You can choose whether or not to display the toolbar in the Main window... and whether or not to display names with the toolbar icons. A check next to the menu option indicates that the item is visible. All users can can customize their client via Client Settings , but only the “SMS” user can customize the TAS/System. The TAS can be customized via Server Settings and Edit Settings.
Select View > Toolbar to display or hide the toolbar
Select View > Show Names on Toolbar to display or hide the status bar
Supported by RESTFul API - Using the RESTFul API contains reference information about the Landslide RESTFul API system. Refer to Swagger UI on Landslide Home Page, it contains the latest most accurate information for anything it covers.
NOTE: The Client Toolbar shows names/labels on the newly installed clients. |
You can also specify default directories, choose which confirmation dialog boxes you wish to be displayed, and set graphing defaults with the Client Settings window. Client settings are saved in your home directory on the client platform, not on the test system. If you log in from another platform, the settings use the system defaults.
You can customize an individual Client with Client Settings:
To define your settings:
1. |
Select Admin > Client Settings and the Client Settings window opens. |
|||||||||||||||||||||||
2. |
Select the Appearance option to set the GUI look and feel, Window display mode, Window Tree, Wallpaper, and Real-Time Logs Login State/Mode display.
|
|||||||||||||||||||||||
3. |
Select the Confirmations option to set the appropriate test case confirmations (abort, stop, etc.).
Select the check-boxes of confirmations that you wish to see and clear the check-boxes of confirmations that you do not want to be displayed. |
|||||||||||||||||||||||
4. |
Select the Directories option. You can specify the following default directories:
In each directory option, select one of the following options:
|
|||||||||||||||||||||||
5. |
Select the Graphing option. Select the required checkbox to set the default Y-axis options on the Graph tab.
|
|||||||||||||||||||||||
6. |
Select the Libraries option. You can specify the following default libraries:
In each library option, select one of the following options:
|
|||||||||||||||||||||||
7. |
Select the Login option to set whether to load all test cases and/or check for any disconnected tests on login. Select the check-boxes of actions that you wish to perform upon login and clear the check-boxes of actions that you do not want to be performed upon login. Load All Test Case Jars on Login - Select this to force the client to download all licensed test case jars/libraries upon login. Otherwise test case jars/libraries will only be downloaded when they are needed. Regardless, a test case library is only downloaded to the client one time, and not again until a new version of the Test Case is available on the TAS, either via upgrade, downgrade or official test suite import. Check for disconnected tests on Login – Select this to force the client to query for disconnected tests and immediately display the Reconnect to Test dialog if any are found. (This only applies to Test Sessions) |
|||||||||||||||||||||||
8. |
Select Test Session. You can specify default values for the following:
Works in conjunction with new Test Session attribute Options: Always WARNING logs Always INFO logs Default WARNING logs for new test sessions Default INFO logs for new test sessions The Always options will force all tests that you run to the selected options. The Default options will just automatically set new test sessions to the selection, but when you run tests, whatever value you set in the test session will be used.
options:
options: 250, 500, 1000, 5000. |
|||||||||||||||||||||||
9. |
Select the Utilities option to execute client maintenance functions: Reset Client Settings - Resets Client Settings to factory default values, which will remove everything you’ve saved to the settings file (settings.pro).
Cache/Temporary File Usage - Displays the usage of the cache/temp files.
|
|||||||||||||||||||||||
9. |
Click OK or APPLY to save your changes and close the window or Cancel to discard your changes. |
You can customize the TAS with: Edit Settings , Server Settings (see options below)
1. |
Select Admin > Server Settings and the Server Settings window opens. Select the User Authentication Method (User-Auth). Options :
|
||||||||||||||||||||||||||||||||||||
2. |
Select Automatic Creation of User Accounts Upon Login to enable automatic creation of Landslide user account when a new user logs in to the TAS when a 3rd Party authentication is enabled. Not available when User Authentication Method = Default. Breakdown of the different methods and their support for auto-adding new users and for assigning the user-levels:
A new User will be created automatically based on the input from the login dialog.
