'Test Name = %s' % STAXCurrentTestcase { 'stepMessage' : 'Enable AD backend on local server.' } { 'location' : local_ldap_server.getHostname(), 'dsPath' : '%s/%s' \ % (local_ldap_server.getDir(),OPENDSNAME), 'dsInstanceHost' : local_ldap_server.getHostname(), 'dsInstanceAdminPort' : local_ldap_server.getAdminPort(), 'dsInstanceDn' : local_ldap_server.getRootDn(), 'dsInstancePswd' : local_ldap_server.getRootPwd(), 'subcommand' : 'set-backend-prop', 'optionsString' : dsconfigOptions } { 'stepMessage' : 'Configure LDAP PTA Policy as unmapped.' } { 'location' : local_ldap_server.getHostname(), 'dsPath' : '%s/%s' \ % (local_ldap_server.getDir(),OPENDSNAME), 'dsInstanceHost' : local_ldap_server.getHostname(), 'dsInstanceAdminPort' : local_ldap_server.getAdminPort(), 'dsInstanceDn' : local_ldap_server.getRootDn(), 'dsInstancePswd' : local_ldap_server.getRootPwd(), 'subcommand' : 'create-password-policy', 'optionsString' : dsconfigOptions } { 'stepMessage' : 'Read back the "authentication policy" object.' } { 'location' : local_ldap_server.getHostname(), 'dsPath' : '%s/%s' \ % (local_ldap_server.getDir(),OPENDSNAME), 'dsInstanceHost' : local_ldap_server.getHostname(), 'dsInstanceAdminPort' : local_ldap_server.getAdminPort(), 'dsInstanceDn' : local_ldap_server.getRootDn(), 'dsInstancePswd' : local_ldap_server.getRootPwd(), 'subcommand' : 'get-password-policy-prop', 'optionsString' : dsconfigOptions } { 'stepMessage' : 'Add ds-pwp-password-policy-dn to users entry.' } { 'location' : local_ldap_server.getHostname(), 'dsPath' : '%s/%s' \ % (local_ldap_server.getDir(),OPENDSNAME), 'dsInstanceHost' : local_ldap_server.getHostname() , 'dsInstancePort' : local_ldap_server.getPort(), 'dsInstanceDn' : local_ldap_server.getRootDn(), 'dsInstancePswd' : local_ldap_server.getRootPwd(), 'DNToModify' : remotePTAuserName , 'listAttributes' : ldapObject , 'changetype' : 'add' } { 'stepMessage' : 'Search users entry as Directory Manager for operational attributes.' } { 'location' : local_ldap_server.getHostname(), 'dsPath' : '%s/%s' \ % (local_ldap_server.getDir(),OPENDSNAME), 'dsInstanceHost' : local_ldap_server.getHostname() , 'dsInstancePort' : local_ldap_server.getPort(), 'dsInstanceDn' : local_ldap_server.getRootDn(), 'dsInstancePswd' : local_ldap_server.getRootPwd(), 'dsBaseDN' : remotePTAuserName , 'dsFilter' : 'objectclass=*' , 'dsAttributes' : '+' } { 'stepMessage' : 'Search users entry as self.' } { 'location' : local_ldap_server.getHostname(), 'dsPath' : '%s/%s' \ % (local_ldap_server.getDir(),OPENDSNAME), 'dsInstanceHost' : local_ldap_server.getHostname() , 'dsInstancePort' : local_ldap_server.getPort(), 'dsInstanceDn' : remotePTAuserName, 'dsInstancePswd' : remotePTAuserPSWD , 'dsBaseDN' : remotePTAuserName , 'dsFilter' : 'objectclass=*' } { 'stepMessage' : 'Modify the users entry.' } { 'location' : local_ldap_server.getHostname(), 'dsPath' : '%s/%s' \ % (local_ldap_server.getDir(),OPENDSNAME), 'dsInstanceHost' : local_ldap_server.getHostname() , 'dsInstancePort' : local_ldap_server.getPort(), 'dsInstanceDn' : remotePTAuserName, 'dsInstancePswd' : remotePTAuserPSWD, 'DNToModify' : remotePTAuserName , 'listAttributes' : ldapObject , 'changetype' : 'replace' } '%s: Test failed. eInfo(%s)' % (eType,eInfo) 'Test Name = %s' % STAXCurrentTestcase { 'stepMessage' : 'onfigure LDAP PTA Policy for mapped-bind.' } { 'location' : local_ldap_server.getHostname(), 'dsPath' : '%s/%s' \ % (local_ldap_server.getDir(),OPENDSNAME), 'dsInstanceHost' : local_ldap_server.getHostname(), 'dsInstanceAdminPort' : local_ldap_server.getAdminPort(), 'dsInstanceDn' : local_ldap_server.getRootDn(), 'dsInstancePswd' : local_ldap_server.getRootPwd(), 'subcommand' : 'create-password-policy', 'optionsString' : dsconfigOptions } { 'stepMessage' : 'Read back the "authentication policy" object.' } { 'location' : local_ldap_server.getHostname(), 'dsPath' : '%s/%s' \ % (local_ldap_server.getDir(),OPENDSNAME), 'dsInstanceHost' : local_ldap_server.getHostname(), 'dsInstanceAdminPort' : local_ldap_server.getAdminPort(), 'dsInstanceDn' : local_ldap_server.getRootDn(), 'dsInstancePswd' : local_ldap_server.getRootPwd(), 'subcommand' : 'get-password-policy-prop', 'optionsString' : dsconfigOptions } { 'stepMessage' : 'Add ds-pwp-password-policy-dn to users entry.' } { 'location' : local_ldap_server.getHostname(), 'dsPath' : '%s/%s' \ % (local_ldap_server.getDir(),OPENDSNAME), 'dsInstanceHost' : local_ldap_server.getHostname() , 'dsInstancePort' : local_ldap_server.getPort(), 'dsInstanceDn' : local_ldap_server.getRootDn(), 'dsInstancePswd' : local_ldap_server.getRootPwd(), 'DNToModify' : remotePTAuserName , 'listAttributes' : ldapObject , 'changetype' : 'add' } { 'stepMessage' : 'Search users entry as Directory Manager for operational attributes.' } { 'location' : local_ldap_server.getHostname(), 'dsPath' : '%s/%s' \ % (local_ldap_server.getDir(),OPENDSNAME), 'dsInstanceHost' : local_ldap_server.getHostname() , 'dsInstancePort' : local_ldap_server.getPort(), 'dsInstanceDn' : local_ldap_server.getRootDn(), 'dsInstancePswd' : local_ldap_server.getRootPwd(), 'dsBaseDN' : remotePTAuserName , 'dsFilter' : 'objectclass=*' , 'dsAttributes' : '+' } { 'stepMessage' : 'Search users entry as self.' } { 'location' : local_ldap_server.getHostname(), 'dsPath' : '%s/%s' \ % (local_ldap_server.getDir(),OPENDSNAME), 'dsInstanceHost' : local_ldap_server.getHostname() , 'dsInstancePort' : local_ldap_server.getPort(), 'dsInstanceDn' : remotePTAuserName, 'dsInstancePswd' : remotePTAuserPSWD , 'dsBaseDN' : remotePTAuserName , 'dsFilter' : 'objectclass=*' } { 'stepMessage' : 'Modify the users entry.' } { 'location' : local_ldap_server.getHostname(), 'dsPath' : '%s/%s' \ % (local_ldap_server.getDir(),OPENDSNAME), 'dsInstanceHost' : local_ldap_server.getHostname() , 'dsInstancePort' : local_ldap_server.getPort(), 'dsInstanceDn' : remotePTAuserName, 'dsInstancePswd' : remotePTAuserPSWD, 'DNToModify' : remotePTAuserName , 'listAttributes' : ldapObject , 'changetype' : 'replace' } '%s: Test failed. eInfo(%s)' % (eType,eInfo) 'Test Name = %s' % STAXCurrentTestcase { 'stepMessage' : 'Configure LDAP PTA Policy for mapped-search.' } { 'location' : local_ldap_server.getHostname(), 'dsPath' : '%s/%s' \ % (local_ldap_server.getDir(),OPENDSNAME), 'dsInstanceHost' : local_ldap_server.getHostname(), 'dsInstanceAdminPort' : local_ldap_server.getAdminPort(), 'dsInstanceDn' : local_ldap_server.getRootDn(), 'dsInstancePswd' : local_ldap_server.getRootPwd(), 'subcommand' : 'create-password-policy', 'optionsString' : dsconfigOptions } { 'stepMessage' : 'Read back the "authentication