ATM_ID: B5159A8C-A6AB-11EC-96C2-7D98BEA7DE52 MFF: PLANNEDTIMESTAFF: ID: Not_to_use_for_any_Dashboard/Deprecated/FS_22.205_FIPS/14495 TESTCASE_HEADLINE: To validate that AirPrint/Mopria scanning enabled and configured for Digest Authentication in FIPS with CC already enabled in the device. GROUP: FEATURE: SUB_FEATURE: INPUT:
1. Navigate to EWS -- Properties -- Security -- Encryption -- FIPS 140-3. and enable 'FIPS with CC' and click 'Run configuration Check and Apply'.
PROCEDURE:1.Configure HTTP digest in Airprint/Mopria in EWS. (Properties--Connectivity--Airprint--under enablement--select "Allow Scanning to be initiated From AirPrint (or Mopria„¢) Supported Devices" option .)
2. Now Under "Require Authentication for Scanning" select "HTTP Digest" and save the settings.
3. Device will raise a prompt requesting the user either to Acknowledge the Authentication or Cancel the selection.
Scenario 1: On selecting Cancel option- Device can be configured with Basic Authentication.
Scenario 2: Acknowledge the exception will allow the device for Digest configuration.
FIPS+CC Enabled (Enable FIPS only) setting and Digest Authentication should be successful for Step 3- Scenario 2
PROCESS: PRIORITY: TEST_TYPE: manual LOE: RESOURCE_HW: RESOURCE_CONSUMEABLES: RESOURCE_MEDIA: SKILL_SET: TEST_CASE_TYPE: testcases TESTCASE_SOURCE: SPEC: FIPS 140-3 Certification SPEC_VERSION: 1.0001 SPEC_TAG: [22.205.084] (FT-27164, FT-29598, FT-28756) {D7.6, D7.8} The FIPS or FIPS +CC Mode compliance check shall occur when FIPS +CC Mode is being enabled. [22.205.085] (FT-27164, FT-29598, FT-28756) {D7.6, D7.8} During the FIPS or FIPS +CC Mode compliance check all enabled or active protocols/features/certificates leveraging security encryptions and hashes shall be evaluated against FIPS or FIPS+CC Mode standards per the table below. Additionally after FIPS or FIPS +CC Mode is enabled, certain features/protocols leveraging security encryptions and hashes shall be limited in their configuration options per the table below. [22.205.085.10] (FT-27164, FT-29598, FT-28756) {D7.6, D7.8} AirPrint/Mopria scanning enabled and configured for Digest Authentication ATM_OWNER: APPROVE_QE: APPROVED_QE: APPROVE_SE: APPROVED_SE: APPROVE_SPAR: APPROVED_SPAR: ASSOCIATED_TESTCASES: TRAINING: TESTCASE_VERSION: TESTCASE_STATE: TESTCASE_PLATFORM: TESTCASE_PRODUCT: canyon, carroll, corvo, kiska, mystic, melody TESTCASE_FAMILY: TESTCASE_APPROVALS: CDATE: 1647601694 MDATE: 1647601694, 1651240580, 1742818693 MUSER: USWU60000, USWU60000, w3K3WRKH AUTHOR: USWU60000 ATM_MCOMMENTS: Imported from spreadsheet, Renamed from "DPQA_NewFeature/D7.6/FT-27164_Mocana_TrustCore_2020_FIPS_140-3_modules_for_Alexandra/161729"., Renamed from "WFAST_Connectivity/Testcases/FS_22.205_FIPS_140-3_Certification/14495". HISTORY: ATM_LOCKED: ATM_REQLINK: 3C8CDD6A-1CF3-11EC-B707-61040BE4A572, 3C8D9534-1CF3-11EC-B707-61040BE4A572, 3C967532-1CF3-11EC-B707-61040BE4A572 ATM_REQCOUNT: 3 QA_TEAM: TC_WEIGHTAGE: FILENAME: FILEDESC: FILES: RELEASE: AUTOMATION_GROUP: TESTCASE_STEPS_ARE_RELATED_TO: REASON_FOR_AUTOMATABLE: PRECONDITION_TO_BE_DONE: ACTION_TO_BE_DONE: COMMON_FUNCTIONALITY: COMMONALITY_DETAILS: CONSTRAINTS_DAR: IMP-98 by Karthika dated on 25-12-2022 DEVELOPMENT_COMPLETE_TIME: PO_SIGNOFF_DATE: COMPLEXITY_PRECONDITIONS: COMPLEXITY_OUTPUT_VALIDATION: non_outliers AUTOMATABLE: yes TESTCASE_MODIFICATION_REQUIRED: APTEST_UPDATE_STATUS: DEVICE_CATEGORY: mfp TC_WORK_LOCATION_CAT: work_from_home_tc AUTOMATION_TC_VALIDATION: COMPETENCY: wfast_connectivity APTEST_TRACKING: yes AUTOMATION_CANDIDATE: no