are listed, the user can choose the provider
});
test("login with mfa setup, no mfa setup prompt", async ({ page }) => {
// Given the organization has set "multifactor init check time" to 0
// Given the organization has enabled mfa types
// Given the user has a password but no mfa registered
// User authenticates with loginname and password
// user is directly loged in and not prompted to setup mfa
});
test("login with mfa setup, force mfa for local authenticated users", async ({ page }) => {
// Given the organization has enabled force mfa for local authentiacted users
// Given the organization has enabled all possible mfa types
// Given the user has a password but no mfa registered
// User authenticates with loginname and password
// User is prompted to setup a mfa, all possible mfa providers are listed, the user can choose the provider
});
test("login with mfa setup, force mfa - local user", async ({ page }) => {
// Given the organization has enabled force mfa for local authentiacted users
// Given the organization has enabled all possible mfa types
// Given the user has a password but no mfa registered
// User authenticates with loginname and password
// User is prompted to setup a mfa, all possible mfa providers are listed, the user can choose the provider
});
test("login with mfa setup, force mfa - external user", async ({ page }) => {
// Given the organization has enabled force mfa
// Given the organization has enabled all possible mfa types
// Given the user has an idp but no mfa registered
// enter login name
// redirect to configured external idp
// User is prompted to setup a mfa, all possible mfa providers are listed, the user can choose the provider
});
test("login with mfa setup, force mfa - local user, wrong password", async ({ page }) => {
// Given the organization has a password lockout policy set to 1 on the max password attempts
// Given the user has only a password as auth methos
// enter login name
// enter wrong password
// User will get an error "Wrong password"
// enter password
// User will get an error "Max password attempts reached - user is locked. Please reach out to your administrator"
});