ATM_ID: 7D38E55E-35A1-11EC-9E34-020B0CE4A572 ID: Pongo-Warhol/User_Management/56297 TESTCASE_HEADLINE: Perform POPO/Restart after KO User account Lock out Counter reach the limits and attempt to login the LUI with admin . Login type set as Remote GROUP: security FEATURE: SUB_FEATURE: INPUT: Precondition: Function to Prevent Unauthorized KO Authentication when the Login type set as Remote At LUI Tools ,Set a login type as Remote Make sure the Maximum Number of Consecutive Failed Attempts of KO/SA Authentication is set as 5 PROCEDURE: 1.In LUI,Login with admin account with invalid Password more than 5 consecutive attempts. 2. After User Lockout , Login as admin with valid ID & Password 3.Perform POPO/restart after 5 or 6 login failure attempts and try to attempt login with valid System Admin User ID and Password OUTPUT: 1.In LUI ,Login failure will occur for 5 attempts and failed attempt will be counted as 5 2. Once User account lock out , Admin Login with valid credential will be failed and it will be counted as failed attempt count. 3.After POPO/restart ,Failure Login attempt count will reset to Zero. Admin user will be authenticated with valid password. PROCESS: PRIORITY: TEST_TYPE: LOE: RESOURCE_HW: RESOURCE_CONSUMEABLES: RESOURCE_MEDIA: SKILL_SET: advanced TEST_CASE_TYPE: TESTCASE_SOURCE: SPEC: SPEC_VERSION: The count value will be reset to 0 when: the user is successfully authenticated as KO, the device power is turned OFF and then back ON or rebooted. SPEC_TAG: ATM_OWNER: ASSOCIATED_TESTCASES: TRAINING: TESTCASE_VERSION: TESTCASE_STATE: TESTCASE_PLATFORM: TESTCASE_PRODUCT: TESTCASE_APPROVALS: CDATE: 1635172824 MDATE: 1635172824 MUSER: q3sjkzwz AUTHOR: q3sjkzwz ATM_MCOMMENTS: Imported from spreadsheet HISTORY: ATM_LOCKED: ATM_REQLINK: ATM_REQCOUNT: 0 FILENAME: FILEDESC: FILES: QA_TEAM: APPROVE_QE: APPROVED_QE: APPROVE_SE: APPROVED_SE: APPROVE_SPAR: APPROVED_SPAR: MFF: PLANNEDTIMESTAFF: IMPLEMENTED: DATA_LOGIC: AUTOMATABLE_NOTAUTOMATABLE: