ATM_ID: B5DEE68A-A6AB-11EC-96C2-7D98BEA7DE52
MFF:
PLANNEDTIMESTAFF:
ID: Not_to_use_for_any_Dashboard/Deprecated/FS_22.205_FIPS/14681
TESTCASE_HEADLINE: To validate the MFD's functionality when Kerberos is set to operate as a FIPS+CC non compliant protocol in FIPS+CC mode for Network Authentication.
GROUP:
FEATURE:
SUB_FEATURE:
INPUT:
MFD should have latest firmware.
WebUI must be accessible.
User should Logged in as SA.
PROCEDURE: 1.From EWS navigate through Properties -- Security -- Encryption -- FIPS 140-3 page.
2.Enable FIPS+CC and run FIPS+CC configuration check.
3.Acknowledge all exceptions and reboot the MFD.
4.Once the MFD came to ready state navigate to Properties --
Login/ Permissions/ Accounting -- Login Methods -- Control Panel Website Login Methods page.
5.Configure "Validate on Network" for Control Panel Login.
6.Come back to Login Methods page and configure the Authentication servers.
7.Choose Kerberos for Authentication Type and save the changes.
8.Check whether the MFD is raising an exception and requesting the user to "Enable Kerberos exception".
9.Select "Enable Kerberos exception".
10.Navigate back to FIPS 140-3 page and check whether there is a Kerberos exception showing under the summary of exceptions.
OUTPUT: 9.Enabling the exception (below) will allow this device to communicate with non-FIPS+CC compliant Kerberos servers.
10.Summary of FIPS+CC Exceptions should have Kerberos exception since user acknowledged Kerberos exception by selecting "Enable Kerberos exception".
PROCESS:
PRIORITY:
TEST_TYPE: manual
LOE:
RESOURCE_HW:
RESOURCE_CONSUMEABLES:
RESOURCE_MEDIA:
SKILL_SET:
TEST_CASE_TYPE: testcases
TESTCASE_SOURCE:
SPEC: FS 22.205 FIPS 140-3 Certification
SPEC_VERSION: 1.0001
SPEC_TAG: [22.205.009] (FT-27164, FT-29598, FT-28756) {D7.6, D7.8} On a FIPS with CC mode enabled MFP, when Kerberos is configured via CWIS for either Network Authentication (for at least one Authentication Server) or Smart Cards (for at least one Domain Controller), the SA shall be given the option to utilize the Kerberos protocol by acknowledging a FIPS + CC mode Kerberos (Network and Smart Card Authentication) exception.
[22.205.010] (FT-27164, FT-29598, FT-28756) {D7.6, D7.8} If a Kerberos (Network and Smart Card Authentication) FIPS with CC mode exception has been acknowledged by an SAKO, then once FIPS with CC mode is enabled, the MFP shall display a Kerberos (Network and Smart Card Authentication) FIPS exception in the FIPS summary of exceptions table on CWIS.
ATM_OWNER:
APPROVE_QE:
APPROVED_QE:
APPROVE_SE:
APPROVED_SE:
APPROVE_SPAR:
APPROVED_SPAR:
ASSOCIATED_TESTCASES:
TRAINING:
TESTCASE_VERSION:
TESTCASE_STATE:
TESTCASE_PLATFORM:
TESTCASE_PRODUCT: canyon, carroll, corvo, kiska, mystic, melody
TESTCASE_FAMILY:
TESTCASE_APPROVALS:
CDATE: 1647601696
MDATE: 1647601696, 1651240585, 1742818694
MUSER: USWU60000, USWU60000, w3K3WRKH
AUTHOR: USWU60000
ATM_MCOMMENTS: Imported from spreadsheet, Renamed from "DPQA_NewFeature/D7.6/FT-27164_Mocana_TrustCore_2020_FIPS_140-3_modules_for_Alexandra/161917"., Renamed from "WFAST_Connectivity/Testcases/FS_22.205_FIPS_140-3_Certification/14681".
HISTORY:
ATM_LOCKED:
ATM_REQLINK: 3C21E974-1CF3-11EC-B707-61040BE4A572, 3C24AC40-1CF3-11EC-B707-61040BE4A572
ATM_REQCOUNT: 2
QA_TEAM:
TC_WEIGHTAGE:
FILENAME:
FILEDESC:
FILES:
RELEASE:
AUTOMATION_GROUP:
TESTCASE_STEPS_ARE_RELATED_TO:
REASON_FOR_AUTOMATABLE:
PRECONDITION_TO_BE_DONE:
ACTION_TO_BE_DONE:
COMMON_FUNCTIONALITY:
COMMONALITY_DETAILS:
CONSTRAINTS_DAR: IMP-98 by Karthika dated on 09-01-2023
DEVELOPMENT_COMPLETE_TIME:
PO_SIGNOFF_DATE:
COMPLEXITY_PRECONDITIONS:
COMPLEXITY_OUTPUT_VALIDATION: non_outliers
AUTOMATABLE: yes
TESTCASE_MODIFICATION_REQUIRED:
APTEST_UPDATE_STATUS:
DEVICE_CATEGORY: common
TC_WORK_LOCATION_CAT: work_from_home_with_office_support_tc
AUTOMATION_TC_VALIDATION:
COMPETENCY: wfast_connectivity
APTEST_TRACKING: yes
AUTOMATION_CANDIDATE: no