Function Login
Positive
- Email, password:
- Verify that user is able to log in with correct credential and pressing Enter key.
- Verify that user is able to log in with correct credential and clicking Login button.
- Verify that user is able to log in from social login such as Facebook or Google.
- Verify that the password entered should be in encrypted form. (được mã hóa)
- Verify that the user is able to view the password by clicking on the eye icon.
- Remember me:
Verify that user credential remained on the field after clicking remember and get back to the login screen again.
- Forgot password:
Verify that user is directed to Forgot password page after clicking on the Forgot password link.
- Sau khi Login xong:
- Login session timeout duration (for a lifetime??)
- Closing the browser → should not log out
- back button → doesn’t log out
- Logged in → Homepage: no need for displaying ‘Sign up’…
- Tab key:
Verify that user can access all controls and elements by pressing the tab key from keyboard.
Negative
(Error messages)
- Verify that user is unable to log in with invalid credentials.
- Verify that user is unable to log in with invalid email format.
- Verify that user is unable to log in when leaving the password field blank.
- Verify that user is unable to log in when leaving the email field blank.
Unsuccessful login attempts ⇒ a limit to the total number of unsuccessful login attempts.
UI
- Verify that the login screen will appear after clicking on the login button/ login link.
- Login Page Title
- Elements are present: Login button, Sign up link, Forgot password link, Remember (checkbox: should mark as checked after clicking on the text/ box), Social logins.
- Font: size, color, style
- Button: size, color, hover
- Icon:
- Alignment
- Responsive: on different screen resolution and devices
- The cursor should remain in the email textbox by default.
Security Test
1. Prevent login page from SQL injection attack.
- Hacker registers with the user A account. User A now login using social login that account is already created by the hacker. Now hacker has access to the user A email and password as the user register with social login.