IBM Tivoli Directory Server Version 6.0 Fix Pack 1, Interim Fix 5

This certificate has known related CVEs, which means that the certified product might be vulnerable.

CSV information ?

Status archived
Valid from 02.03.2006
Valid until 01.09.2019
Scheme 🇩🇪 DE
Manufacturer IBM Corporation
Category Key Management Systems
Security level ALC_FLR.1, EAL4+

Heuristics summary ?

Certificate ID: BSI-DSZ-CC-0283-2006

Certificate ?

Certification report ?

Extracted keywords

Protocols
SSL

Vendor
Microsoft

Security level
EAL4, EAL 1, EAL 7, EAL 4, EAL4+, EAL1, EAL3, EAL5, EAL7, EAL2, EAL6, EAL4 augmented
Claims
T.ENTRY, T.ACCESS, T.ACCOUNT, T.BYPASS, A.PHYSICAL, A.ADMIN, A.TOENEV, A.COMM, A.COOP, A.ROUTE, A.TIME, A.TOEENV
Security Assurance Requirements (SAR)
ACM_AUT.1, ACM_CAP.4, ACM_SCP.1, ACM_AUT, ACM_CAP, ACM_SCP, ADO_DEL.2, ADO_IGS.1, ADO_DEL, ADO_IGS, ADV_FSP.2, ADV_HLD.2, ADV_IMP.1, ADV_LLD.1, ADV_RCR.1, ADV_SPM.1, ADV_FSP, ADV_HLD, ADV_IMP, ADV_INT, ADV_LLD, ADV_RCR, ADV_SPM, AGD_ADM.1, AGD_USR.1, AGD_ADM, AGD_USR, ALC_FLR.1, ALC_DVS.1, ALC_TAT.1, ALC_DVS, ALC_FLR, ALC_LCD, ALC_TAT, ATE_COV.2, ATE_DPT.1, ATE_FUN.1, ATE_IND.2, ATE_COV, ATE_DPT, ATE_FUN, ATE_IND, AVA_MSU.1, AVA_SOF.1, AVA_VLA.2, AVA_CCA, AVA_MSU, AVA_SOF, AVA_VLA, AVA_VLA.3, AVA_VLA.4, ASE_DES.1, ASE_ENV.1, ASE_INT.1, ASE_OBJ.1, ASE_PPC.1, ASE_REQ.1, ASE_SRE.1, ASE_TSS.1
Security Functional Requirements (SFR)
FAU_GEN.1, FAU_GEN.2, FAU_SAR.1, FAU_SAR.2, FAU_STG.1, FDP_ACC.2, FDP_ACF.1, FIA_AFL, FIA_ATD.1, FIA_SOS, FIA_UAU.1, FIA_UID.1, FIA_SOS.1, FMT_MOF, FMT_MSA.1, FMT_MSA.3, FMT_MTD.1, FMT_SMF.1, FMT_SMR.1, FPT_RVM.1, FPT_STM.1
Certificates
BSI-DSZ-CC-0283-2006, BSI-DSZ-CC-0235-2004, BSI-DSZ-CC-0283
Evaluation facilities
atsec

Certification process
Technical Report BSI-DSZ-CC-0283, Version 1.0, 2006-02-23, atsec information security GmbH (confidential document) User Guidance Documentation: [9] IBM Tivoli Directory Server Version 6.0 Administration Guide

Standards
AIS 32, AIS33, RFC 1777, RFC 2251, ISO/IEC 15408:1999
Technical reports
BSI 7125, BSI 7148, BSI 7149

File metadata

Title Certification Report BSI-DSZ-CC-0283-2006
Subject Certification Report
Keywords CC, Common Criteria, BSI-DSZ-CC-0283-2006, IBM Tivoli Directory Server Version 6.0, IBM,
Author BSI
Creation date D:20060321102231+01'00'
Modification date D:20060323072639+01'00'
Pages 50
Creator Acrobat PDFMaker 7.0.5 für Word
Producer Acrobat Distiller 7.0.5 (Windows)

Frontpage

Certificate ID BSI-DSZ-CC-0283-2006
Certified item IBM Tivoli Directory Server Version 6.0 Fix Pack 1, Interim Fix 5
Certification lab BSI
Developer IBM Corporation

References

Incoming

Security target ?

