Table 31 Security Attributes And Authorized Roles (Dsr) - Fuji Xerox C2265 Manual

Hide thumbs Also See for C2265:
Table of Contents

Advertisement

Fuji Xerox C2265/C2263

Table 31 Security Attributes and Authorized Roles (DSR)

Security Attributes
Key operator identifier
SA identifier
General user identifier
Owner identifier of D.DOC (own
document data in Shared Mailbox)
Owner identifier of D.DOC (all document
data in Mailbox)
Owner identifier of D.FUNC (Shared
Mailbox)
FMT_MSA.1 (h)
Hierarchical to:
Dependencies:
FMT_MSA.1.1 (h)
Security Target
- the security attributes listed in Table 17
[assignment: the authorized identified roles].
- the roles listed in Table 31
Operation
modify
query, modify
delete, creation
query, modify
delete, creation
query, delete,
creation
query, delete
query, delete,
creation
Management of security attributes
No other components.
[FDP_ACC.1 Subset access control, or
FDP_IFC.1 Subset information flow control]
FMT_SMR.1 Security roles
FMT_SMF.1 Specification of Management Functions
The TSF shall enforce the [assignment: access control SFP(s),
information flow control SFP(s)] to restrict the ability to [selection:
change default, query, modify, delete, [assignment: other
operations]] the security attributes [assignment: list of security
attributes] to [assignment: the authorized identified roles].
[assignment: access control SFP(s), information flow control SFP(s)]
- D.FUNC Control SFP in Table 24
[selection: change default, query, modify, delete, [assignment: other
operations]]
- query, modify, delete, [assignment: other operations]
[assignment: other operations]
- creation
[assignment: list of security attributes]
- the security attributes listed in Table 17
[assignment: the authorized identified roles].
- 78 -
Roles
Key Operator
U.ADMINISTRATOR
U.ADMINISTRATOR
U.USER
Key Operator
Key Operator
Copyright
2016 by Fuji Xerox Co., Ltd

Advertisement

Table of Contents
loading

This manual is also suitable for:

C2263

Table of Contents