Table 27 Security Attributes And Authorized Roles (Function Access) - Fuji Xerox C2265 Manual

Hide thumbs Also See for C2265:
Table of Contents

Advertisement

Owner identifier of D.FUNC (Shared
Mailbox)
FMT_MSA.1 (b)
Hierarchical to:
Dependencies:
FMT_MSA.1.1 (b)

Table 27 Security Attributes and Authorized Roles (Function Access)

Security Attributes
Key operator identifier
SA identifier
General user identifier
User identifier for each function
FMT_MSA.1 (c)
Hierarchical to:
Dependencies:
Fuji Xerox C2265/C2263
query, delete, creation Key Operator
Management of security attributes
No other components.
[FDP_ACC.1 Subset access control, or
FDP_IFC.1 Subset information flow control]
FMT_SMR.1 Security roles
FMT_SMF.1 Specification of Management Functions
The TSF shall enforce the [assignment: access control SFP(s),
information flow control SFP(s)] to restrict the ability to [selection:
change default, query, modify, delete, [assignment: other
operations]] the security attributes [assignment: list of security
attributes] to [assignment: the authorized identified roles].
[assignment: access control SFP(s), information flow control SFP(s)]
- TOE Function Access Control SFP in Table 18,
[selection: change default, query, modify, delete, [assignment: other
operations]]
- query, modify ,delete ,[assignment: other operations]
[assignment: other operations]
- creation
[assignment: list of security attributes]
- the security attributes listed in Table 18
[assignment: the authorized identified roles].
- the roles listed in Table 27
Operation
modify
query, modify
delete, creation
query, modify
delete, creation
query, modify
Management of security attributes
No other components.
[FDP_ACC.1 Subset access control, or
FDP_IFC.1 Subset information flow control]
- 73 -
Security Target
Roles
Key Operator
U.ADMINISTRATOR
U.ADMINISTRATOR
U.ADMINISTRATOR
Copyright
2016 by Fuji Xerox Co., Ltd

Advertisement

Table of Contents
loading

This manual is also suitable for:

C2263

Table of Contents