-
-
Notifications
You must be signed in to change notification settings - Fork 1.3k
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Ambiguity in the summary related to the test case Testing for Bypassing Authorization Schema #1089
Comments
Would it be more clear if the first one was: "...user was never authenticated". |
In my opinion, it is still ambiguous with this change because when the user is not authenticated or the user has never been authenticated, it is still included in the Bypassing Authentication Schema test case. How can a user be given access level without authentication or after logging out? Authorization Schema means when the user is authenticated and has a type of access level, while case 1 and 2 refer to users without authentication and without access level, so it should be tested in the case of Bypassing Authentication Schema because the user can in any way Access resources that only authenticated users should have access to. Do you agree with the following sentence? |
Hey @mojtaba13133 , thank you for sharing your thoughts on this. I don't fully agree with your sentence. Authentication and Authorization aren't necessarily linked to each other. I can give you an API token, not knowing anything about you, as a "user", yet you'd have permissions and access scopes. Authentication concerns itself with identifying who the user is, authorization concerns itself with what permissions does a token/session/whatever has. They live together, separately.
I hope this clarifies the matter at hand. |
I agree with your example. But this case is very special and should not be considered a special case in general. |
These 2 lines are mentioned in the summary of the Testing for Bypassing Authorization Schema test case, but the access level has no meaning if the user has no session and no authentication.
1- Is it possible to access that resource even if the user is not authenticated?
2- Is it possible to access that resource after the log-out?
In your opinion, 2 items include Testing for Bypassing Authentication Schema test case?
Please explain to me how access after logout or without authentication can be included in this test case while this test case examines the level of access of authenticated users horizontally and vertically?
This seems to be in conflict with the Direct page request in Testing for Bypassing Authentication Schema
The text was updated successfully, but these errors were encountered: