source: TI12-security/trunk/NDGSecurity/python/ndg_security_test/ndg/security/test/unit/attributeauthorityclient/test_samlattributeauthorityclient.cfg @ 6721

Subversion URL: http://proj.badc.rl.ac.uk/svn/ndg-security/TI12-security/trunk/NDGSecurity/python/ndg_security_test/ndg/security/test/unit/attributeauthorityclient/test_samlattributeauthorityclient.cfg@6721
Revision 6721, 2.6 KB checked in by pjkersha, 11 years ago (diff)
  • Working Attribute Authority client unit tests. Configuration parameters such as issuer and flags to test query timestamp and SAML version string have now been moved out of the Attribute Authority to the generic SAML subject Query middleware interface ndg.security.server.wsgi.saml.SOAPQueryInterfaceMiddleware. This could be moved into the SAML egg at a later stage. The AuthzDecisionQuery? interface should be retested to allow for these changes.
Line 
1# NERC DataGrid Project
2#
3# Conifguration for SAML SOAP Binding Interface to the Attribute Authority
4#
5# P J Kershaw 15/02/10
6#
7# Copyright (C) 2010 Science and Technology Facilities Council
8#
9# BSD - See LICENCE file for details
10
11#  use a separate test case class in the test module and is
12# included here
13[test01AttributeQuery]
14uri = http://localhost:5000/AttributeAuthority/
15subject = https://openid.localhost/philip.kershaw
16siteAttributeName = urn:siteA:security:authz:1.0:attr
17
18[test02AttributeQueryInvalidIssuer]
19uri = http://localhost:5000/AttributeAuthority/
20subject = https://openid.localhost/philip.kershaw
21siteAttributeName = urn:siteA:security:authz:1.0:attr
22
23[test03AttributeQueryUnknownSubject]
24uri = http://localhost:5000/AttributeAuthority/
25subject = https://openid.localhost/unknown
26siteAttributeName = urn:siteA:security:authz:1.0:attr
27
28[test04AttributeQueryInvalidAttrName]
29uri = http://localhost:5000/AttributeAuthority/
30subject = https://openid.localhost/philip.kershaw
31siteAttributeName = invalid-attr
32prefix = saml.
33saml.serialise = ndg.saml.xml.etree:AttributeQueryElementTree.toXML
34saml.deserialise = ndg.saml.xml.etree:ResponseElementTree.fromXML
35
36[test05AttributeQuerySOAPBindingInterface]
37uri = http://localhost:5000/AttributeAuthority/
38subject = https://openid.localhost/philip.kershaw
39
40[test06AttributeQueryFromConfig]
41uri = http://localhost:5000/AttributeAuthority/
42subject = https://openid.localhost/philip.kershaw
43
44attributeQuery.subjectIdFormat = urn:esg:openid
45attributeQuery.clockSkewTolerance = 0.
46attributeQuery.issuerName = /O=Site A/CN=Authorisation Service
47attributeQuery.queryAttributes.0 = urn:esg:first:name, FirstName, http://www.w3.org/2001/XMLSchema#string
48attributeQuery.queryAttributes.roles = urn:siteA:security:authz:1.0:attr, , http://www.w3.org/2001/XMLSchema#string
49
50[test07AttributeQuerySslSOAPBindingInterface]
51uri = http://localhost:5000/AttributeAuthority/
52subject = https://openid.localhost/philip.kershaw
53
54attributeQuery.subjectIdFormat = urn:esg:openid
55attributeQuery.clockSkewTolerance = 0.
56attributeQuery.issuerName = /O=Site A/CN=Authorisation Service
57attributeQuery.queryAttributes.0 = urn:esg:email:address, EmailAddress, http://www.w3.org/2001/XMLSchema#string
58attributeQuery.queryAttributes.roles = urn:siteA:security:authz:1.0:attr, , http://www.w3.org/2001/XMLSchema#string
59
60# SSL Context Proxy settings
61attributeQuery.sslCACertDir = $NDGSEC_TEST_CONFIG_DIR/ca
62attributeQuery.sslCertFilePath = $NDGSEC_TEST_CONFIG_DIR/pki/test.crt
63attributeQuery.sslPriKeyFilePath = $NDGSEC_TEST_CONFIG_DIR/pki/test.key
64attributeQuery.sslValidDNs = /C=UK/ST=Oxfordshire/O=BADC/OU=Security/CN=localhost, /O=Site A/CN=Attribute Authority
65
Note: See TracBrowser for help on using the repository browser.