If the 3rd party authentication service is OKTA, the Privilege level can be set based on the OKTA user configuration. If the TAS successfully creates the user as part of the login, the following information will be logged to the Real-Time (System) Log: |
||||||||||||||||||||||||||||||||||||
3. |
Select Enable Custom Privilege Level Mapping to to identify the User Privilege level. Landslide uses the user group defined in the OIDC provider/Spirent OAuth/TACACS+/OKTA OIDC Platform to identify the User Privilege level. User can provide the custom User Group Name to override the default User Group <-> Privilege Level Mapping. The Default Privilege Level Mapping: When the User Authentication Method is selected in one of the following scopes: [OIDC, Spirent OAuth, OKTA OIDC, TACACS+]. Below screenshot is an example group names and users info with Custom Privilege Level Mapping enabled for OKTA OIDC’s instance and TAS Real Time log showing the users login:
landslide01 2023-05-23 10:25:16 Informational Operations Login User landslide01 logged in from [email protected]:51077 as System Administrator If User didn’t enable the Custom Privilege Level Mapping, The Default Privilege Level Mapping will be as follows: This means that if the username is not already defined in Landslide with a definitive Level, when the user logs in, Landslide will assign the Level based on these default mapping OR else will default to Test Operator if no match is found. Below screenshot is an example group names and users info with Custom Privilege Level Mapping disabled for OKTA OIDC’s instance and TAS Real Time log showing the users login:
landslide01 2023-05-23 10:11:01 Informational Operations Login User landslide01 logged in from [email protected]:50933 as System Administrator |
||||||||||||||||||||||||||||||||||||
4. |
Select LDAP to Authenticate the Landslide users. When LDAP is enabled, all users except 'sms' will be authenticated by the LDAP server and not the internal password. LDAP requires that users be added to Landslide, their user names should match the user names in the LDAP server, minus their domain, if any.
LDAP does not support a mapping function from group/roles to Landslide User-Level. The user-level will be determined by their local User Account setting or if an automatically created user, they will be assigned Test Operator. GUI, TeX, Tcl API Login will be standard way with username/password. Added some new/updated Real-Time Logs related to the LDAP Authentication:
If user login fails, and it was using LDAP, you will see LDAP in the message:
<system> 2018-07-26 16:39:53 Informational System HTTPClient:[email protected]: Login with user name: User1 failed LDAP authentication
If switched between primary and secondary server:
User1 2018-07-27 07:19:10 Informational Operations Login user User1 logged out from [email protected] sms 2018-07-27 07:19:21 Informational SysAdmin Modify [email protected]: Modified Server Settings <system> 2018-07-27 07:19:33 Warning SysAdmin Login LDAP switched to secondary server User1 2018-07-27 07:19:33 Informational Operations Login user User1 logged in from [email protected] Client=GUI user=User1 timezone=America/New_York os=Windows 7 CommLogged User1 2018-07-27 07:21:00 Informational Operations Login user User1 logged out from [email protected] User1 2018-07-27 07:21:07 Informational Operations Login user User1 logged in from [email protected] Client=GUI user=User1 timezone=America/New_York os=Windows 7 CommLogged sms 2018-07-27 07:21:47 Informational SysAdmin Modify [email protected]: Modified Server Settings User1 2018-07-27 07:21:55 Informational Operations Login user User1 logged out from [email protected] <system> 2018-07-27 07:22:05 Warning SysAdmin Login LDAP switched back to primary server User1 2018-07-27 07:22:05 Informational Operations Login user User1 logged in from [email protected] Client=GUI user=User1 timezone=America/New_York os=Windows 7 CommLogged |
||||||||||||||||||||||||||||||||||||
5. |
Select TACACS+ to Authenticate the Landslide users. TACACS+ - Terminal Access Controller Access Control Server is a security protocol used in the AAA framework to provide centralized authentication for users who want to gain access to the network.
When sending Authorization request, the TAS sends the converted TACACS+ Privilege level for priv_lvl and expects the ICE/TACACS to confirm the user is authorized to use that level. And for user-level assignment TACACS+ has a fixed mapping. Authorization Behavior: If the automatic creation of user accounts upon login is not selected, the login of an unknown user will be rejected by the TAS. After that, during the authorization phase of TACACS+, Landslide will send the information of the user (exampleUsername, examplePassword) and the priv-level to the TACACS+ server to request authorization. If the assigned Priv-level is greater than 1: Note : Privilege level assigned to the user is based on what is configured in Landslide Client and approved by TACACS+. TACACS+ Authorization will not modify, downgrade, or upgrade, the privilege level locally defined.
GUI, TeX, Tcl API Login will be standard way with username/password. REST API will use standard HTTP Basic Authentication. For user-level assignment TACACS+ has a fixed mapping.
Privilege Map
|
||||||||||||||||||||||||||||||||||||
6. |
Select OKTA OIDC to Authenticate the Landslide users. Okta is a standards-compliant OAuth 2.0 (opens new window) authorization server and a certified OpenID Connect provider OpenID Connect extends OAuth 2.0. The OAuth 2.0 protocol provides API security via scoped access tokens, and OpenID Connect provides user authentication and single sign-on (SSO) functionality. All users must first be provisioned in Landslide. To use OKTA with LANDSLIDE, the sign-on policy of User authentication will have to be configured as password only mode. Landslide does not support 2 factor authentication: As with other Authentication methods, users that are Always Locally Authenticated will not use OKTA: Sample setup document : OKTAOIDCSampleSetup.pdf
GUI, TeX, Tcl API Login will be standard way with username/password. |
||||||||||||||||||||||||||||||||||||
7. |
Select Spirent OAuth is non-standard OAuth implementation intended to connect/use the Spirent Security Micro-Service and requires users to fill following parameters :
Once the Spirent OAuth is configured, when a user logs into Landslide by click the Login button, The login function will delegated to Spirent OAuth service.