Extracted keywords

Protocols
SSL, TLS

Vendor
Microsoft

Security level
EAL 4, EAL 4 augmented
Claims
O.AUTHENTICATE, O.AUTHORIZE, O.ACCOUNT, O.BYPASS, T.ENTRY, T.ACCESS, T.ACCOUNT, T.BYPASS, A.PHYSICAL, A.ADMIN, A.TOEENV, A.COMM, A.COOP, A.ROUTE, A.TIME, OE.MANAGE, OE.ENVMANAGE, OE.PHYSICAL, OE.DATABASE, OE.SOPHISTICATED, OE.BACKUP, OE.COMMUNICATION, OE.ROUTE, OE.TIME
Security Assurance Requirements (SAR)
ACM_AUT.1, ACM_CAP.4, ACM_SCP.2, ADO_DEL.2, ADO_IGS.1, ADV_FSP.2, ADV_HLD.2, ADV_IMP.1, ADV_LLD.1, ADV_RCR.1, ADV_SPM.1, AGD_ADM.1, AGD_USR.1, AGD_SPM.1, ALC_FLR.1, ALC_DVS.1, ALC_LCD.1, ALC_TAT.1, ATE_COV.2, ATE_DPT.1, ATE_FUN.1, ATE_IND.2, AVA_MSU.2, AVA_SOF.1, AVA_VLA.2, AVA_MSU.1, AVA_VLA.1
Security Functional Requirements (SFR)
FAU_GEN.1, FAU_GEN.2, FAU_SAR.1, FAU_SAR.2, FAU_STG.1, FAU_GEN.1.1, FAU_GEN.1.2, FAU_GEN.2.1, FAU_SAR.1.1, FAU_SAR.1.2, FAU_SAR.2.1, FAU_STG.1.1, FAU_STG.1.2, FDP_ACC.2, FDP_ACF.1, FDP_ACC.2.1, FDP_ACC.2.2, FDP_ACF.1.1, FDP_ACF.1.2, FDP_ACF.1.3, FDP_ACF.1.4, FDP_ACC.1, FDP_IFC.1, FIA_AFL, FIA_ATD.1, FIA_SOS, FIA_UAU.1, FIA_UID.1, FIA_AFL.1, FIA_SOS.1, FIA_AFL.1.1, FIA_AFL.1.2, FIA_ATD.1.1, FIA_SOS.1.1, FIA_UAU.1.1, FIA_UAU.1.2, FIA_UID.1.1, FIA_UID.1.2, FMT_MOF, FMT_MSA.1, FMT_MSA.3, FMT_MTD.1, FMT_SMF.1, FMT_SMR.1, FMT_MOF.1, FMT_MOF.1.1, FMT_MSA.1.1, FMT_MSA.3.1, FMT_MSA.3.2, FMT_MTD.1.1, FMT_SMF.1.1, FMT_SMR.1.1, FMT_SMR.1.2, FPT_RVM.1, FPT_STM.1, FPT_RVM.1.1, FPT_STM.1.1

Standards
RFC1274, RFC 1274, RFC1777, RFC 1777, RFC1778, RFC 1778, RFC1779, RFC 1779, RFC1823, RFC 1823, RFC2052, RFC 2052, RFC2219, RFC 2219, RFC2222, RFC 2222, RFC2247, RFC 2247, RFC2251, RFC 2251, RFC2252, RFC 2252, RFC2253, RFC 2253, RFC2254, RFC 2254, RFC2255, RFC 2255, RFC2256, RFC 2256, RFC2596, RFC 2596, RFC2696, RFC 2696, RFC2829, RFC 2829, RFC2830, RFC 2830, RFC2849, RFC 2849, RFC2891, RFC 2891, CCIMB-99-031

File metadata

Title Microsoft Word - [ST] Security Target ITDS 6.0 V1.7.1.doc
Author Michael
Creation date D:20051018110312+02'00'
Modification date D:20051018110312+02'00'
Pages 63
Creator PScript5.dll Version 5.2.2
Producer Acrobat Distiller 5.0.5 (Windows)

Heuristics ?

