Xerox WorkCentre 5845 User Information page 13

Multi-function device security target
Hide thumbs Also See for WorkCentre 5845:
Table of Contents

Advertisement

Xerox Multi-Function Device Security Target
The On-Demand Image Overwrite (ODIO) function overwrites the hard
drive(s) on-demand of the system administrator. The ODIO function operates
in two modes: full ODIO and standard ODIO. A standard ODIO overwrites all
files written to temporary storage areas of the HDD. A full ODIO overwrites
those files as well as the fax mailbox/dial directory and scan-to-mailbox data.
1.3.2.2. Authentication (TSF_AUT)
A user must authenticate by entering a username and password prior to
being granted access to the LUI or the Web UI. While the user is typing the
password, the TOE obscures each character entered.
Upon successful authentication, users are granted access to functions based
on their role. The system administrator defines the privileges associated to
each role.
If configured for local authentication the system requires the system
administrator to create each user and assign associated credentials. The
system will authenticate the user against an internal database. The TOE may
alternatively be configured to use an external authentication store as
described by section 1.3.2.3.
The TOE enforces administrator defined session timeout periods for the LUI
and Web UI.
1.3.2.3. Network Identification (TSF_NET_ID)
As an alternative to local authentication, the TOE may be configured to refer
to an external identity server (a trusted remote IT entity). User credentials
entered at the LUI or Web UI are authenticated at the server instead of the
TOE. The network authentication services supported by the TOE include:
smart card authentication, LDAP v4, Kerberos v5 (Solaris) and Kerberos v5
(Windows 2000/2003/2008).
1.3.2.4. Security Audit (TSF_FAU)
The TOE generates audit logs that record events (e.g. copy/print/scan/fax job
completion) and associated users. The audit logs, which are stored locally in
a 15000 entry circular log, are available to TOE administrators and can be
exported for viewing and analysis. The downloaded audit records are in
comma separated format.
1.3.2.5. Cryptographic Operations (TSF_FCS)
The TOE utilizes digital signature generation and verification (RSA), data
encryption (TDES, AES), key establishment (RSA) and cryptographic
checksum generation and secure hash computation (HMAC, SHA-1) in
support of disk encryption, SFTP, TLS and IPsec.
13
Copyright
2013 Xerox Corporation. All rights reserved.

Hide quick links:

Advertisement

Table of Contents
loading

Table of Contents