This section describes additional configuration settings for SOAtest and Virtualize available in the Parasoft > Preferences menu.

Authors

The Authors configuration screen enables you to specify how code authors are mapped to user names and email addresses when quality tasks are generated. See Specifying Author-to-Author and Author-to-Email Mappings for details.

Browser Settings

The Browser panel lets you set options related to Web scenario recording. Available settings include:

Proxy Configuration Details

When you record or run web scenarios in a browser, the proxy settings in the browser are set to an internal proxy maintained by SOAtest and/or Virtualize. All communication to and from the browser during recording and playback goes through the internal proxy, which is an intermediary used to capture traffic and otherwise facilitate execution. During recording and playback, SOAtest and/or Virtualize temporarily creates this proxy on localhost using the port specified by the Browser Playback setting’s Proxy port option.

The default host and port for the internal proxy is localhost:55555. Change the port number if this port is already in use using the controls Proxy port field. Do not change this from within the browser.

If your machine is configured to use your own proxy, you should configure SOAtest and/or Virtualize to point to that proxy. This enables SOAtest and/or Virtualize to configure its internal proxy to forward all traffic to the specified proxy configured in Proxy Settings.

Console Settings

The Console panel allows you to determine the amount of information that is reported to the Console view and whether it is automatically activated when it contains messages.

Continuous Testing Platform Settings

If you have Continuous Testing Platform (CTP) and a valid license, you can configure your connection to CTP:

Global Data Source Settings

Global data sources can be reused and shared outside of a single SOAtest project. The Global Data Source panel lets you determine how information about global data sources is saved. For information on how to configure global data sources, see Adding a Data Source at the Test Suite, Project, or Global Level.

Technical Support Settings

Use the Technical Support interface to create a zip archive containing the related files if you are experiencing issues. Send the zip file to Parasoft's support team so that they can assist you. SOAtest can automatically create an archive when problems occur.

 Archives are approximately half a megabyte and are created in about 60 seconds.

By default, an archive is not created when problems occur. You can either manually prepare and send a support archive when needed, or you can modify Parasoft  archive creation options so that the product automatically prepares and sends an archive when problems occur.

To configure the product  to automatically prepare and send archives when problems occur:

  1. Open the Technical Support panel by choosing Parasoft> Preferences, then selecting the Parasoft> Technical Support category.
  2. Check Enable auto-creation of support archives.
  3. Customize additional options as needed. Note that Enable auto-creation of support archives and Send archives by email are not applicable to Virtualize.
  4. Click Apply, then OK.

To manually create a support archive:

  1. Choose Parasoft> Preferences and click the Technical Support category
  2. Choose your archive options and click Create Archive.

To open the Technical Support Archive Manager, which allows you to review, e-mail, or delete recent support archives:

  1. Choose Parasoft> Preferences and click the Technical Support category
  2. Click Browse Recent Archives.

Enabling Debug Logging

You can add the following system properties when starting SOAtest from the command line to enable debug logging and to ensure that the all relevant information is included when creating a support archive.

PropertyDescription
parasoft.logging.config.jar.file 

Specifies the preconfigured JAR file shipped withSOAtest that contains logging settings. This is the recommended property to use for enabling logging.

Example:

-J-Dparasoft.logging.config.jar.file=/com/parasoft/xtest/logging/log4j/config/verbose.console.xml
parasoft.logging.config.file 

Specifies a log4j configuration file on disk. Use this system property if you have your own log4j configuration file and are unable to use the parasoft.logging.config.jar.file property, such as configuring server deployments. 

Example:

-J-Dparasoft.logging.config.file=<PATH_TO_LOG4J_CONF_FILE>

Dictionary Settings

The Dictionary panel allows you to customize the dictionary that the Spell tool uses to identify misspelled words.

Adding Words

To add words to the dictionary:


You can also add reported misspelled words to the dictionary from the Quality Tasks view. Just right-click the reported misspelled word, then choose Add to Dictionary.

Adding Dictionaries

You can expand SOAtest’s built-in dictionary by extending it with additional sets of ispell-format dictionaries (such as dictionaries for language other than English, dictionaries of industry-specific terms, etc.). Each dictionary set has a name and one or more dictionaries.