policy" object.' } { 'location' : local_ldap_server.getHostname(), 'dsPath' : '%s/%s' \ % (local_ldap_server.getDir(),OPENDSNAME), 'dsInstanceHost' : local_ldap_server.getHostname(), 'dsInstanceAdminPort' : local_ldap_server.getAdminPort(), 'dsInstanceDn' : local_ldap_server.getRootDn(), 'dsInstancePswd' : local_ldap_server.getRootPwd(), 'subcommand' : 'get-password-policy-prop', 'optionsString' : dsconfigOptions } { 'stepMessage' : 'Add ds-pwp-password-policy-dn to users entry.' } { 'location' : local_ldap_server.getHostname(), 'dsPath' : '%s/%s' \ % (local_ldap_server.getDir(),OPENDSNAME), 'dsInstanceHost' : local_ldap_server.getHostname() , 'dsInstancePort' : local_ldap_server.getPort(), 'dsInstanceDn' : local_ldap_server.getRootDn(), 'dsInstancePswd' : local_ldap_server.getRootPwd(), 'DNToModify' : remotePTAuserName , 'listAttributes' : ldapObject , 'changetype' : 'add' } { 'stepMessage' : 'Search users entry as Directory Manager for operational attributes.' } { 'location' : local_ldap_server.getHostname(), 'dsPath' : '%s/%s' \ % (local_ldap_server.getDir(),OPENDSNAME), 'dsInstanceHost' : local_ldap_server.getHostname() , 'dsInstancePort' : local_ldap_server.getPort(), 'dsInstanceDn' : local_ldap_server.getRootDn(), 'dsInstancePswd' : local_ldap_server.getRootPwd(), 'dsBaseDN' : remotePTAuserName , 'dsFilter' : 'objectclass=*' , 'dsAttributes' : '+' } { 'stepMessage' : 'Search users entry as self.' } { 'location' : local_ldap_server.getHostname(), 'dsPath' : '%s/%s' \ % (local_ldap_server.getDir(),OPENDSNAME), 'dsInstanceHost' : local_ldap_server.getHostname() , 'dsInstancePort' : local_ldap_server.getPort(), 'dsInstanceDn' : remotePTAuserName, 'dsInstancePswd' : remotePTAuserPSWD , 'dsBaseDN' : remotePTAuserName , 'dsFilter' : 'objectclass=*' } { 'stepMessage' : 'Modify the users entry.' } { 'location' : local_ldap_server.getHostname(), 'dsPath' : '%s/%s' \ % (local_ldap_server.getDir(),OPENDSNAME), 'dsInstanceHost' : local_ldap_server.getHostname() , 'dsInstancePort' : local_ldap_server.getPort(), 'dsInstanceDn' : remotePTAuserName, 'dsInstancePswd' : remotePTAuserPSWD, 'DNToModify' : remotePTAuserName , 'listAttributes' : ldapObject , 'changetype' : 'replace' } '%s: Test failed. eInfo(%s)' % (eType,eInfo) 'Test Name = %s' % STAXCurrentTestcase { 'stepMessage' : 'Configure LDAP PTA Policy using mapped-search-bind credentials.' } { 'location' : local_ldap_server.getHostname(), 'dsPath' : '%s/%s' \ % (local_ldap_server.getDir(),OPENDSNAME), 'dsInstanceHost' : local_ldap_server.getHostname(), 'dsInstanceAdminPort' : local_ldap_server.getAdminPort(), 'dsInstanceDn' : local_ldap_server.getRootDn(), 'dsInstancePswd' : local_ldap_server.getRootPwd(), 'subcommand' : 'create-password-policy', 'optionsString' : dsconfigOptions } { 'stepMessage' : 'Read back the "authentication policy" object.' } { 'location' : local_ldap_server.getHostname(), 'dsPath' : '%s/%s' \ % (local_ldap_server.getDir(),OPENDSNAME), 'dsInstanceHost' : local_ldap_server.getHostname(), 'dsInstanceAdminPort' : local_ldap_server.getAdminPort(), 'dsInstanceDn' : local_ldap_server.getRootDn(), 'dsInstancePswd' : local_ldap_server.getRootPwd(), 'subcommand' : 'get-password-policy-prop', 'optionsString' : dsconfigOptions } { 'stepMessage' : 'Add ds-pwp-password-policy-dn to users entry.' } { 'location' : local_ldap_server.getHostname(), 'dsPath' : '%s/%s' \ % (local_ldap_server.getDir(),OPENDSNAME), 'dsInstanceHost' : local_ldap_server.getHostname() , 'dsInstancePort' : local_ldap_server.getPort(), 'dsInstanceDn' : local_ldap_server.getRootDn(), 'dsInstancePswd' : local_ldap_server.getRootPwd(), 'DNToModify' : remotePTAuserName , 'listAttributes' : ldapObject , 'changetype' : 'add' } { 'stepMessage' : 'Search users entry as Directory Manager for operational attributes.' } { 'location' : local_ldap_server.getHostname(), 'dsPath' : '%s/%s' \ % (local_ldap_server.getDir(),OPENDSNAME), 'dsInstanceHost' : local_ldap_server.getHostname() , 'dsInstancePort' : local_ldap_server.getPort(), 'dsInstanceDn' : local_ldap_server.getRootDn(), 'dsInstancePswd' : local_ldap_server.getRootPwd(), 'dsBaseDN' : remotePTAuserName , 'dsFilter' : 'objectclass=*' , 'dsAttributes' : '+' } { 'stepMessage' : 'Search users entry as self.' } { 'location' : local_ldap_server.getHostname(), 'dsPath' : '%s/%s' \ % (local_ldap_server.getDir(),OPENDSNAME), 'dsInstanceHost' : local_ldap_server.getHostname() , 'dsInstancePort' : local_ldap_server.getPort(), 'dsInstanceDn' : remotePTAuserName, 'dsInstancePswd' : remotePTAuserPSWD , 'dsBaseDN' : remotePTAuserName , 'dsFilter' : 'objectclass=*' } { 'stepMessage' : 'Modify the users entry.' } { 'location' : local_ldap_server.getHostname(), 'dsPath' : '%s/%s' \ % (local_ldap_server.getDir(),OPENDSNAME), 'dsInstanceHost' : local_ldap_server.getHostname() , 'dsInstancePort' : local_ldap_server.getPort(), 'dsInstanceDn' : remotePTAuserName, 'dsInstancePswd' : remotePTAuserPSWD, 'DNToModify' : remotePTAuserName , 'listAttributes' : ldapObject , 'changetype' : 'replace' } '%s: Test failed. eInfo(%s)' % (eType,eInfo) 'Test Name = %s' % STAXCurrentTestcase { 'stepMessage' : 'Configure LDAP PTA Policy for anon mapped-search over ssl.' } { 'location' : local_ldap_server.getHostname(), 'dsPath' : '%s/%s' \ % (local_ldap_server.getDir(),OPENDSNAME), 'dsInstanceHost' : local_ldap_server.getHostname(), 'dsInstanceAdminPort' : local_ldap_server.getAdminPort(), 'dsInstanceDn' : local_ldap_server.getRootDn(), 'dsInstancePswd' : local_ldap_server.getRootPwd(), 'subcommand' : 'create-password-policy', 'optionsString' : dsconfigOptions } { 'stepMessage' : 'Read back the "authentication policy" object.' } { 'location' : local_ldap_server.getHostname(), 'dsPath' : '%s/%s' \ % (local_ldap_server.getDir(),OPENDSNAME), 'dsInstanceHost' : local_ldap_server.getHostname(), 'dsInstanceAdminPort' : local_ldap_server.getAdminPort(), 'dsInstanceDn' : local_ldap_server.getRootDn(), 'dsInstancePswd' : local_ldap_server.getRootPwd(), 'subcommand' : 'get-password-policy-prop', 'optionsString' : dsconfigOptions } { 'stepMessage' : 'Add ds-pwp-password-policy-dn to users entry.' } { 'location' : local_ldap_server.getHostname(), 'dsPath' : '%s/%s' \ % (local_ldap_server.getDir(),OPENDSNAME), 'dsInstanceHost' : local_ldap_server.getHostname() , 'dsInstancePort' : local_ldap_server.getPort(), 'dsInstanceDn' : local_ldap_server.getRootDn(), 'dsInstancePswd' : local_ldap_server.getRootPwd(), 'DNToModify' : remotePTAuserName , 'listAttributes' : ldapObject , 'changetype' : 'add' } { 'stepMessage' : 'Search users entry as Directory Manager for operational attributes.' } { 'location' : local_ldap_server.getHostname(), 'dsPath' : '%s/%s' \ % (local_ldap_server.getDir(),OPENDSNAME), 'dsInstanceHost' : local_ldap_server.getHostname() , 'dsInstancePort' : local_ldap_server.getPort(), 'dsInstanceDn' : local_ldap_server.getRootDn(), 'dsInstancePswd' : local_ldap_server.getRootPwd(), 'dsBaseDN' : remotePTAuserName , 'dsFilter' : 'objectclass=*' , 'dsAttributes' : '+' } { 'stepMessage' : 'Search users entry as self.' } { 'location' : local_ldap_server.getHostname(), 'dsPath' : '%s/%s' \ % (local_ldap_server.getDir(),OPENDSNAME), 'dsInstanceHost' : local_ldap_server.getHostname() , 'dsInstancePort' : local_ldap_server.getPort(), 'dsInstanceDn' : remotePTAuserName, 'dsInstancePswd' : remotePTAuserPSWD , 'dsBaseDN' : remotePTAuserName , 'dsFilter' : 'objectclass=*' } { 'stepMessage' : 'Modify the users entry.' } { 'location' : local_ldap_server.getHostname(), 'dsPath' : '%s/%s' \ % (local_ldap_server.getDir(),OPENDSNAME), 'dsInstanceHost' : local_ldap_server.getHostname() , 'dsInstancePort' : local_ldap_server.getPort(), 'dsInstanceDn' : remotePTAuserName, 'dsInstancePswd' : remotePTAuserPSWD, 'DNToModify' : remotePTAuserName , 'listAttributes' : ldapObject , 'changetype' : 'replace' } '%s: Test failed. eInfo(%s)' % (eType,eInfo) 'Test Name = %s' % STAXCurrentTestcase { 'stepMessage' : 'Configure LDAP PTA Policy for anon mapped-search over ssl.' } { 'location' : local_ldap_server.getHostname(), 'dsPath' : '%s/%s' \ % (local_ldap_server.getDir(),OPENDSNAME), 'dsInstanceHost' : local_ldap_server.getHostname(), 'dsInstanceAdminPort' : local_ldap_server.getAdminPort(), 'dsInstanceDn' : local_ldap_server.getRootDn(), 'dsInstancePswd' : local_ldap_server.getRootPwd(), 'subcommand' : 'create-password-policy', 'optionsString' : dsconfigOptions } { 'stepMessage' : 'Read back the "authentication policy" object.' } { 'location' : local_ldap_server.getHostname(), 'dsPath' : '%s/%s' \ % (local_ldap_server.getDir(),OPENDSNAME), 'dsInstanceHost' : local_ldap_server.getHostname(), 'dsInstanceAdminPort' : local_ldap_server.getAdminPort(), 'dsInstanceDn' : local_ldap_server.getRootDn(), 'dsInstancePswd' : local_ldap_server.getRootPwd(), 'subcommand' : 'get-password-policy-prop', 'optionsString' : dsconfigOptions } { 'stepMessage' : 'Add ds-pwp-password-policy-dn to users entry.' } { 'location' : local_ldap_server.getHostname(), 'dsPath' : '%s/%s' \ % (local_ldap_server.getDir(),OPENDSNAME), 'dsInstanceHost' : local_ldap_server.getHostname() , 'dsInstancePort' : local_ldap_server.getPort(), 'dsInstanceDn' : local_ldap_server.getRootDn(), 'dsInstancePswd' : local_ldap_server.getRootPwd(), 'DNToModify' : remotePTAuserName , 'listAttributes' : ldapObject , 'changetype' : 'add' } { 'stepMessage' : 'Search users entry as Directory Manager for operational attributes.' } { 'location' : local_ldap_server.getHostname(), 'dsPath' : '%s/%s' \ % (local_ldap_server.getDir(),OPENDSNAME), 'dsInstanceHost' : local_ldap_server.getHostname() , 'dsInstancePort' : local_ldap_server.getPort(), 'dsInstanceDn' : local_ldap_server.getRootDn(), 'dsInstancePswd' : local_ldap_server.getRootPwd(), 'dsBaseDN' : remotePTAuserName , 'dsFilter' : 'objectclass=*' , 'dsAttributes' : '+' } { 'stepMessage' : 'Search users entry as self.' } { 'location' : local_ldap_server.getHostname(), 'dsPath' : '%s/%s' \ % (local_ldap_server.getDir(),OPENDSNAME), 'dsInstanceHost' : local_ldap_server.getHostname() , 'dsInstancePort' : local_ldap_server.getPort(), 'dsInstanceDn' : remotePTAuserName, 'dsInstancePswd' : remotePTAuserPSWD , 'dsBaseDN' : remotePTAuserName , 'dsFilter' : 'objectclass=*' } { 'stepMessage' : 'Modify the users entry.' } { 'location' : local_ldap_server.getHostname(), 'dsPath' : '%s/%s' \ % (local_ldap_server.getDir(),OPENDSNAME), 'dsInstanceHost' : local_ldap_server.getHostname() , 'dsInstancePort' : local_ldap_server.getPort(), 'dsInstanceDn' : remotePTAuserName, 'dsInstancePswd' : remotePTAuserPSWD, 'DNToModify' : remotePTAuserName , 'listAttributes' : ldapObject , 'changetype' : 'replace' } '%s: Test failed. eInfo(%s)' % (eType,eInfo) 'Test Name = %s' % STAXCurrentTestcase { 'stepMessage' : 'Configure LDAP PTA Policy using mapped-search-bind credentials.' } { 'location' : local_ldap_server.getHostname(), 'dsPath' : '%s/%s' \ % (local_ldap_server.getDir(),OPENDSNAME), 'dsInstanceHost' : local_ldap_server.getHostname(), 'dsInstanceAdminPort' : local_ldap_server.getAdminPort(), 'dsInstanceDn' : local_ldap_server.getRootDn(), 'dsInstancePswd' : local_ldap_server.getRootPwd(), 'subcommand' : 'create-password-policy', 'optionsString' : dsconfigOptions } { 'stepMessage' : 'Read back the "authentication policy" object.' } { 'location' : local_ldap_server.getHostname(), 'dsPath' : '%s/%s' \ % (local_ldap_server.getDir(),OPENDSNAME), 'dsInstanceHost' : local_ldap_server.getHostname(), 'dsInstanceAdminPort' : local_ldap_server.getAdminPort(), 'dsInstanceDn' : local_ldap_server.getRootDn(), 'dsInstancePswd' : local_ldap_server.getRootPwd(), 'subcommand' : 'get-password-policy-prop', 'optionsString' : dsconfigOptions } { 'stepMessage' : 'Add ds-pwp-password-policy-dn to users entry.' } { 'location' : local_ldap_server.getHostname(), 'dsPath' : '%s/%s' \ % (local_ldap_server.getDir(),OPENDSNAME), 'dsInstanceHost' : local_ldap_server.getHostname() , 'dsInstancePort' : local_ldap_server.getPort(), 'dsInstanceDn' : local_ldap_server.getRootDn(), 'dsInstancePswd' : local_ldap_server.getRootPwd(), 'DNToModify' : remotePTAuserName , 'listAttributes' : ldapObject , 'changetype' : 'add' } { 'stepMessage' : 'Search users entry as Directory Manager for operational attributes.' } { 'location' : local_ldap_server.getHostname(), 'dsPath' : '%s/%s' \ % (local_ldap_server.getDir(),OPENDSNAME), 'dsInstanceHost' : local_ldap_server.getHostname() , 'dsInstancePort' : local_ldap_server.getPort(), 'dsInstanceDn' : local_ldap_server.getRootDn(), 'dsInstancePswd' : local_ldap_server.getRootPwd(), 'dsBaseDN' : remotePTAuserName , 'dsFilter' : 'objectclass=*' , 'dsAttributes' : '+' } { 'stepMessage' : 'First search users entry as self.' } { 'location' : local_ldap_server.getHostname(), 'dsPath' : '%s/%s' \ % (local_ldap_server.getDir(),OPENDSNAME), 'dsInstanceHost' : local_ldap_server.getHostname() , 'dsInstancePort' : local_ldap_server.getPort(), 'dsInstanceDn' : remotePTAuserName, 'dsInstancePswd' : remotePTAuserPSWD , 'dsBaseDN' : remotePTAuserName , 'dsFilter' : 'objectclass=*' } { 'stepMessage' : 'Stop the primary remote ldap server.' } [[primary_remote_ldap_server]] { 'stepMessage' : 'Second search users