source: TI12-security/trunk/NDGSecurity/python/ndg_security_test/ndg/security/test/unit/attributeauthorityclient/attAuthorityClientTest.cfg @ 6571

Subversion URL: http://proj.badc.rl.ac.uk/svn/ndg/TI12-security/trunk/NDGSecurity/python/ndg_security_test/ndg/security/test/unit/attributeauthorityclient/attAuthorityClientTest.cfg@6571
Revision 6571, 2.7 KB checked in by pjkersha, 10 years ago (diff)

Refactored SAML SOAP Binding unit test class into a separate module test_samlattributeauthorityclient

Line 
1# NERC DataGrid Project
2#
3# P J Kershaw 16/01/07
4#
5# Copyright (C) 2009 Science and Technology Facilities Council
6#
7# BSD - See LICENCE file for details
8
9[setUp]
10# ! SiteBMapConfig.xml trusted site A aaURI setting must agree with this
11# setting for test6GetMappedAttCert
12uri = http://localhost:5000/AttributeAuthority
13
14# With TCP Mon:
15#uri = http://localhost:4999/AttributeAuthority
16
17# Over SSL with mod_wsgi
18#uri = https://localhost/ndg/AttributeAuthority
19
20# For https connections only.  !Omit ssl* settings if using http!
21# sslpeercertcn is the expected CommonName of peer cert.  Omit if it's the
22# same as peer hostname.
23sslPeerCertCN = 
24sslCACertFilePathList = $NDGSEC_TEST_CONFIG_DIR/ca/ndg-test-ca.crt
25
26[test02GetTrustedHostInfo]
27role = urn:siteA:security:authz:1.0:attr:postgrad
28
29[test03GetTrustedHostInfoWithNoMatchingRoleFound]
30# Set an alternative role to test no matching role found exception
31role = blah
32 
33[test06GetAttCert]
34# Setup for use by test08GetMappedAttCert test
35attCertFilePath = $NDGSEC_AACLNT_UNITTEST_DIR/ac-clnt.xml
36
37[test07GetAttCertWithUserIdSet]
38userId = system
39attCertFilePath = $NDGSEC_AACLNT_UNITTEST_DIR/ac-clnt-test6.xml
40
41[test08GetMappedAttCert]
42uri = http://localhost:5100/AttributeAuthority
43userAttCertFilePath = $NDGSEC_AACLNT_UNITTEST_DIR/ac-clnt.xml
44mappedAttCertFilePath = $NDGSEC_AACLNT_UNITTEST_DIR/mapped-ac.xml
45
46[test09GetMappedAttCertStressTest]
47uri = http://localhost:5100/AttributeAuthority
48userAttCertFilePathList = $NDGSEC_AACLNT_UNITTEST_DIR/ac-clnt.xml
49
50[wsse]
51# WS-Security settings for unit test AA clients
52#
53# OUTBOUND MESSAGE CONFIG
54
55# Signature of an outbound message
56
57# Certificate associated with private key used to sign a message.  The sign
58# method will add this to the BinarySecurityToken element of the WSSE header. 
59signingCertFilePath=$NDGSEC_TEST_CONFIG_DIR/pki/wsse-clnt.crt
60
61# PEM encoded private key file
62signingPriKeyFilePath=$NDGSEC_TEST_CONFIG_DIR/pki/wsse-clnt.key
63
64# Set the ValueType for the BinarySecurityToken added to the WSSE header for a
65# signed message.  See __setReqBinSecTokValType method and binSecTokValType
66# class variable for options - it may be one of X509, X509v3, X509PKIPathv1 or
67# give full namespace to alternative - see
68# ZSI.wstools.Namespaces.OASIS.X509TOKEN
69#
70# binSecTokValType determines whether signingCert or signingCertChain
71# attributes will be used.
72reqBinSecTokValType=X509v3
73
74# Add a timestamp element to an outbound message
75addTimestamp=True
76
77# For WSSE 1.1 - service returns signature confirmation containing signature
78# value sent by client
79applySignatureConfirmation=False
80
81#
82# INBOUND MESSAGE CONFIG
83
84# Provide a space separated list of file paths
85caCertFilePathList=$NDGSEC_TEST_CONFIG_DIR/ca/ndg-test-ca.crt
86
Note: See TracBrowser for help on using the repository browser.