How to Test Users’ Access Rights of a Multiuser System?

How to Test Users’ Access Rights of a Multiuser System?
May 15 10:00 2015 Print This Article

There are many multiuser software products such as enterprise management systems, social networks, online shops and other web and network applications.

Functional testing, usability testing, performance testing and other testing activities of such systems are more complex than verification of a desktop single user program. And all software users must be sure that their personal data are protected.

Security testing of systems of that kind should touch upon outside and inside aspects. Logging procedure, passwords and storage of the user passwords, protection from cyber-attacks relate to outside aspects.

Inside security aspects include clear allocation of the user roles and different access rights to different users.

For example, in a plant management system an accountant must have access to certain accounting data such as salaries, income, expenses, but this user must not be able to go to pages of industrial processes control or laboratory researches.

Managers should have access to more data than non-management employees.

Verifying Access Rights of Different Application Users it is Necessary:

  • to create accounts of all types of the system users;
  • to create accounts with users holding several roles if it is possible to do it in the tested system;
  • to interact with the system from all the created accounts;
  • to check to what data every created user has access, whether their access rights comply with the specification.

Manual and automated testing techniques are used during comprehensive security testing of a multiuser system.

Related Posts:

About Article Author

view more articles
Nataliia Vasylyna
Nataliia Vasylyna

View More Articles

0 Comments

write a comment

No Comments Yet!

You can be the one to start a conversation.

Add a Comment

Your data will be safe! Your e-mail address will not be published. Also other data will not be shared with third person.
All fields are required.

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.