9 lines
382 B
Gherkin
9 lines
382 B
Gherkin
|
|
Feature: Login
|
||
|
|
In order to protect the internal cloud from malicious actors, login is required to remain connected and send commands as a particular user.
|
||
|
|
|
||
|
|
Scenario: Login with bad credentials and be bounced
|
||
|
|
Given I supply bad credentials in Login command
|
||
|
|
When I send the command
|
||
|
|
Then the result should be an error seen and a closed connection
|
||
|
|
|