Next: ovsec_kadm_chpass_principal_util
Up: ovsec_kadm_chpass_principal
Previous: Other quality/history tests
- Number:
- 169
- Reason:
- Fails for non-existent principal.
- Number:
- 170
- Reason:
- Fails for null password.
- Number:
- 171
- Priority:
- High
- Reason:
- Fails for empty-string password.
- Number:
- 172
- Priority:
- High
- Reason:
- Pw_expiration is set to now + max_pw_life if policy exists and
has non-zero max_pw_life.
- Number:
- 173
- Priority:
- High
- Reason:
- Pw_expiration is set to 0 if policy exists and has zero
max_pw_life.
- Number:
- 174
- Priority:
- High
- Reason:
- Pw_expiration is set to 0 if no policy.
- Number:
- 175
- Priority:
- High
- Reason:
- KRB5_KDC_REQUIRES_PWCHANGE bit is cleared when password is
successfully changed.
- Number:
- 176
- Priority:
- High
- Reason:
- Fails for user with no access bits, on other's password.
- Number:
- 177
- Priority:
- High
- Reason:
- Fails for user with ``get'' but not ``modify'' access, on
other's password.
- Number:
- 178
- Reason:
- Fails for user with ``delete'' but not ``modify'' access, on
other's password.
- Number:
- 179
- Reason:
- Fails for user with ``add'' but not ``modify'' access, on
other's password.
- Number:
- 180
- Reason:
- Succeeds for user with ``get'' and ``modify'' access, on
other's password.
- Status:
- Implemented
- Number:
- 180.5
- Priority:
- High
- Reason:
- Succeeds for user with ``modify'' but not ``get'' access, on
other's password.
- Conditions:
- RPC
- Status:
- Implemented
- Number:
- 180.625
- Priority:
- High
- Reason:
- Fails for user with modify when connecting with CHANGEPW_SERVICE on
others password
- Conditions:
- RPC
- Status:
- Implemented
- Number:
- 180.75
- Priority:
- High
- Reason:
- Fails for user with modify when connecting with CHANGEPW_SERVICE
on other's password which has expired
- Conditions:
- RPC
- Status:
- Implemented
- Number:
- 182
- Priority:
- High
- Reason:
- Can not change key of ovsec_adm/history principal.
- Status:
- Implemented
- Number:
- 183
- Priority:
- High
- Reason:
- Returns BAD_SERVER_HANDLE when a null server handle is passed in
- Status:
- Implemented
- Number:
- 184
- Priority:
- Low
- Reason:
- Connects to correct server when mutliple handles exist
- Conditions:
- RPC
- Number:
- 200
- Version:
- KADM5_API_VERSION_2
- Reason:
- Creates a key for the principal for each unique encryption
type/salt type in use.
- Status:
- Implemented
Next: ovsec_kadm_chpass_principal_util
Up: ovsec_kadm_chpass_principal
Previous: Other quality/history tests
Autobuild
2009-09-05