ATM_ID: B516DE92-A6AB-11EC-96C2-7D98BEA7DE52 MFF: PLANNEDTIMESTAFF: ID: Not_to_use_for_any_Dashboard/Deprecated/FS_22.205_FIPS/14496 TESTCASE_HEADLINE: To Validate that -mail Encryption / Signing (sub feature of Smart Cards), is configured with Signing Hashing sha1 in FIPS being enabled in the device. GROUP: FEATURE: SUB_FEATURE: INPUT:

 1. Configure SMTP through EWS (Properties--Apps--Email--Setup).

  2. Now navigate to security tab in Email Setup page and select Encryption / Signing option.

  3. Under Encryption tab, Click on edit option and select "Always On; Not editable by user" option under Email Signing Enablement and select 3DES under Encryption Algorithm and save settings.

  4. Similarly under Signing tab, Click on edit option and select "Always On; Not editable by user" option under Email Signing Enablement and SHA1 under Signing Hash and save settings.

PROCEDURE:

  1. Navigate to EWS -- Properties -- Security -- Encryption -- FIPS 140-3. and enable 'FIPS only' and click 'Run configuration Check and Apply'.
        2.Check the exceptions.
OUTPUT:

 FIPS Enabled (Enable FIPS only) setting and exceptions details should be displayed successfully.

PROCESS: PRIORITY: TEST_TYPE: manual LOE: RESOURCE_HW: RESOURCE_CONSUMEABLES: RESOURCE_MEDIA: SKILL_SET: TEST_CASE_TYPE: testcases TESTCASE_SOURCE: SPEC: FIPS 140-3 Certification SPEC_VERSION: 1.0001 SPEC_TAG: [22.205.084] (FT-27164, FT-29598, FT-28756) {D7.6, D7.8} The FIPS or FIPS +CC Mode compliance check shall occur when FIPS +CC Mode is being enabled. [22.205.085] (FT-27164, FT-29598, FT-28756) {D7.6, D7.8} During the FIPS or FIPS +CC Mode compliance check all enabled or active protocols/features/certificates leveraging security encryptions and hashes shall be evaluated against FIPS or FIPS+CC Mode standards per the table below. Additionally after FIPS or FIPS +CC Mode is enabled, certain features/protocols leveraging security encryptions and hashes shall be limited in their configuration options per the table below. [[22.205.085.13] (FT-27164, FT-29598, FT-28756) {D7.6, D7.8} If E-mail Encryption / Signing (sub feature of Smart Cards), is configured with Signing Hashing sha1. ATM_OWNER: APPROVE_QE: APPROVED_QE: APPROVE_SE: APPROVED_SE: APPROVE_SPAR: APPROVED_SPAR: ASSOCIATED_TESTCASES: TRAINING: TESTCASE_VERSION: TESTCASE_STATE: TESTCASE_PLATFORM: TESTCASE_PRODUCT: canyon, carroll, corvo, kiska, mystic, melody TESTCASE_FAMILY: TESTCASE_APPROVALS: CDATE: 1647601694 MDATE: 1647601694, 1651240580, 1742818693 MUSER: USWU60000, USWU60000, w3K3WRKH AUTHOR: USWU60000 ATM_MCOMMENTS: Imported from spreadsheet, Renamed from "DPQA_NewFeature/D7.6/FT-27164_Mocana_TrustCore_2020_FIPS_140-3_modules_for_Alexandra/161730"., Renamed from "WFAST_Connectivity/Testcases/FS_22.205_FIPS_140-3_Certification/14496". HISTORY: ATM_LOCKED: ATM_REQLINK: 3C8CDD6A-1CF3-11EC-B707-61040BE4A572, 3C8D9534-1CF3-11EC-B707-61040BE4A572, 3C9921E2-1CF3-11EC-B707-61040BE4A572 ATM_REQCOUNT: 3 QA_TEAM: TC_WEIGHTAGE: FILENAME: FILEDESC: FILES: RELEASE: AUTOMATION_GROUP: TESTCASE_STEPS_ARE_RELATED_TO: REASON_FOR_AUTOMATABLE: PRECONDITION_TO_BE_DONE: ACTION_TO_BE_DONE: COMMON_FUNCTIONALITY: COMMONALITY_DETAILS: CONSTRAINTS_DAR: IMP-98 by Karthika dated on 09-01-2023 DEVELOPMENT_COMPLETE_TIME: PO_SIGNOFF_DATE: COMPLEXITY_PRECONDITIONS: COMPLEXITY_OUTPUT_VALIDATION: non_outliers AUTOMATABLE: yes TESTCASE_MODIFICATION_REQUIRED: APTEST_UPDATE_STATUS: DEVICE_CATEGORY: common TC_WORK_LOCATION_CAT: work_from_home_tc AUTOMATION_TC_VALIDATION: COMPETENCY: wfast_connectivity APTEST_TRACKING: yes AUTOMATION_CANDIDATE: no