4 # TC_Role1.99.05.POS Remove Permissions from "40_reports"
5 set force=true perm delete com.test.TC_Role1.@[user.name].samplePerm1 some.long(involved).text SELECT
6 set force=true perm delete com.test.TC_Role1.@[user.name].samplePerm1 some.other_long(less.involved).text lower_case
8 # TC_Role1.99.10.POS Namespace Admin can delete Namepace defined Roles
9 force role delete com.test.TC_Role1.@[user.name].r.A
10 force role delete com.test.TC_Role1.@[user.name].r.B
11 force role delete com.test.TC_Role1.@[user.name].r.C
13 # TC_Role1.99.15.POS Remove ability to create creds
14 user role del testid@aaf.att.com com.test.TC_Role1.@[user.name].cred_admin
17 perm ungrant com.att.aaf.mechid com.att create com.test.TC_Role1.@[user.name].cred_admin
20 role delete com.test.TC_Role1.@[user.name].cred_admin
22 # TC_Role1.99.20.POS Namespace Admin can delete permissions and credentials
23 perm delete com.test.TC_Role1.@[user.name].p.C myInstance myAction
25 user cred del m00001@@[user.name].TC_Role1.test.com
27 # TC_Role1.99.90.POS Namespace Admin can delete Namespace
28 force ns delete com.test.TC_Role1.@[user.name].r
29 force ns delete com.test.TC_Role1.@[user.name]
31 # TC_Role1.99.99.POS List to prove clean Namespaces
32 ns list name com.test.TC_Role1.@[user.name].r
33 ns list name com.test.TC_Role1.@[user.name]