테스트 편집기에서 테스트 요소는 테스트 스위트의
첫 번째 요소입니다. 테스트 요소의 설정은 전체 테스트에
적용됩니다.
공통 옵션
- 데이터 풀
- 이는 테스트가 사용하는 각 데이터 풀에 대한 세부사항을 나열합니다(데이터 풀의
이름, 사용되는 열 및 데이터 풀 열이 참조되는 테스트에서의
위치). 이동하려는 위치를 클릭하십시오.
- 데이터 풀 추가
- 이는 테스트에서 사용하려는 데이터 풀에 참조를 추가합니다. 이 옵션을 클릭하는 것은 테스트를 선택한 상태에서 을 클릭하는 것과
같습니다.
- 제거
- 이는 선택된 데이터 풀을 제거합니다. 데이터 풀이 사용 중인 경우에는 이 옵션을 사용할 수 없습니다.
SSL configuration
Define an
SSL configuration for certificate authentication between the client
and the server. SSL configurations can be used by any message request
in the test. If you use multiple SSL configurations in the test, you
must specify the configuration in each message request.
The
default SSL configuration always trusts servers, which is equivalent
to no authentication.
- SSL configuration
- Select an existing SSL configuration or create one. You can use
the toolbar push buttons to create a New SSL
configuration and to Rename or Delete existing
SSL configurations. You can also Copy and Paste SSL
configurations to and from the SSL editor and the test editor.
- Server Authentication
- This section describes how the client trusts the server.
- Always trust server
- Select this option if no authentication is required or to ignore
server certificates so that all servers are trusted. If you are using
single authentication and you want to accept trusted servers only,
then disable this option and specify a truststore that contains the
trusted server certificates.
- Client truststore
- When you are using single authentication, the client truststore
contains the certificates of all trusted servers. Click Browse to
specify a KS, JKS, or JCEKS file containing valid certificates of
the trusted servers.
- Password
- If the client truststore file is encrypted, type the password
required to access the file.
- Mutual Authentication
- This section describes how the server trusts the client in addition
to server authentication.
- Use client-side certificate
- If you are using double authentication, select this option to
specify a keystore containing the client certificate. This certificate
allows the server to authenticate the client.
- Client certificate keystore
- Click Browse to specify a KS, JKS, or JCEKS
file containing a valid certificate that authenticates the client.
- Password
- If the client truststore file is encrypted, type the password
required to access the file.
- Select trust alias for Mutual Authentication
- Select an alias to be used for the SSL configuration. There could
be multiple aliases in a keystore for different security certificates.
Choose an appropriate alias for a user. You can also use datapool
to store aliases that you can apply to virtual users at run time.
프로토콜 구성(HTTP)
테스트 요소의 HTTP 구성 페이지는
서버 라이브러리가 HTTP 전송 및 수신 기능을 실행하기 위해 요청하는
정보를 지정합니다.
HTTP 구성은 테스트에서 메시지 호출이 사용할 수 있습니다.
테스트에서 여러 프로토콜 구성을 사용 중인 경우,
각 메시지 호출에 대한 구성을 지정해야 합니다.
- Use HTTP Keep Alive
- Select this option to keep the HTTP connection open after the
request. This option is not available if you are using IBM® Rational® AppScan®.
- Use SSL
- Select this option to use an SSL configuration. Click Configure
SSL to create an SSL configuration or select an existing
configuration.
- Platform Authentication
- In this section, specify the type of authentication that is required
to access the service. Select None if no authentication
is required.
- Basic HTTP authentication
- Select this option to specify the User Name and Password that
are used for basic authentication.
- NTLM authentication
- Select this option to use the Microsoft NT
LAN Manager (NTLM) authentication protocol. NTLM uses challenge-response
authentication. This view lists what is negotiated (supported by the
client and requested of the server) and what is authenticated (the
client reply to the challenge from the server).
- Kerberos authentication
- Select this option to use the Kerberos authentication protocol
between the client and server.
- Connect through proxy server
- If the HTTP connection needs to go through a proxy server or a
corporate firewall, specify the Address and Port of
the proxy server. If the proxy requires authentication, select either Basic
proxy authentication or NTLM proxy authentication.
- Proxy authentication
- In this section, specify the type of authentication that is required
to access the proxy. Select None if no authentication
is required.
- Basic proxy authentication
- Select this option to specify the User Name and Password that
are used for basic authentication.
- NTLM proxy authentication
- Select this option to use the Microsoft NT
LAN Manager (NTLM) authentication protocol. NTLM uses challenge-response
authentication. This view lists what is negotiated (supported by the
client and requested of the server) and what is authenticated (the
client reply to the challenge from the server).
- Custom class
- Select this option if the communication protocol requires complex,
low-level processing with a custom Java™ code
to transform incoming or outgoing messages. Click Browse to
select a Java class that uses
the corresponding API. This option is not available in IBM Security AppScan.
