ATM_ID: 2A2D66E0-0D7E-11E8-8202-E0431E7CDEF4 MFF: PLANNEDTIMESTAFF: 1 ID: WFAST_Accounting/Testcases/FS_44.025_Account_and_Password_Policies/10007 TESTCASE_HEADLINE: Verify the MFP is lockout an account after 3 invalid login attempts on a certain user name within a certain period of time GROUP: accounting FEATURE: none SUB_FEATURE: none INPUT: Set the password policy to High /Elevated /Basic PROCEDURE: 1. Login to CWIS as SA and go to Properties -- Login/ Permissions/ Accounting -- Device User Database -- Add New user -- create a user with valid password 2. Try to login with local user(what we created in step1) and invalid password. check the expected result(1) 3. Repeat the same step 2 two more time and verify the expected result(2) is observed after 3 unsuccessful login attempts 4. Now enter the correct password for the same user and check the expected results(2)(3) 5. Click "Ok" on popup and check the expected result(4) OUTPUT:

1. "Your login attempt was unsuccessful. Please check your username and password and try again. Remember%2c passwords are case-sensitive." popup message should be displayed in CWIS

2. Lockout popup message should display the "Login is currently locked: too many invalid login attempts. Please try again later" and it should not display the length of time for the lockout period to the user. 3. MFP should not allow the user to login with correct password until the Lockout Timer Expiration(60 minutes) 4. Authentication required screen should be displayed without any blocking screen or popup message

PROCESS: PRIORITY: 1 TEST_TYPE: manual LOE: RESOURCE_HW: RESOURCE_CONSUMEABLES: RESOURCE_MEDIA: SKILL_SET: intermediate TEST_CASE_TYPE: testcases TESTCASE_SOURCE: SPEC: FS 44.025 Account and Password Policies SPEC_VERSION: 1 SPEC_TAG: [44.025.036.006] (FT-22371) [D4.0-*] Lockout timer limits apply to Temporary Passwords just like regular passwords. ATM_OWNER: USWU60000 APPROVE_QE: w4y5gr85 APPROVED_QE: APPROVE_SE: w4y5gr85 APPROVED_SE: APPROVE_SPAR: APPROVED_SPAR: ASSOCIATED_TESTCASES: TRAINING: TESTCASE_VERSION: TESTCASE_STATE: TESTCASE_PLATFORM: TESTCASE_PRODUCT: canyon, carroll, carroll_sfp, corvo, corrib, kiska, malawi, mystic, melody_sfp, melody, muckross TESTCASE_APPROVALS: CDATE: 1518169615 MDATE: 1518169615, 1522662307, 1738656150 MUSER: q4BVX0J1, q4BVX0J1, r7WSLFH0 AUTHOR: q4BVX0J1 ATM_MCOMMENTS: Imported from spreadsheet, Renamed from "DPQA_NewFeature/D4.0/FT-22371_Secure_Local_Password_Policies-Characters_etc/107683"., TC HISTORY: ATM_LOCKED: ATM_REQLINK: 8BA39F8A-0D6E-11E8-8EA9-A8251E7CDEF4 ATM_REQCOUNT: 1 QA_TEAM: TC_WEIGHTAGE: 1 FILENAME: FILEDESC: FILES: TC_WORK_LOCATION_CAT: work_from_home_tc CONSTRAINTS_DAR: Imp_98 . NA Done By Nanthakumar dated on 25-01-2023 DEVICE_CATEGORY: common COMPETENCY: wfast_accounting COMPLEXITY_OUTPUT_VALIDATION: non_outliers AUTOMATION_CANDIDATE: yes SPEC_NUM: TESTCASE_FAMILY: RELEASE: AUTOMATION_GROUP: AUTOMATION_TC_VALIDATION: PRECONDITION_TO_BE_DONE: ACTION_TO_BE_DONE: TESTCASE_STEPS_ARE_RELATED_TO: REASON_FOR_AUTOMATABLE: DEVELOPMENT_COMPLETE_TIME: PO_SIGNOFF_DATE: COMPLEXITY_PRECONDITIONS: 0 AUTOMATABLE: no TESTCASE_MODIFICATION_REQUIRED: no APTEST_UPDATE_STATUS: no TEST_COVERED_BY: wfast SRT_ANALYZATION: analyzed