GUI, TeX, Tcl API Login will be standard way with username/password. |
||||||||||||||||||||||||||||||||||||
8. |
Select OIDC - OIDC OpenID SSO (Single Sign-on) Connect to authenticate and authorize the Landslide user. This Auth method is intended for Secure Clients only. HTTPS, not HTTP. When Landslide is configured for OIDC, Automatic Creation of User Account Upon Login is recommended so that all new user logins will automatically create a user account in Landslide instead of returning an error. When OIDC enabled, SSO/OIDC users should login into the landslide by click the SSO button. Only locally authenticated users and sms should use the standard username/password login. Once the Spirent OIDC is configured, when a user logs into Landslide by click the Login button, The login function will delegated to OIDC service. The SSO will be hidden by default and only displayed if SSO is turned on. If you are looking for SSO, hotkey Shift-Alt-S or try restarting your Client to reload the indicator from the TAS.
At the same time, Landslide client App will open a new Browser window and navigate user to the OIDC Provider’s Login page. Once User login, Landslide Client App will automatically forward the Login function to the OIDC provider. If login success, The SSO Dialog will dispose. Additionally Landslide will render a html page with Token information on the same Browser window:
Additionally Landslide support the Bearer Token authentication for the REST API. The token can be taken from the GUI login confirmation page above, or the user can directly request a token using this REST API URI Path, api/ssoRedirectUrl: http(s)://<TASIP>:<port 8080/8181>api/ssoRedirectUrl If SSO is not enabled, the response will be a 404 with a body: Otherwise you will get the redirect URL in the body: { This URL will bring you to your OIDC provider’s Login page, where, if you have not logged in, you can login, or if you are already logged in it will immediately redirect you back to the TAS to get your token like from the GUI. (see previous image). This token can then be copied to be use as the Access Token via the API Bearer Token, which is now an option on the Swagger page: For other REST API clients, the User can copy the Access Token to the Authorization header of the HTTP request as Bearer Token which is used to access landslide API. Same process happens on TeX, if OIDC is configured. User can login into the TeX by click the SSO button.
TeX will open a new Browser window to navigate user to OIDC provider’s login page. At same time, TeX will blocking with the Full screen loading spinner.
|
Enable SNMP Traps for MGMT status reporting.
1. |
Select Admin > Server Settings and the Server Settings window opens.
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
2. |
Select to Enable SNMP Traps to Address - Enter the address of the network server that is responsible for processing SNMP Traps. Enables rest of the fields. Enter a valid IP address or FQDN of the Trap Receiver (NMS). Enter Port of the network server that is responsible for processing SNMP Traps. Range : 1 to 65525, Default: 162. Also supported by REST (Swagger) and Tcl API (trapReceiverPort).
|
Kafka is a monitoring tool that a customer can setup with their own configuration. Landslide TAS works as a Kafka Producer, which is a message provider to the Kafka server. https://kafka.apache.org
Enable the Kafka Producer on the TAS to select from the following data sources in Landslide with a user-defined topic for each:
Once this option is enabled, the TAS will keep sending each of Topics to the configured bootstrap.server (Kafka server).
The left side configurations are 100% matched up with Kafka Producer configuration:
https://docs.confluent.io/platform/current/installation/configuration/producer-configs.html#value-serializer
https://kafka.apache.org/26/javadoc/org/apache/kafka/clients/producer/ProducerConfig.html
To support Secure Kafka, several changes were made to the Kafka configuration in the TAS Server Settings. Our design follows directly from the Kafka APIs. Please see https://kafka.apache.org/intro and https://kafka.apache.org/33/documentation.html.
Note that Landslide is using Kafka 3.3, while the latest version is 3.4.
TroubleShooting notes: kafka_file_logging is available on the TAS to turn on logging of the Kafka communications on the TAS to help debug problems. This will turn on logging of the Kafka component to /usr/sms/data/KafkaSend_0.log. Monitor this file to see details about the Kafka setup, broker connection and messaging sent to the network. For deeper messaging details use tcpdump or wireshark or other capture tool, to capture the packets based on the Destination IP Address(es) and Port that the Kafka is using. As with any network troubleshooting you might do this on both the TAS and the destination Kafka broker to make sure messages are being transported properly.
|
1. |
Select Admin > Server Settings - Kafka and the Server Settings Kafka window opens. All consumers/producers have a type for a key and a value, even if the event never has a key (in this case, the consumer/producer could use String type to avoid using a generic Object). Depending on the client's needs, Landslide use below to produce events:
|
||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
2. |
Select to Enable Kafka Producer - Enter the details below for Kafka Producer - https://kafka.apache.org/26/javadoc/org/apache/kafka/clients/producer/ProducerConfig.html.
|