To add an additional  dictionary set:

  1. Save the dictionaries in the SOAtest installation directory.
  2. Click the Add  button, then use the file chooser to select the set of dictionaries you want to add.

Adding Non-Text Characters or Words Containing Non-Text to the Dictionary

By default, SOAtest treats non-text characters as white space and does not allow you to add dictionary words that contain non-text characters. If you want SOAtest to consider a designated non-text character as a valid character within a word (rather than as one unit of white space), you need to add that character to the list of allowable non-text characters. This allows you to identify spelling errors in words that contain allowed non-text characters and to add dictionary words that contain allowed non-text characters.

To add non-text characters to the list of allowable non-text characters:

MIME Type Settings

The MIME Types panel lets you add and remove MIME types. In addition, it lets you specify the location of your preferred text and XML editors and lets you specify what editor you want to use to edit all files that have a particular MIME type.

To add, edit, or remove a MIME type:

Miscellaneous Settings

The Misc panel allows you to set the following miscellaneous settings:

OpenID Connect

The OpenID Connect panels allows you to configure the application to authenticate users via your OpenID Connect server.

  1. Go to Parasoft > Preferences and select OpenID Connect.
  2. Check Enable.
  3. Configure the following options:
  4. Click Test Authentication or Apply to open the OpenID Connect authentication page in your browser.
  5. Provide your credentials in the browser window that opens.
  6. Close the browser window when the authentication confirmation appears and continue in the application.
  7. Click Apply to apply the changes.

The Status panel shows the current OpenID Connect authentication status.

Azure Active Directory users: Enter the redirect URL configured above under "Mobile and desktop applications" in Azure AD. For example, if Callback host is set to "localhost" and Callback port is set to "Automatically select an open port" (the default values), you would enter "http://localhost/oauth2_callback" for the callback URL in Azure AD.

Proxy Settings

The Proxy panel controls how SOAtest and/or Virtualize works with proxy servers. It does not control the separate intermediary proxy used for web scenarios (for details on this other proxy, see Proxy Configuration Details). 

HTTP proxies that do not require authentication can be used while managing remote SOAtest and Virtualize servers. HTTP proxies that require authentication will not be applied when adding a remote SOAtest or Virtualize server to the server tree.

Scanning Settings

This Scanning panel specifies settings related to how SOAtest scans Web applications. Available options include:

Scripting Settings

The Scripting panel allows you to specify properties used for custom scripts.

Security Settings

You can configure default security settings for clients used in your projects. In most cases, the security settings can be overridden by configurations set locally in your suites:

Global HTTP Authentication Properties

Configure global HTTP authentication properties that can be used when configuring HTTP protocols within an applicable tool.

  1. Enable the Perform Authentication option and enter the Username and Password to authenticate the request
  2. Choose the authentication type from the drop-down menu. Supported types are Basic, NTLM, Kerberos, or Digest.
  3. If you are using Kerberos authentication, enter the Service Principal to authenticate the request. If the correct username and password, or the correct service principal, are not used, the request will not be authenticated.
    1. Kerberos realm: Specify the Kerberos realm associated with your network. By convention, this is typically your domain name in all caps (e.g. PARASOFT.COM).
    2. KDC server: Specify the hostname of your Key Distribution Center (e.g. kdc.parasoft.com).
    3. Check Ticket: This will execute a simple test to locate a cached Kerberos TGT (Ticket Granting Ticket) to grant access to the service. SOAtest and/or Virtualize will not be able to communicate with the service if it cannot first locate a valid TGT. For more information about Kerberos, see Configuring Kerberos Authentication.

About Kerberos Authentication

Kerberos authentication is known as a trusted third-party authentication mechanism. A client requests access to a service not directly, but from another service: the Key Distribution Center, which manages network-wide authorization. This mechanism facilitates Single Sign-On (SSO) so that a client need only provide authorization credentials once in a given time period (usually 8-10 hours). The authorization is granted in the form of a ticket which can then be cached and reused throughout the granted time period without re-authenticating.