entry as self.' } { 'location' : local_ldap_server.getHostname(), 'dsPath' : '%s/%s' \ % (local_ldap_server.getDir(),OPENDSNAME), 'dsInstanceHost' : local_ldap_server.getHostname() , 'dsInstancePort' : local_ldap_server.getPort(), 'dsInstanceDn' : remotePTAuserName, 'dsInstancePswd' : remotePTAuserPSWD , 'dsBaseDN' : remotePTAuserName , 'dsFilter' : 'objectclass=*' } { 'stepMessage' : 'Modify the users entry.' } { 'location' : local_ldap_server.getHostname(), 'dsPath' : '%s/%s' \ % (local_ldap_server.getDir(),OPENDSNAME), 'dsInstanceHost' : local_ldap_server.getHostname() , 'dsInstancePort' : local_ldap_server.getPort(), 'dsInstanceDn' : remotePTAuserName, 'dsInstancePswd' : remotePTAuserPSWD, 'DNToModify' : remotePTAuserName , 'listAttributes' : ldapObject , 'changetype' : 'replace' } { 'stepMessage' : 'Restart the primary remote ldap server.' } [[primary_remote_ldap_server]] { 'stepMessage' : 'Wait for monitor heartbeat to primary remote ldap server.' } { 'sleepForMilliSeconds' : '5000' } { 'stepMessage' : 'Third search users entry as self.' } { 'location' : local_ldap_server.getHostname(), 'dsPath' : '%s/%s' \ % (local_ldap_server.getDir(),OPENDSNAME), 'dsInstanceHost' : local_ldap_server.getHostname() , 'dsInstancePort' : local_ldap_server.getPort(), 'dsInstanceDn' : remotePTAuserName, 'dsInstancePswd' : remotePTAuserPSWD , 'dsBaseDN' : remotePTAuserName , 'dsFilter' : 'objectclass=*' } { 'stepMessage' : 'Stop the secondary remote ldap server.' } [[secondary_remote_ldap_server]] { 'stepMessage' : 'Fourth search users entry as self.' } { 'location' : local_ldap_server.getHostname(), 'dsPath' : '%s/%s' \ % (local_ldap_server.getDir(),OPENDSNAME), 'dsInstanceHost' : local_ldap_server.getHostname() , 'dsInstancePort' : local_ldap_server.getPort(), 'dsInstanceDn' : remotePTAuserName, 'dsInstancePswd' : remotePTAuserPSWD , 'dsBaseDN' : remotePTAuserName , 'dsFilter' : 'objectclass=*' } { 'stepMessage' : 'Start the secondary remote ldap server.' } [[secondary_remote_ldap_server]] '%s: Test failed. eInfo(%s)' % (eType,eInfo) 'Test Name = %s' % STAXCurrentTestcase { 'stepMessage' : 'Configure LDAP PTA Policy using mapped-search-bind credentials.' } { 'location' : local_ldap_server.getHostname(), 'dsPath' : '%s/%s' \ % (local_ldap_server.getDir(),OPENDSNAME), 'dsInstanceHost' : local_ldap_server.getHostname(), 'dsInstanceAdminPort' : local_ldap_server.getAdminPort(), 'dsInstanceDn' : local_ldap_server.getRootDn(), 'dsInstancePswd' : local_ldap_server.getRootPwd(), 'subcommand' : 'create-password-policy', 'optionsString' : dsconfigOptions } { 'stepMessage' : 'Read back the "authentication policy" object.' } { 'location' : local_ldap_server.getHostname(), 'dsPath' : '%s/%s' \ % (local_ldap_server.getDir(),OPENDSNAME), 'dsInstanceHost' : local_ldap_server.getHostname(), 'dsInstanceAdminPort' : local_ldap_server.getAdminPort(), 'dsInstanceDn' : local_ldap_server.getRootDn(), 'dsInstancePswd' : local_ldap_server.getRootPwd(), 'subcommand' : 'get-password-policy-prop', 'optionsString' : dsconfigOptions } { 'stepMessage' : 'Add ds-pwp-password-policy-dn to users entry.' } { 'location' : local_ldap_server.getHostname(), 'dsPath' : '%s/%s' \ % (local_ldap_server.getDir(),OPENDSNAME), 'dsInstanceHost' : local_ldap_server.getHostname() , 