ATM_ID: 81D2CC48-65F7-11E7-9434-A3C6D30A4651 MFF: PLANNEDTIMESTAFF: ID: DPQA_Regression_Accounting/Testcases/FS_50.001_Audit_Log/97050 TESTCASE_HEADLINE: To check the auditlog shall capture an event if removing the LDAP groups from exceptions list for Logged-in user permission role and junior administrator permission roles when "All Logged-in Users with Exceptions" method is turned on. GROUP: FEATURE: SUB_FEATURE: INPUT:

1.Make sure the device upgraded with latest D3.5 build.
2.The device WebUI should be functional.
3.Make sure the Login-methods should be set as 'User Name / Password Validate on the Network' and user permissions method should be set as "Remotely on the Network using LDAP".
4.Make sure LDAP server should be configured in the device.
5.Make sure the LDAP groups are assigned to a particular/more than one Logged-In user/junior administrator permissions role with exceptions (Assumes an existing role it has LDAP groups which is assigned to this role by previous test).

PROCEDURE:

Scenario 1: (Logged-In User role)
1.Navigate to CWIS->Logged-In users->Click "Edit User Mappings" for an existing role which has assigned LDAP groups with exceptions to this role to go to the "Manage Permission Role" screen.
2.Select "Remove All Exceptions" option under 'Everybody Except Users In Groups' and apply the changes.
3.Download the auditlog and observe the auditlog will captured entries for exception group users which is removed form step 2.
4.Verify that existing group users and removed exception groups/users are added to the role should be captured with special name "All Logged-in Users" in the auditlog.
5.Create maximum number of groups and follow step 1-4 to verify the auditlog event.
Scenario 2: (Junior Administrator role)
6.Follow step 1 to go to CWIS->User permissions->Device Management->Click "Edit User Mappings" for an existing role which has assigned LDAP groups with exceptions to this role to go to the "Manage Permission Role" screen.
7.Follow step 2 and 5 to verify the events.

OUTPUT:

Scenario 1 and 2:
Auditfile.txt file should be captured separate entries for all the users removed from the role with the below information
Event ID: 144
Event Description: User or Group Role
Assignment
Username
Device name
Device serial number
User or group name (Added (for defined exceptions))
All Logged-in Users (Added (for remining users and also including the removed exceptions users to be added to the role))
Role name
\ Action: Removed

PROCESS: PRIORITY: TEST_TYPE: LOE: RESOURCE_HW: RESOURCE_CONSUMEABLES: RESOURCE_MEDIA: SKILL_SET: TEST_CASE_TYPE: TESTCASE_SOURCE: SPEC: FS 50.001 Audit Log FS 44.001 Authorization SPEC_VERSION: SPEC_TAG: [50.001.012](FT-14212) CCSFEAT21254 The audit log entry data shall report events contained in table 1 below: [44.001.036] (FT-14212) CCSFEAT11483 [D1.7-*] The SA shall be able to remove a local user from a role ATM_OWNER: APPROVE_QE: APPROVED_QE: APPROVE_SE: APPROVED_SE: APPROVE_SPAR: APPROVED_SPAR: ASSOCIATED_TESTCASES: TRAINING: TESTCASE_VERSION: TESTCASE_STATE: TESTCASE_PLATFORM: TESTCASE_PRODUCT: TESTCASE_APPROVALS: CDATE: 1499749936 MDATE: 1499749936 MUSER: q4BVX0J1 AUTHOR: q4BVX0J1 ATM_MCOMMENTS: Imported from spreadsheet HISTORY: ATM_LOCKED: ATM_REQLINK: 41932766-6EB0-1014-8BFC-B5D0591256B9, A9D0C584-6E71-1014-A670-F8D75D74F702, 41DF8928-6EB0-1014-9B1E-BCE075128E91 ATM_REQCOUNT: 3 QA_TEAM: TC_WEIGHTAGE: FILENAME: FILEDESC: FILES: