as testid@aaf.att.com expect 200,404 # TC_Role1.99.05.POS Remove Permissions from "40_reports" set force=true perm delete com.test.TC_Role1.@[user.name].samplePerm1 some.long(involved).text SELECT set force=true perm delete com.test.TC_Role1.@[user.name].samplePerm1 some.other_long(less.involved).text lower_case # TC_Role1.99.10.POS Namespace Admin can delete Namepace defined Roles force role delete com.test.TC_Role1.@[user.name].r.A force role delete com.test.TC_Role1.@[user.name].r.B force role delete com.test.TC_Role1.@[user.name].r.C # TC_Role1.99.15.POS Remove ability to create creds user role del testid@aaf.att.com com.test.TC_Role1.@[user.name].cred_admin as XX@NS perm ungrant com.att.aaf.mechid com.att create com.test.TC_Role1.@[user.name].cred_admin as testid@aaf.att.com role delete com.test.TC_Role1.@[user.name].cred_admin # TC_Role1.99.20.POS Namespace Admin can delete permissions and credentials perm delete com.test.TC_Role1.@[user.name].p.C myInstance myAction set force=true user cred del m00001@@[user.name].TC_Role1.test.com # TC_Role1.99.90.POS Namespace Admin can delete Namespace force ns delete com.test.TC_Role1.@[user.name].r force ns delete com.test.TC_Role1.@[user.name] # TC_Role1.99.99.POS List to prove clean Namespaces ns list name com.test.TC_Role1.@[user.name].r ns list name com.test.TC_Role1.@[user.name]