프로토콜 구성(JMS)
테스트 요소의 JMS(Java Message Service) 구성 페이지는 서버 라이브러리가 JMS 전송 및 수신을 실행하기 위해 요청하는 정보를 지정합니다.
JMS 구성은 테스트에서 메시지 호출이 사용할 수 있습니다.
테스트 내에서 여러 프로토콜 구성을 사용 중인 경우,
각 메시지 호출에서 구성을 지정해야 합니다.
- Destination style
- This is the style of the JMS destination. Select either Topic or Queue.
- End-point address
- This is the address of the destination.
- Use temporary object
- Select this option to send the JMS destination as a temporary
object. For a JMS queue, a temporary JMS queue is sent in the message.
- Reception point address
- If Use temporary object is disabled, specify
the JMS address of the destination endpoint.
- Basic authentication
- Select this option to specify the User Name and Password that
are used for basic authentication.
- Custom adapter class name
- Set up a custom Java Naming
and Directory Interface (JNDI) vendor adapter for this configuration.
To use a custom adapter, you must write a Java class that extends the Axis class and methods.
Specify the name of your custom adapter class in Adapter
class name.
- Text message
- Specify whether the message is a text or a byte message.
- Context factory properties
- Edit the properties for a context factory. Click Add to
add string properties to the context factory configuration.
- Connector properties
- Edit the properties for a connector. Click Add to
add string properties to the connector configuration. The product
supports the following connectors:
- JMS priority
- JMS delivery mode
- JMS time to live
프로토콜 구성(WebSphere MQ)
테스트 요소의 WebSphere® MQ 구성 페이지는
서버 라이브러리가 WebSphere MQ 전송 송수신 기능을 실행하기 위해 요청하는
정보를 지정합니다.
MQ 구성은 테스트에서 메시지 호출이 사용할 수 있습니다.
테스트에서 여러 프로토콜 구성을 사용 중인 경우,
각 메시지 호출에 대한 구성을 지정해야 합니다.
- Queue Manager
- Use this area to specify queue manager options for the service.
- Queue manager name
- Specify the name of the queue manager to which to send the request.
- Use local queue manager
- Select this option to use a local queue manager. If you disable
this option, specify the following information:
- Queue manager address
- Specify the IP address or host name of the remote WebSphere MQ server.
- Queue manager port
- Specify the listener port of the remote WebSphere MQ server.
- Client channel
- Specify the server-connection mode channel of the remote queue
manager.
- Queues
- Use this area to specify the send queue options for the service.
- Send queue name
- Specify the name of the queue that the queue manager manages.
- Use temporary queue for response
- Specifies whether the WebSphere MQ
server creates a temporary queue. If selected, the temporary queue
is created for the sole purpose of receiving specific messages, and
then deleted.
- Receive queue name
- If Use temporary queue is cleared, this
option specifies the queue manager that is specified on the Queue
manager name line. The specified queue manager must manage
this queue. You can specify multiple queue names by using a semicolon
(;) as a separator.
- Use RFH2 header
- Select whether to use the transport for SOAP over MQ feature that
is provided by WebSphere MQ.
This feature uses a predetermined MQ message format (RFH2); therefore,
when selected, other Message Descriptor options
are disabled.
- SSL connection
- Select this option to use an SSL configuration if a Client
Channel setting refers to a secure channel. Click Open
SSL Editor to create an SSL configuration or Change to
change the SSL configuration that is associated with the current test.
If
the WSDL that you use to create the message request uses a supported
JMS URI to point to the WebSphere MQ
server, then the SSL configuration is created automatically. If the
test generator is unable to create the SSL configuration, you must
create a new one manually.
If the WSDL is generated with the WebSphere MQ service (amqwdeployWMService),
you must edit the WSDL to change the transport binding from HTTP to
JMS to prevent the test generator from producing an HTTP configuration.
- Cipher suite
- Specify the cipher suite that is used in the channel configuration.
- Message Descriptor
- Configure the fields of the request. You can replace a subset
of an MQ message descriptor with a custom format for use with other
server types, specifically when using an XML message request. Refer
to WebSphere MQ documentation
for details about message descriptors.
- Use the Message Properties table to specify
the following MQ message properties:
- JMSXDeliveryCount
- JMSXGroupSeq
- JMS_IBM_Report_Exception
- JMS_IBM_Report_Expiration
- JMS_IBM_Report_COA
- JMS_IBM_Report_COD
- JMS_IBM_Report_PAN
- JMS_IBM_Report_NAN
- JMS_IBM_Report_Pass_Msg_ID
- JMS_IBM_Report_Pass_Correl_ID
- JMS_IBM_Report_Discard_Msg
- JMS_IBM_MsgType
- JMS_IBM_Feedback
- JMS_IBM_PutApplType
- JMS_IBM_Encoding
- JMS_IBM_Last_Msg_In_Group
For more information about these properties, refer to the IBM WebSphere MQ documentation.
- Target service
- When using Microsoft .NET
framework with the SOAP over MQ feature of WebSphere MQ, specify the name of the target
service for the WSDL.