Abstract: It is a challenging task for IT industry is to deliver software products that meet the business needs. It is a necessity to deliver software that is free of bugs. The bugs in software can cause major loss for IT organization in case they are not removed before delivery. To deliver good quality software, an efficient testing is to be conducted. Statistics say that 50% of the total cost of software development is devoted to software testing; it is even more in case of critical software. Depending on time, scale and performing methods we can classify testing. Test data can be designed either manually or automatically. Software engineering research puts large emphasis on automating the software development process that produce large more complex quantities of code with less effort. For testing this software, there is need of finding advanced innovative support procedures to automate the testing process.
The motivation for automating test cases is to have non-programmers not lose the comfort level that they would have with the degree of informality, ambiguity (without exactness) that is inherent in natural-language expressions, and that would be closer to their thought processes. Thus, the goal is to improve the efficiency of automating the manual tests by automating the automation task. Automated software testing is automating the manual process of testing software. Automated Testing is gaining interest these days as it reduces the time and increases the efficiency.
The paper includes the automated testing development of Web access management (WAM).Web access management (WAM) is a form of identity management that controls access to web resources, providing authentication management, policy-based authorizations, audit and reporting services (optional) and single sign-on convenience. Authentication management is the process of determining a user’s (or application’s) identity. This is normally done by prompting for a user name and a password. Additional methods of authentication can also include access tokens (which generate one-time passwords) and digital certificates.
Once a user's (or process') identity is confirmed, policy-based authorization comes into play. A web resource can have one or more policies attached to it that say e.g. "only allow internal employees to access this resource" and/or "only allow members of the Admin Group to access this resource." The requested resource is used to look up the policy, and then the policy is evaluated against the user’s identity. If the user passes the policy evaluation, she/he is granted access to the resource. If the user fails the evaluation, access is denied.
Keywords: Authentication, Access Management (AxM), Agent, selenium, web server, Authorization.
Title: Web Agent Automation Development for Web Access Management
Author: Charan kumar H L, A Thyagaraja Murthy
International Journal of Computer Science and Information Technology Research
ISSN 2348-1196 (print), ISSN 2348-120X (online)
Research Publish Journals