Entities in a Kerberos-protected network, such as clients and servers, are known as principals. The network-space that Kerberos protects is known as a realm. Microsoft's IIS (Internet Information Services) Server provides HTTP-based services with Kerberos through the Negotiation protocol. Other server vendors provide their own implementations of Microsoft's Negotiate protocol.

The ticket that is received upon initial authentication is known as a Ticket Granting Ticket, or TGT. For example, in a Windows environment, the TGT is generated when first logging on to the workstation in the morning. SOAtest and/or Virtualize authorizes itself to use a Kerberos-protected service by retrieving a user's TGT from the system cache.

For tips on common Kerberos errors and how to solve them, see http://docs.oracle.com/javase/8/docs/technotes/guides/security/jgss/tutorials/Troubleshooting.html.

Configuring Kerberos Authentication for Tools

  1. Select the tool for which you intend to use Kerberos authentication.
  2. Select the Transport tab and select Security from the left pane of the Transport tab. 
  3. Configure the following options from the security panel of the Transport tab:
    1. Perform Authentication: Select this option to activate authentication.
    2. Use Global Preferences: Select this option if you have authentication properties setup in Security Preferences.
    3. Type: Select Kerberos to perform Kerberos Authentication.
    4. Service Principal: Specify the name of the service/server as defined in the Kerberos database (e.g. HTTP/soatest.parasoft.com).

Now when you invoke your tool, the required Negotiate token will automatically be generated and send as an HTTP header. Kerberos provides a mechanism to prevent so-called "replay" attacks where a user tries to provide captured duplicate credentials for a service in order to gain access to them. When performing a load test, where multiple virtual users provide the same user credentials, the KDC will respond as if a replay attack is occurring and errors will be thrown. This is expected behavior and it is uncertain at this point whether there is a work-around.

Server Certificate Settings

Enable the Trust all certificates option to accept any certificate. This is useful if you want to load pages whose certificates are not "trusted."

Enable the Use default Java cacerts option to accept only certificates from the standard list of Java-trusted certificate vendors.

Client Key Store Settings

Enable the Use client keystore option to specify settings for both the server side and client side certificates for SSL through the Client Keystore options.

In order to perform operations that use the XML Signature Verifier, XML Signer, or XML Encryption tools, or if using Key Stores, you will need to download and install the Unlimited Strength Java Cryptography Extension. For details, see JCE Prerequisite.

Keystores are specified at the test or responder suite level. If this option is selected, the following options are available in the Certificate and Private Key tabs:

Certificate Tab

Private Key Tab

MQ SSL

You can specify the trust store, key store, and key store password for clients that interact with AUTs over MQ SSL. These settings are not applicable to Virtualize. 

JCE Prerequisite

SOAtest and Virtualize ship with their own instance of Java that include the Unlimited Strength Java Cryptography Extension so that they can perform security operations that use XML Signature Verifier, XML Signer, XML Encryption tools, and Key Stores. If you installed SOAtest or Virtualize from the update site (see Eclipse p2 Update Site Installation) and are using your instance of Java, you will need to download and install the unlimited JCE if it's not already on your system. Refer to the Oracle website for downloads and documentation. MacOS users should install Java 8 newer than update 161 to get the unlimited JCE.

Server Settings

The Server panel allows you to configure the following settings for the SOAtest and/or Virtualize server. The SOAtest server allows you to work with the Call Back tool and Asynchronous testing—as well as Message Stub tools integrated into end-to-end test scenarios.

SOAP Settings

The SOAP panel allows you to specify the following settings:

You can also customize how SOAtest and/or Virtualize serialize the SOAP objects they transmit and deserialize the SOAP messages they receive, but you cannot do so within the Preferences panel.

SOAP messages are deserialized from XML into some native format and objects are serialized into XML format so that they can be sent as responses.

To add a serializer/deserializer pair, you add a line to the register.py file in the <INSTALL_HOME>/plugins/com.parasoft.ptest.libs.web_<version>/root/startup directory. You must programmatically use Jython register Apache Axis-compliant serializers.

For Axis, you can retrieve the TypeMappingRegistry used by calling soatest.api.SOAPUtil.getDefaultAxisRegistry(). After you retrieve that registry, you can use the Axis API to register the serializer as needed.

System Properties Settings

The System Properties panel lets you add JAR files, class folders, and Java projects to the classpath if needed. Use the available controls to add or remove JAR files, class folders, and Java projects. The specified JAR files, classpaths, and Java projects  will be added to the system's classpath and the corresponding classes will be loaded into the JVM after SOAtest or Virtualize is restarted.

Click Reload to force classes from the class path entries to reload.

Enable the Automatically reload classes option if you want SOAtest/Virtualize to reload classes from your Eclipse project after being modified or recompiled.

If you want to quickly add a large number of jar files—or add jars to a headless instance of your Parasoft solution— copy them into one of the following directories within your workspace:

  • TestAssets/system_jars  

  • stubs/system_jars
Jar files in those directories will automatically be loaded upon startup or after Reload is clicked in the Preferences page.

On a headless instance, if you want to reload the jars without having to restart SOAtest or Virtualize, call post /v<version>/preferences/systemProperties/reload from the REST API.

UDDI Settings

The UDDI panel lets you set the UDDI inquiry endpoint, which is the endpoint that you want SOAtest to reference when performing dynamic router resolution. If you specify a UDDI registry here, the SOAP Client tool can search for a service by querying that registry using the UDDI serviceKey specified in the SOAP Client parameters. If you do not specify a UDDI registry here, you have to configure your SOAP Client tool so that the server endpoint is hard-coded as a router value.

WSDL History

The WSDL panel lets you review or modify the WSDLs that have been used in tools and projects. These WSDLs will be available for selection in relevant drop-down boxes. This way, if you need to specify the same WSDL multiple times, you don’t need to constantly type it in over and over again. 

Enable the Save WSDLs used in message responders, SOAP clients, and projects if you want SOAtest/Virtualize to save tests' or assets' WSDL URIs. If you are using SOAtest only, the option will read Save WSDLs used in SOAP clients and projects. If you are using Virtualize only, the option will read Save WSDLs used in message responders and projects. 

The WSDL URI field lists the WSDL URIs that will be available in tools’ WSDL URI drop down menu. By default, all WSDL URIs used in related tools are added to this list. Click on a URI in the field and click Refresh WSDL to refresh the WSDL from the given location URL and re-parse it.

Enable the WSDL/Schema Parsing section to check all schema locations in order to locate components belonging to a give target namespace. Disable this option to use only the first schema location encountered in order to resolve components for a given target namespace.

XML Conversion Settings

The XML Conversion settings panel lets you register data models for fixed length messages. 

For details on using this setting, see Fixed Length Client and Fixed Length Call Back.

XML Schema History Settings

The XML Schema History panel lets you review or modify the XML Schemas that have been used in Messaging Clients (SOAtest), message responders (Virtualize), and projects. These Schemas will be available for selection in relevant drop-down boxes. This way, if you need to specify the same Schema multiple times, you don’t need to constantly type it in over and over again.

XML Schema Locations Settings

The XML Schema Locations panel lets you view, add, and remove schema locations.The XML Validator tool needs to know where to find the schema that it should use to validate the document of concern. In most cases this is a URI and is supplied within the document being validated. If, however, the URI for the schema is not supplied or if you want to use a different location, then disable the Use namespace as location URI for Schemas option for the XML Validator tool. For more information on the XML Validator tool, see XML Validator. When the tool is run with this option disabled, SOAtest will use the schema location(s) indicated in this panel. To add a new schema location:

  1. Click the Add button beneath the Namespace and Location columns.
  2. In the dialog that opens, specify the Namespace and Schema Location.
  3. Click OK after you have added all of the necessary locations.

To specify namespaces to skip:

  1. Click the Add button beneath the List of namespaces to skip during XML Validation table.
  2. In the dialog that opens, specify the namespace you want to skip.
  3. Click OK.

To add OASIS XML Catalog Locations:

  1. Click the Add button beneath the OASIS XML Catalog Locations section of the Schema Locations tab. The Location dialog box displays.
  2. Type in the OASIS XML Catalog Location or Browse to it by clicking the Browse button.
  3. Click OK after you have added all of the necessary locations.