Security Management (Fmt) - Netscape MANAGEMENT SYSTEM 6.1 - ADMINISTRATOR Administrator's Manual

Table of Contents

Advertisement

FIA_AFL.1.1
If authentication is not performed in a cryptographic module that
has been FIPS 140-1 validated to an overall Level of 2 or higher with Level 3 or
higher for Roles and Services, the IT environment shall detect when an
Administrator configurable maximum authentication attempts unsuccessful
authentication attempts have occurred since the last successful authentication for
the indicated user identity.
FIA_AFL.1.2
When the defined number of unsuccessful authentication attempts
has been met or surpassed, the IT environment shall [disable the corresponding
user account].
FIA_ATD.1 User attribute definition
FIA_ATD.1.1
The IT environment shall maintain the following list of security
attributes belonging to individual users: the set of roles that the user is authorized
to assume, [and no other security attributes].
FIA_UAU.1 Timing of authentication (iteration 1)
FIA_UAU.1.1
The IT environment shall allow [HTTP and LDAP based
1
] on behalf of the user to be performed before the user is authenticated.
services
FIA_UAU.1.2
The IT environment shall require each user to be successfully
authenticated before allowing any other IT environment-mediated actions on
behalf of that user.
FIA_UID.1 Timing of identification (iteration 1)
FIA_UID.1.1
The IT environment shall allow [HTTP and LDAP based services]
on behalf of the user to be performed before the user is identified.
FIA_UID.1.2
The IT environment shall require each user to be successfully
identified before allowing any other IT environment-mediated actions on behalf of
that user.
FIA_USB.1 User-subject binding (iteration 1)
FIA_USB.1.1
The IT environment shall associate the appropriate user security
attributes with subjects acting on behalf of that user.

Security management (FMT)

FMT_MOF.1 Management of security functions behavior (iteration 1)
1.
These are the services that are controlled by CMS6.1 and are not subject to
mediation by the IT environment.
Appendix A
Common Criteria Environment: Security Requirements
Security Requirements for the IT Environment
671

Advertisement

Table of Contents
loading

This manual is also suitable for:

Certificate management system 6.1

Table of Contents