SUT Owner
Responsible for registering a system under test for a test session.
Any user accesses the "All test runs" page
Any user shall access the "All test runs" page from the Testing menu.
The "All test runs" page displays all the test runs to the user
Refactor the "All test runs" page (see sketch-up)
A SUT Operator checks the compliance of the implementation of TLS1.3 in his SUT, in regards to WHO specifications
In most of the architecture, the security layer makes use of TLS as an encryption protocol. In the last years, TLS 1.2 was enforced to improve the security of systems. WHO is going one step further, and expects the systems that claim support to the DDCC profile to support TLS 1.3.
The Gazelle test suite offers tools to test the compliance of systems under test against TLS up to version 1.2. In the context of the WHO specifications, the SUT operators wants to verify the implementation of TLS 1.3 in his system, acting either as client or server. It includes verifying that the system under test supports a restricted set of cipher suites.
Improve the safety and security of systems under test by testing their compliance with the upper version of TLS.
Offer testing tools to the SUT operators in the context of conformity assessment and projectathons conducted by WHO, for testing the DDCC specifications.
Bring the testing one step further by covering more security requirements.
Gazelle test suite will be able to claim support to TLS 1.3, this protocol is more and more mandatory in interoperability specifications.
Renovate and improve the TLS simulators currently available in Gazelle Security Suite to allow support of TLS 1.3.
Have a look to the projects that make use of Gazelle Security Suite to test the compliance of SUTs in regards to TLS, and decide which prior version shall be kept and which one can be deprecated.
In peer-to-peer testing, SUT Operators shall be able to capture the messages when TLSv1.3 is used for securing the transaction
The DDCC specifications developed by WHO relies on TLSv1.2 and TLSv1.3 to secure the HTTP-based transactions.
During a testing event, when SUT operators are executing peer-to-peer tests, they want the test-bed to capture the messages they exchange, regardless of the TLS version used by their SUT.
Allow participants to test through the Gazelle test bed for any version of TLS.
Capture of the exchanged messages by a third-party tool is the best way to verify evidences, it fasten the validation process and is a trusted source of evidences. More and more projects are introducing TLSv1.3 in their interoperability specifications; the test bed shall be aligned in order to meet customers' needs.
The Sequoia project has the same need. Costs can be mutualised to develop the support of TLSv1.3 in the new product the soonest.
SUT Operator shall be able to verify the conformance of the FHIR Resources produced in the context of the DDCC project
The DDCC specifications published by WHO relies on the FHIR standard, and on IHE FHIR-based Profiles such as
- SVCM: Sharing Valuesets, Codes, and Maps
- mCSD: Mobile Care Services Discovery
- PMIR: Patient Master Identity Registry
- MHD: Mobile access to Health Documents
- DDCC: Digital Documentation of COVID-19 Certificates
In this context, the SUT Operators want to verify the compliance of the FHIR resources produced by their SUTs.
The SUT Operator might choose to
- extract the message from his logs and validate it using Gazelle validation services (GUI or API)
- validate a message captured by Gazelle Proxy
Assess the compliance of the systems claiming support to the DDCC profile during Conformity assessment and Projectathon.
SUT Operator will be able to see if their implementation are conformed with DDCC specification.
DDCC implementation guide: https://worldhealthorganization.github.io/ddcc/
SVCM implementation guide: https://profiles.ihe.net/ITI/SVCM/index.html
MHD implementation guide: https://profiles.ihe.net/ITI/MHD/index.html
mCSD implementation guide: https://profiles.ihe.net/ITI/mCSD/index.html
PMIR implementation guide: https://profiles.ihe.net/ITI/PMIR/index.html
SUT Operator checks the conformance of this system in regards to the FHIR SMART App Launch implementation guide
The DDCC specifications relies on FHIR Smart App Launch Implementation Guide for the user authorization feature. See http://hl7.org/fhir/smart-app-launch/index.html.
In this context, the SUT Operator shall have a mean to verify that his SUT is able to
- Support OAuth v1.0 tokens when requesting resources from a REST server
- Support OAuth v1.0 tokens when receiving requests from a REST client
- Support OAuth v2.0 tokens when requesting resources from a REST server
- Support OAuth v2.0 tokens when receiving requests from a REST client
- Limit access to resources based on the authorization token it receives;
- Get an authorization code by sending a request to an Authorization Server compliant with the SMART App Launch pattern
- Get an access token sending a request with a JWT assertion to an Authorization Server based on SMART App Launch pattern
- Get an access token sending a request with a client secret to an Authorization Server based on SMART App Launch pattern
- Get an access token sending a request with a JWT assertion to an Authorization Server based on SMART Backend Services pattern
Allow the SUT operator to verify the conformance of his SUT against the FHIR SMART App Launch specifications.
SUT Operator will be able to see if their implementation conforms with DDCC specifications.
FHIR SMART App Launch: http://hl7.org/fhir/smart-app-launch/index.html
SUT Operator verifies the conformance of the HTTP request against the DDCC specifications
The DDCC specifications published by WHO relies on the FHIR standard, and on IHE FHIR-based Profiles such as
- SVCM: Sharing Valuesets, Codes, and Maps
- mCSD: Mobile Care Services Discovery
- PMIR: Patient Master Identity Registry
- MHD: Mobile access to Health Documents
- DDCC: Digital Documentation of COVID-19 Certificates
In this context, the SUT Operators who develop the client side of those specifications want to verify the compliance of their system under test in regards to the specifications, in particular, whether the HTTP Header and Body of the HTTP requests are conform.
The SUT Operator might choose to
- extract the message from his logs and validate it using Gazelle validation services (GUI or API)
- validate a message captured by Gazelle Proxy
Offer a validation tool for the HTTP requests produced by the SUT in the context of the DDCC specifications.
SUT Operator will be able to see if their implementattion are conformed with DDCC specification
More and more HTTP-based profiles are being developed by our customers, thus, being able to validate the full HTTP payload, including the HTTP header is necessary to improve the coverage of the specifications by test tools.
DDCC implementation guide: https://worldhealthorganization.github.io/ddcc/
SVCM implementation guide: https://profiles.ihe.net/ITI/SVCM/index.html
MHD implementation guide: https://profiles.ihe.net/ITI/MHD/index.html
mCSD implementation guide: https://profiles.ihe.net/ITI/mCSD/index.html
PMIR implementation guide: https://profiles.ihe.net/ITI/PMIR/index.html
As a SUT Operator, I want to verify the validity of the RPPS data included in my document/message
validate RPPS data contained in the CDA document and/or message
https://annuaire.sante.fr/web/site-pro/extractions-publiques
TBD
TBD
The user shall have access to an overview of the test runs for a given testing session whatever the current status of the related test cases
In Gazelle Test Management, the tests are executed from the Test execution page. This page also logs all the runs executed by the systems. The test runs are linked to the test case they relate to.
The test execution page shows only the test cases with a status set to "ready". As a consequence, if a test case is deprecated at some points, the SUT operator cannot access the test runs that were executed when the test case was "ready".
In the same way, the "All test runs" page displays only the test runs that relates to the "ready" test cases.
As a consequence, we experience a loss of information and that is not accessible neither from the SUT operator's or Testing Session Manager's point of view.
- As a SUT Operator, I want to see all the test runs that have been executed by a system under test owned by my organisation, during a given testing session, at any time.
- As a TSM, I want to see all the test runs that have been executed during a given testing session, at any time.
- As a user, for each test run, I want to see the following details:
- Test run identifier
- Test case keyword (and a link access its details)
- Whether the test case is currently deprecated
- Last update date/time
- Test run status
- The role assigned to my SUT in this particular test run
- The other partners
- The status of the test run
- If a monitor is assigned, his first and last names
- As a user, I want to be able to access the test run page for any test run (whatever the status of the test case is)
- As a user, I want to be able to access the description of the test case.
- As a user, I want to be able to filter on
- System (name/keyword)
- Test case keyword
- Monitor
- Type of test
- Domain
- Tested profile
- Tested actor
- Tested profile option
- Involved transactions
- Test run status
- As a testing session manager or admin user, I want to be able to filter by Organisation (name/keyword)
- As a user, I want the test runs to be grouped by tested SUT capabilities
- As a user, for each SUT capabilities, I want to see the evaluation.
- As a user, I want to be able to sort on test case and test status within each SUT capability.
Allow the users to see all the test runs from a test session, regardless of the current status of the executed test cases.
User will have access to a page that summarizes the outcome of their test campaign
We might also want to experience new widget/features on that page like displaying statistics.