'dsInstancePort' : local_ldap_server.getPort(), 'dsInstanceDn' : local_ldap_server.getRootDn(), 'dsInstancePswd' : local_ldap_server.getRootPwd(), 'DNToModify' : remotePTAuserName , 'listAttributes' : ldapObject , 'changetype' : 'add' } { 'stepMessage' : 'Search users entry as Directory Manager for operational attributes.' } { 'location' : local_ldap_server.getHostname(), 'dsPath' : '%s/%s' \ % (local_ldap_server.getDir(),OPENDSNAME), 'dsInstanceHost' : local_ldap_server.getHostname() , 'dsInstancePort' : local_ldap_server.getPort(), 'dsInstanceDn' : local_ldap_server.getRootDn(), 'dsInstancePswd' : local_ldap_server.getRootPwd(), 'dsBaseDN' : remotePTAuserName , 'dsFilter' : 'objectclass=*' , 'dsAttributes' : '+' } { 'stepMessage' : 'First search users entry as self.' } { 'location' : local_ldap_server.getHostname(), 'dsPath' : '%s/%s' \ % (local_ldap_server.getDir(),OPENDSNAME), 'dsInstanceHost' : local_ldap_server.getHostname() , 'dsInstancePort' : local_ldap_server.getPort(), 'dsInstanceDn' : remotePTAuserName, 'dsInstancePswd' : remotePTAuserPSWD , 'dsBaseDN' : remotePTAuserName , 'dsFilter' : 'objectclass=*' } { 'stepMessage' : 'Stop the primary remote ldap server.' } [[primary_remote_ldap_server]] { 'stepMessage' : 'Second search users entry as self.' } { 'location' : local_ldap_server.getHostname(), 'dsPath' : '%s/%s' \ % (local_ldap_server.getDir(),OPENDSNAME), 'dsInstanceHost' : local_ldap_server.getHostname() , 'dsInstancePort' : local_ldap_server.getPort(), 'dsInstanceDn' : remotePTAuserName, 'dsInstancePswd' : remotePTAuserPSWD , 'dsBaseDN' : remotePTAuserName , 'dsFilter' : 'objectclass=*' } { 'stepMessage' : 'Modify the users entry.' } { 'location' : local_ldap_server.getHostname(), 'dsPath' : '%s/%s' \ % (local_ldap_server.getDir(),OPENDSNAME), 'dsInstanceHost' : local_ldap_server.getHostname() , 'dsInstancePort' : local_ldap_server.getPort(), 'dsInstanceDn' : remotePTAuserName, 'dsInstancePswd' : remotePTAuserPSWD, 'DNToModify' : remotePTAuserName , 'listAttributes' : ldapObject , 'changetype' : 'replace' } { 'stepMessage' : 'Restart the primary remote ldap server.' } [[primary_remote_ldap_server]] { 'stepMessage' : 'Wait for monitor heartbeat to primary remote ldap server.' } { 'sleepForMilliSeconds' : '5000' } { 'stepMessage' : 'Third search users entry as self.' } { 'location' : local_ldap_server.getHostname(), 'dsPath' : '%s/%s' \ % (local_ldap_server.getDir(),OPENDSNAME), 'dsInstanceHost' : local_ldap_server.getHostname() , 'dsInstancePort' : local_ldap_server.getPort(), 'dsInstanceDn' : remotePTAuserName, 'dsInstancePswd' : remotePTAuserPSWD , 'dsBaseDN' : remotePTAuserName , 'dsFilter' : 'objectclass=*' } { 'stepMessage' : 'Stop the secondary remote ldap server.' } [[secondary_remote_ldap_server]] { 'stepMessage' : 'Fourth search users entry as self.' } { 'location' : local_ldap_server.getHostname(), 'dsPath' : '%s/%s' \ % (local_ldap_server.getDir(),OPENDSNAME), 'dsInstanceHost' : local_ldap_server.getHostname() , 'dsInstancePort' : local_ldap_server.getPort(), 'dsInstanceDn' : remotePTAuserName, 'dsInstancePswd' : remotePTAuserPSWD , 'dsBaseDN' : remotePTAuserName , 'dsFilter' : 'objectclass=*' } { 'stepMessage' : 'Start the secondary remote ldap server.' } [[secondary_remote_ldap_server]] '%s: Test failed. eInfo(%s)' % (eType,eInfo)