Book Image

Mastering SoapUI

By : Pranai Nandan, Surendra Mohan
Book Image

Mastering SoapUI

By: Pranai Nandan, Surendra Mohan

Overview of this book

SoapUI is an open-source cross-platform testing application that provides complete test coverage and supports all the standard protocols and technologies. This book includes real-time examples of implementing SoapUI to achieve quality and business assurance. Starting with the features and functionalities of SoapUI, the book will then focus on functional testing, load testing, and security testing of web services. Furthermore, you will learn how to automate your services and then design data-driven, keyword-driven, and hybrid-driven frameworks in SoapUI. Then the book will show you how to test UIs and services using SoapUI with the help of Selenium. You will also learn how to integrate SoapUI with Jenkins for CI and SoapUI test with QC with backward- and forward-compatibility. The final part of the book will show you how to virtualize a service response in SoapUI using Service Mocking. You will finish the journey by discovering the best practices for SoapUI test automation and preparing yourself for the online certification of SoapUI.
Table of Contents (18 chapters)
Mastering SoapUI
About the Author
About the Reviewer
SoapUI Integration with Jenkins and HP QC

Configuring boundary scan types

Let's see how we configure a boundary scan in SoapUI:

  1. The following screenshot displays the configuration parameters for configuring a Boundary Scan:

  2. In the preceding screenshot, click on the + button in the top right of the left hand side of the window. This will further open a pop-up dialog box for further configuration.

  3. In the preceding screenshot we can see that we have configured three values:

    • Parameter Name: Target parameter Request

    • Parameter label: Relevant name of the parameter of the request

    • XPath: XPath of the parameter

  4. After configuring this, click on the Add button and this will add the attack.

  5. Similarly, we configure another parameter; Password.

  6. Now we have configured a Boundary Scan for authentication service:

  7. Similarly we configure a SQL injection test:


    Note: We can also configure and add SQL injection strings using the Advanced tab, as shown in the preceding screenshot.

  8. The steps to configure the third scan, which is XPath injection, are the same...