File: complete-insomnia-collection.json
- Open Insomnia
- Application Menu → Import/Export → Import Data → From File
- Select
complete-insomnia-collection.json - You'll see: "Complete Auth + MCP Platform" workspace
- Auth - Registration (1 request)
- Auth - Login Flow (3 requests)
- Auth - 2FA Management (2 requests)
- Auth - Password Reset (2 requests)
- Auth - Event Logs (2 requests)
- MCP - Health Checks (2 requests)
- MCP - Event Ingestion (3 requests)
- MCP - Event Queries (3 requests)
- MCP - Fraud Detection (3 requests)
- MCP - Alert Management (4 requests)
- Test Scenarios (3 requests)
Folder: 1. Auth - Registration Request: Register New User
{
"username": "testuser",
"first_name": "Test",
"last_name": "User",
"email": "test@example.com",
"password": "SecurePass123!",
"tier": "dev"
}✅ Expected: User created with 2FA automatically enrolled
Folder: 2. Auth - Login Flow Request: Login Step 1 (Password)
{
"username": "testuser",
"password": "SecurePass123!"
}✅ Expected: Returns requires_2fa: true
Folder: 2. Auth - Login Flow Request: Login Step 2 (2FA Bypass)
{
"username": "testuser",
"code": "000000"
}✅ Expected: Returns JWT token
📝 Action: Copy the access_token and paste it in Environment → jwt_token
Folder: 5. Auth - Event Logs Request: Get All Event Logs
✅ Expected: See login_success, 2fa_success, registration events
Folder: 6. MCP - Health Checks Request: MCP Health Check
✅ Expected: {"status": "healthy"}
Folder: 8. MCP - Event Queries Request: Get All Events
✅ Expected: See events from Auth Service with fraud analysis
Folder: 11. Test Scenarios Run these 3 requests in order:
- Brute Force Attack (1/3)
- Brute Force Attack (2/3)
- Brute Force Attack (3/3)
✅ Expected: Each returns event_id
Folder: 9. MCP - Fraud Detection Request: Get High Risk Events
✅ Expected: See events with risk_score > 0.7
Folder: 10. MCP - Alert Management Request: Get Open Alerts
✅ Expected: See alert for user_id=999 with status="open"
Folder: 10. MCP - Alert Management Request: Update Alert Status
- Copy an
alert_idfrom previous step - Replace
ALERT_ID_HEREin the URL - Send request with
{"status": "reviewed"}
✅ Expected: Alert status updated
Run these in order to test the full system:
1. Register New User
2. Login Step 1 (Password)
3. Login Step 2 (2FA Bypass)
4. Get All Event Logs (Auth)
5. Get All Events (MCP)
1. Failed Login (Wrong Password) - Run 3 times
2. Get High Risk Events
3. Get Open Alerts
4. Update Alert Status
1. Request Password Reset
2. Check logs for token
3. Confirm Password Reset (with token)
4. Get All Event Logs
The collection uses these variables:
auth_url: http://localhost:8000 (Auth Service)mcp_url: http://localhost:8001 (MCP Server)jwt_token: Paste your JWT token here after login
To update:
- Click environment dropdown (top left)
- Select "Base Environment"
- Edit values
{
"access_token": "eyJ...",
"token_type": "bearer",
"user": {
"username": "testuser",
"email": "test@example.com"
}
}{
"id": "550e8400-...",
"user_id": 123,
"event_type": "login_success",
"risk_score": 0.0,
"fraud_reason": "Normal authentication pattern",
"analyzed_at": "2024-01-15T10:30:01Z"
}{
"id": "alert-550e8400-...",
"user_id": 999,
"risk_score": 0.85,
"status": "open",
"reason": "Multiple failed login attempts detected",
"event_ids": ["event1", "event2", "event3"]
}docker compose ps
# Check if auth-service is running
docker compose up -d auth-servicedocker compose ps
# Check if mcp-server is running
docker compose up -d mcp-server- Check Auth Service logs:
docker compose logs auth-service - Verify
MCP_PUSH_ENABLED=truein Auth Service - Check MCP Server logs:
docker compose logs mcp-server
- Run Login flow again (Steps 2-3)
- Copy new token to environment variable
- Register user
- Login with password
- Complete 2FA
- View event logs in Auth Service
- View events in MCP Server
- Simulate failed logins (3x)
- Check fraud assessments
- Verify alert generated
- Update alert status
- Test password reset flow
- Local bypass code:
000000(works in dev mode) - Default ports: Auth=8000, MCP=8001
- Event types:
login_success,login_failure,2fa_success,2fa_failure,password_reset, etc. - Risk thresholds: High (>0.7), Medium (0.4-0.7), Low (<0.4)
After testing manually:
- Automate with test scripts
- Set up monitoring dashboards
- Configure real 2FA (not bypass)
- Enable BAML AI fraud detection
- Add alert notifications (email/Slack)