ATM_ID: 683AF4D0-83A8-1014-8C74-16B557619FB6 MFF: PLANNEDTIMESTAFF: ID: DPQA_Regression_Connectivity/Testcases/FS_55.020_Connectivity/90723 TESTCASE_HEADLINE: [D1.9.2 - *] Moving forward, the Xerox Generic CA Certificate hashing will be SHA 256 / AES256/ 2048-bits in order to satisfy NIST strength of security requirements for the hash algorithm. GROUP: FEATURE: SUB_FEATURE: INPUT:

1.Device is UP and the CWIS of the device is accessible with device IP address 2. Login as SA

PROCEDURE:

1.Device is UP and the CWIS of the device is accessible with device IP address 2. Login as SA 3.Go to properties->Security->Certificates->Security Certificates->CA-Signed Device Certificate->Create Signing Request 4.Enter the valid values for the fields country code,state/province,locality name, organization name, organization unit,Common name,subject alternative name and email address 5. Select finish 6. Export CSR. 7. Go to certificate server, issue the certificate. 8. Download the certifcate

OUTPUT:

1.Create Certificate Signing request page should be displayed. 2. The entered values should be displayed correctly against the respective fileds. 3.CSR in Pending status should be available in the device. 4.CSR should be exported without any issue. 5. Certificate server should issue the certificate. 6.Certifcate Properties should show encryption as SHA 256 / AES256/ 2048-bits

PROCESS: PRIORITY: TEST_TYPE: LOE: RESOURCE_HW: RESOURCE_CONSUMEABLES: RESOURCE_MEDIA: SKILL_SET: TEST_CASE_TYPE: TESTCASE_SOURCE: SPEC: FS 41 004 Digital Certificates SPEC_VERSION: SPEC_TAG: 41.004.013 ATM_OWNER: APPROVE_QE: APPROVED_QE: APPROVE_SE: APPROVED_SE: APPROVE_SPAR: APPROVED_SPAR: ASSOCIATED_TESTCASES: TRAINING: TESTCASE_VERSION: TESTCASE_STATE: TESTCASE_PLATFORM: TESTCASE_PRODUCT: TESTCASE_APPROVALS: CDATE: 1496741352 MDATE: 1496741352 MUSER: q4BVX0J1 AUTHOR: q4BVX0J1 ATM_MCOMMENTS: Imported from spreadsheet HISTORY: ATM_LOCKED: ATM_REQLINK: B7DCD779-6E13-1014-8955-81E62B3603D7 ATM_REQCOUNT: 1 QA_TEAM: TC_WEIGHTAGE: FILENAME: FILEDESC: FILES: