Versions Compared

Key

  • This line was added.
  • This line was removed.
  • Formatting was changed.

Bqurious platform provides you the feature running tests to verify the request data. It allows you to verify the request API parameters in between execution & check the appropriate data going to server.

Prerequisites :

  • BQMITM Certificate should be installed

  • For mobile, proxy should be added in WiFi setting

Adding BQMITM Certificate In System

Steps to add BqMitm Certificate in MAC

  1. Go Navigate to mitmcert folder mitmcert in Bq Client installer directory. There is two Two certificate files will be displayed in this folder.

  2. Just right Right click and open the BqMitmCert.crt file.

  3. Keychain Access window is will open. now you can see You will be able to view Bequrious Impersonating proxy Certificate.

  4. Now, right click on Bequrious Impersonating Proxy and click on get Info option.

  5. You will see the following popup. Then you will expand Expand the Trust Manger Manager by clicking on Trust showing section shown in the below picture. and then click on Select Always Trust for When using this certificate drop down menu and select Always Trust option.

...

Now it Proxy setup is done for proxy setup. You will just create . Create test with verify request Request and the test is ready to run.

 Steps to add BqMitm Certificate in Windows

  1. Open Microsoft Management Control (Start > Run > mmc.exe)

  2. Click on File menu

  3. Select Add/Remove Snap-in

  4. Under Available snap-ins, click Certificates

  5. Click Add.

  6. Select Computer account

  7. Click on Next.

  8. Select Local computer

  9. Click on Finish.

  10. Now, back in MMC, in the console tree, double-click on Certificates

  11.  Right-click on Trusted Root Certification Authorities.

  12. Click on All Tasks under Trusted Root Certification Authorities.

  13. Under All tasks, select Import.

  14. The Certificate Import Wizard will open.

  15. Click on Next button.

  16. Click on Browse.

  17. Select the file from the mitmcert folder under the client installed location.

  18. Click on Open button.

  19. Click on Next button on the Certificate Import Wizard.

  20. Click on Next button.

  21. Click on Finish button.

  22. Import successful pop up should be displayed.

Let us see how to configure and manage trusted root certificates for a local computer.

...

Open MMC and click on File menu and select Add/Remove Snap-in.

...

Under Available snap-ins, click Group Policy Object Editor

...

Click Add.

...

Select the computer whose local GPO you want to edit.

...

Click Finish / OK.

...

Now, back in the MMC console tree, navigate to Local Computer Policy > Computer Configuration > Windows Settings > Security Settings. Next Public Key Policies. Double-click Certificate Path Validation Settings, and then select the Stores tab.

Here, select the Define these policy settingsAllow user trusted root CAs to be used to validate certificates and Allow users to trust peer trust certificates checkboxes.

...

Creating test for verifying Request Data :

  1. Navigate to the Test Case creation screen.

  2. Create a test case with keyword verifyRequest.

  3. Save the test case.

  4. Create a Test Suite and add the test to the Test Suite.

  5. Navigate to Execute Automated Test

  6. Select the Suite.

  7. Select the Test suite.

  8. Enter the meta data for Execution Details: Run Name, Executing in Sprint, Build Number, Browser Instances, Distribute Across Machines, Execution Tags, Email Execution Report To

  9. Under Additional Settings section, Select checkbox for Enable Proxy, enter the Proxy Port (default : 9994), Enter the value for Allow URL(optional)

  10. Select machine and browser to execute the test case.

  11. Click Run Selected button.

Here’s a video for your reference.

Info

Filter by label (Content by label)
showLabelsfalse
max5
spacescom.atlassian.confluence.content.render.xhtml.model.resource.identifiers.SpaceResourceIdentifier@10213
showSpacefalse
sortmodified
typepage
reversetrue
labelsProxy VerifyRequest RequestCapture HeadersData QueryString CACertificate MITM
cqllabel in ( "proxy" , "verifyrequest" , "requestcapture" , "cacertificate" , "headersdata" , "mitm" , "querystring" ) and type = "page" and space = "BSD"

...