Bug 39616 - test expired password and disabled accounts on SAML login
test expired password and disabled accounts on SAML login
Status: CLOSED DUPLICATE of bug 39657
Product: UCS Test
Classification: Unclassified
Component: General
unspecified
Other All
: P5 normal (vote)
: ---
Assigned To: Jürn Brodersen
:
Depends on: 39181
Blocks:
  Show dependency treegraph
 
Reported: 2015-10-22 12:32 CEST by Alexander Kläser
Modified: 2023-03-25 06:42 CET (History)
4 users (show)

See Also:
What kind of report is it?: Development Internal
What type of bug is this?: ---
Who will be affected by this bug?: ---
How will those affected feel about the bug?: ---
User Pain:
Enterprise Customer affected?:
School Customer affected?:
ISV affected?:
Waiting Support:
Flags outvoted (downgraded) after PO Review:
Ticket number:
Bug group (optional):
Max CVSS v3 score:


Attachments

Note You need to log in before you can comment on or make changes to this bug.
Description Alexander Kläser univentionstaff 2015-10-22 12:32:26 CEST
This would probably also be a good test.

+++ This bug was initially created as a clone of Bug #39181 +++

During testing I discovered that an expired password change is not requested
when the user logs on to a SSO service.

As SimpleSAMLphp is integrated in UCS, I expected a password expiration check.

Reference: 
http://docs.univention.de/manual-3.1.html#users:passwords
http://wiki.univention.de/index.php?title=SAML_Identity_Provider
Comment 1 Jürn Brodersen univentionstaff 2015-11-02 13:43:50 CET

*** This bug has been marked as a duplicate of bug 39657 ***
Comment 2 Stefan Gohmann univentionstaff 2016-10-12 07:49:16 CEST
For this bug is no separate QA needed.