User: Remove NoAccess privilege cases and fix typo

Changes:
  - Remove NoAccess test cases for LDAP web due to:
    https://gerrit.openbmc.org/c/openbmc/bmcweb/+/52365
  - Fix typo for patching redfish attribute AccountLockoutThreshold

Tested:
  - Ran-- dryrun gui/gui_test/security_and_access_menu/
  - Ran --dryrun redfish/account_service/test_ldap_configuration.robot

Change-Id: I8d5efd8256b66ca834e9cdd18c83a98f3a844dda
Signed-off-by: Wilson Suen <wilsons@supermicro.com>
diff --git a/gui/gui_test/security_and_access_menu/test_ldap_sub_menu.robot b/gui/gui_test/security_and_access_menu/test_ldap_sub_menu.robot
index a7990e1..ceb0e45 100644
--- a/gui/gui_test/security_and_access_menu/test_ldap_sub_menu.robot
+++ b/gui/gui_test/security_and_access_menu/test_ldap_sub_menu.robot
@@ -167,7 +167,6 @@
     ${GROUP_NAME}    Administrator  ${HTTP_OK}
     ${GROUP_NAME}    Operator       ${HTTP_OK}
     ${GROUP_NAME}    ReadOnly       ${HTTP_OK}
-    ${GROUP_NAME}    NoAccess       ${HTTP_FORBIDDEN}
 
 
 Verify LDAP Login Fails On Wrong LDAP Port
@@ -283,7 +282,7 @@
     # Description of argument(s):
     # group_name       The group name of LDAP user.
     # group_privilege  The group privilege for LDAP user
-    #                  (e.g. "Administrator", "Operator", "ReadOnly" or "NoAcccess").
+    #                  (e.g. "Administrator", "Operator" or "ReadOnly").
 
     Create LDAP Configuration
     Click Element  ${xpath_add_role_group_button}
@@ -355,7 +354,7 @@
     ...  AND  Delete LDAP Role Group  ${group_name}
 
     # Description of argument(s):
-    # group_privilege    The group privilege ("Administrator", "Operator", "ReadOnly" or "NoAccess").
+    # group_privilege    The group privilege ("Administrator", "Operator" or "ReadOnly").
     # group_name         The group name of user.
     # valid_status_code  The expected valid status code.
 
diff --git a/gui/gui_test/security_and_access_menu/test_user_management_sub_menu.robot b/gui/gui_test/security_and_access_menu/test_user_management_sub_menu.robot
index a3f392f..674e487 100644
--- a/gui/gui_test/security_and_access_menu/test_user_management_sub_menu.robot
+++ b/gui/gui_test/security_and_access_menu/test_user_management_sub_menu.robot
@@ -116,15 +116,14 @@
     ${username}[2]   Administrator    ${False}
 
 
-Verify Operator And No Access User Privilege
+Verify Operator User Privilege
     [Documentation]  Create users with different access privilege
     ...  and verify that the user is getting created.
-    [Tags]  Verify_Operator_And_No_Access_User_Privilege
+    [Tags]  Verify_Operator_User_Privilege
     [Template]  Create User And Verify
 
     # username      privilege_level  enabled
     operator_user   Operator         ${True}
-    noaccess_user   NoAccess         ${True}
 
 
 Verify User Account And Properties Saved Through Reboots
diff --git a/redfish/account_service/test_ldap_configuration.robot b/redfish/account_service/test_ldap_configuration.robot
index efa180f..d484900 100644
--- a/redfish/account_service/test_ldap_configuration.robot
+++ b/redfish/account_service/test_ldap_configuration.robot
@@ -621,7 +621,7 @@
     Redfish.Patch  ${REDFISH_BASE_URI}AccountService
     ...  body=[('AccountLockoutDuration', ${old_account_service['AccountLockoutDuration']})]
     Redfish.Patch  ${REDFISH_BASE_URI}AccountService
-    ...  body=[('AccountLockoutDuration', ${old_account_service['AccountLockoutThreshold']})]
+    ...  body=[('AccountLockoutThreshold', ${old_account_service['AccountLockoutThreshold']})]
 
 
 Suite Setup Execution