Identification And Authentication (Fia) - Netscape MANAGEMENT SYSTEM 6.1 - ADMINISTRATOR Administrator's Manual

Table of Contents

Advertisement

Security Requirements for the IT Environment
FDP_ACF.1 Security attribute based access control (iteration 1)
FDP_ACF.1.1
Access Control Policy specified in "CIMC TOE Access Control Policy," on page 675
to objects based on the identity of the subject and the set of roles that the subject is
authorized to assume.
FDP_ACF.1.2
an operation among controlled subjects and controlled objects is allowed: The
capability to zeroize plaintext private and secret keys shall be restricted to
Administrators, Auditors, Officers, and Operators.
FDP_ACF.1.3
objects based on the following additional rules: [none].
FDP_ACF.1.4
objects based on the [none].
FDP_ITT.1 Basic internal transfer protection (iteration 1)
FDP_ITT.1.1
Access Control Policy specified in "CIMC TOE Access Control Policy," on page 675
to prevent the modification of security-relevant user data when it is transmitted
between physically-separated parts of the IT environment.
FDP_ITT.1 Basic internal transfer protection (iteration 2)
FDP_ITT.1.1
Access Control Policy specified in "CIMC TOE Access Control Policy," on page 675
to prevent the disclosure of confidential user data when it is transmitted between
physically-separated parts of the IT environment.
FDP_UCT.1 Basic data exchange confidentiality (iteration 1)
FDP_UCT.1.1 The IT environment shall enforce the CIMC IT Environment
Access Control Policy specified in "CIMC TOE Access Control Policy," on page 675
to be able to transmit objects in a manner protected from unauthorized disclosure.

Identification and authentication (FIA)

FIA_AFL.1 Authentication failure handling
670
Netscape Certificate Management System Administrator's Guide • February 2003
The IT environment shall enforce the CIMC IT Environment
The IT environment shall enforce the following rule to determine if
The IT environment shall explicitly authorize access of subjects to
The IT environment shall explicitly deny access of subjects to
The IT environment shall enforce the CIMC IT Environment
The IT environment shall enforce the CIMC IT Environment

Advertisement

Table of Contents
loading

This manual is also suitable for:

Certificate management system 6.1

Table of Contents