| as testid@aaf.att.com |
| expect 200,404 |
| |
| # TC_Role1.99.05.POS Remove Permissions from "40_reports" |
| set force=true perm delete com.test.TC_Role1.@[user.name].samplePerm1 some.long(involved).text SELECT |
| set force=true perm delete com.test.TC_Role1.@[user.name].samplePerm1 some.other_long(less.involved).text lower_case |
| |
| # TC_Role1.99.10.POS Namespace Admin can delete Namepace defined Roles |
| force role delete com.test.TC_Role1.@[user.name].r.A |
| force role delete com.test.TC_Role1.@[user.name].r.B |
| force role delete com.test.TC_Role1.@[user.name].r.C |
| |
| # TC_Role1.99.15.POS Remove ability to create creds |
| user role del testid@aaf.att.com com.test.TC_Role1.@[user.name].cred_admin |
| |
| as XX@NS |
| perm ungrant com.att.aaf.mechid com.att create com.test.TC_Role1.@[user.name].cred_admin |
| |
| as testid@aaf.att.com |
| role delete com.test.TC_Role1.@[user.name].cred_admin |
| |
| # TC_Role1.99.20.POS Namespace Admin can delete permissions and credentials |
| perm delete com.test.TC_Role1.@[user.name].p.C myInstance myAction |
| set force=true |
| user cred del m00001@@[user.name].TC_Role1.test.com |
| |
| # TC_Role1.99.90.POS Namespace Admin can delete Namespace |
| force ns delete com.test.TC_Role1.@[user.name].r |
| force ns delete com.test.TC_Role1.@[user.name] |
| |
| # TC_Role1.99.99.POS List to prove clean Namespaces |
| ns list name com.test.TC_Role1.@[user.name].r |
| ns list name com.test.TC_Role1.@[user.name] |
| |