Certificate ID: BSI-DSZ-CC-0283-2006

Extracted SARs

ADV_FSP.2, ADV_HLD.2, ADV_IMP.1, ADV_LLD.1, ADV_RCR.1, ADV_SPM.1, AGD_ADM.1, AGD_SPM.1, AGD_USR.1, ALC_DVS.1, ALC_FLR.1, ALC_LCD.1, ALC_TAT.1, ASE_DES.1, ASE_ENV.1, ASE_INT.1, ASE_OBJ.1, ASE_PPC.1, ASE_REQ.1, ASE_SRE.1, ASE_TSS.1, ATE_COV.2, ATE_DPT.1, ATE_FUN.1, ATE_IND.2, AVA_MSU.2, AVA_SOF.1, AVA_VLA.2

Related CVEs

ID Links Severity CVSS Score Published on
Base Exploitability Impact
CVE-2005-3567
C M N
MEDIUM 5.8 6.4 16.11.2005 07:42
CVE-2006-0717
C M N
MEDIUM 5.0 2.9 15.02.2006 11:06
CVE-2009-3089
C M N
HIGH 7.8 6.9 08.09.2009 18:30
CVE-2009-5072
C M N
MEDIUM 4.0 2.9 21.04.2011 10:55
CVE-2009-5073
C M N
MEDIUM 4.0 2.9 21.04.2011 10:55
CVE-2010-2927
C M N
MEDIUM 5.0 2.9 02.08.2010 20:40
CVE-2010-4216
C M N
MEDIUM 5.0 2.9 09.11.2010 21:00
CVE-2010-4217
C M N
MEDIUM 5.0 2.9 09.11.2010 21:00
CVE-2010-4786
C M N
MEDIUM 4.0 2.9 21.04.2011 10:55
CVE-2010-4787
C M N
MEDIUM 4.0 2.9 21.04.2011 10:55
CVE-2010-4788
C M N
MEDIUM 4.0 2.9 21.04.2011 10:55
CVE-2010-4789
C M N
MEDIUM 4.0 2.9 21.04.2011 10:55
CVE-2011-1206
C M N
HIGH 10.0 10.0 21.04.2011 10:55
CVE-2011-1820
C M N
LOW 1.7 2.9 21.04.2011 10:55
CVE-2012-0726
C M N
MEDIUM 6.4 4.9 22.04.2012 18:55
CVE-2012-0743
C M N
MEDIUM 5.0 2.9 22.04.2012 18:55
CVE-2012-2191
C M N
MEDIUM 5.0 2.9 08.08.2012 10:26
CVE-2012-2203
C M N
HIGH 7.5 6.4 08.08.2012 10:26
CVE-2015-0138
C M N
MEDIUM 4.3 2.9 25.03.2015 01:59
CVE-2015-1959
C M N
MEDIUM 4.6 6.4 28.06.2015 15:59
CVE-2015-1972
C M N
MEDIUM 4.3 2.9 28.06.2015 15:59
CVE-2015-1974
C M N
MEDIUM 6.5 6.4 28.06.2015 15:59
CVE-2015-1975
C M N
HIGH 7.8 5.9 03.04.2018 22:29
CVE-2015-1976
C M N
MEDIUM 5.5 3.6 08.02.2017 22:59
CVE-2015-1978
C M N
MEDIUM 4.3 2.9 28.06.2015 15:59
CVE-2015-2019
C M N
LOW 2.1 2.9 28.06.2015 15:59
Showing 5 out of 26.

References ?

Updates ?

  • 21.11.2024 The certificate data changed.
    Certificate changed

    The computed heuristics were updated.

    • The following values were inserted: {'prev_certificates': [], 'next_certificates': []}.
  • 14.10.2024 The certificate data changed.
    Certificate changed

    The computed heuristics were updated.

    • The related_cves property was updated, with the {'_type': 'Set', 'elements': ['CVE-2010-4216', 'CVE-2010-4217', 'CVE-2005-3567']} values added.
    • The direct_transitive_cves property was updated, with the {'_type': 'Set', 'elements': ['CVE-2010-4217', 'CVE-2015-1977']} values added.
    • The indirect_transitive_cves property was updated, with the {'_type': 'Set', 'elements': ['CVE-2010-4217', 'CVE-2015-1977']} values added.
  • 30.09.2024 The certificate data changed.
    Certificate changed

    The computed heuristics were updated.

    • The related_cves property was updated, with the {'_type': 'Set', 'elements': ['CVE-2010-4216', 'CVE-2010-4217', 'CVE-2005-3567']} values discarded.
    • The direct_transitive_cves property was updated, with the {'_type': 'Set', 'elements': ['CVE-2010-4217', 'CVE-2015-1977']} values discarded.
    • The indirect_transitive_cves property was updated, with the {'_type': 'Set', 'elements': ['CVE-2010-4217', 'CVE-2015-1977']} values discarded.
  • 22.08.2024 The certificate data changed.
    Certificate changed

    The state of the certificate object was updated.

    • The report property was updated, with the {'download_ok': True, 'convert_ok': True, 'extract_ok': True, 'pdf_hash': '93468cab4080ab54b12d7a317b09f0397213ca50690c8b949316e15be37d01e9', 'txt_hash': 'fd0c8bd6ee0689d7e54be7480dedf3b8958060bc6aa428c4f14e0c63cffdf575'} data.
    • The st property was updated, with the {'download_ok': True, 'convert_ok': True, 'extract_ok': True, 'pdf_hash': 'cca9b7bf4988d097b1ff58926742c49c795299ad3d180351d31519459bf15e66', 'txt_hash': 'ef92a79539ecd93178d867fe2f7692d1623b75e9083fe2a98d0ef19f61c5ff49'} data.

    The PDF extraction data was updated.

    • The report_metadata property was set to {'pdf_file_size_bytes': 1075575, 'pdf_is_encrypted': False, 'pdf_number_of_pages': 50, '/CreationDate': "D:20060321102231+01'00'", '/Subject': 'Certification Report', '/Author': 'BSI', '/Creator': 'Acrobat PDFMaker 7.0.5 für Word', '/Keywords': 'CC, Common Criteria, BSI-DSZ-CC-0283-2006, IBM Tivoli Directory Server Version 6.0, IBM,', '/Producer': 'Acrobat Distiller 7.0.5 (Windows)', '/ModDate': "D:20060323072639+01'00'", '/Company': 'BSI, Postfach 200363, 53133 Bonn', '/SourceModified': 'D:20060316063228', '/Title': 'Certification Report BSI-DSZ-CC-0283-2006 ', 'pdf_hyperlinks': {'_type': 'Set', 'elements': []}}.
    • The st_metadata property was set to {'pdf_file_size_bytes': 508237, 'pdf_is_encrypted': False, 'pdf_number_of_pages': 63, '/CreationDate': "D:20051018110312+02'00'", '/ModDate': "D:20051018110312+02'00'", '/Producer': 'Acrobat Distiller 5.0.5 (Windows)', '/Author': 'Michael', '/Creator': 'PScript5.dll Version 5.2.2', '/Title': 'Microsoft Word - [ST] Security Target ITDS 6.0 V1.7.1.doc', 'pdf_hyperlinks': {'_type': 'Set', 'elements': []}}.
    • The report_frontpage property was set to {'DE': {'match_rules': ['(BSI-DSZ-CC-.+?) (?:for|For) (.+?) from (.*)'], 'cert_id': 'BSI-DSZ-CC-0283-2006', 'cert_item': 'IBM Tivoli Directory Server Version 6.0 Fix Pack 1, Interim Fix 5', 'developer': 'IBM Corporation', 'cert_lab': 'BSI'}}.
    • The report_keywords property was set to {'cc_cert_id': {'DE': {'BSI-DSZ-CC-0283-2006': 30, 'BSI-DSZ-CC-0235-2004': 5, 'BSI-DSZ-CC-0283': 2}}, 'cc_protection_profile_id': {}, 'cc_security_level': {'EAL': {'EAL4': 10, 'EAL 1': 1, 'EAL 7': 1, 'EAL 4': 1, 'EAL4+': 1, 'EAL1': 5, 'EAL3': 4, 'EAL5': 6, 'EAL7': 4, 'EAL2': 3, 'EAL6': 3, 'EAL4 augmented': 3}}, 'cc_sar': {'ACM': {'ACM_AUT.1': 1, 'ACM_CAP.4': 1, 'ACM_SCP.1': 1, 'ACM_AUT': 2, 'ACM_CAP': 2, 'ACM_SCP': 2}, 'ADO': {'ADO_DEL.2': 1, 'ADO_IGS.1': 1, 'ADO_DEL': 2, 'ADO_IGS': 2}, 'ADV': {'ADV_FSP.2': 1, 'ADV_HLD.2': 1, 'ADV_IMP.1': 1, 'ADV_LLD.1': 1, 'ADV_RCR.1': 1, 'ADV_SPM.1': 1, 'ADV_FSP': 2, 'ADV_HLD': 2, 'ADV_IMP': 2, 'ADV_INT': 2, 'ADV_LLD': 2, 'ADV_RCR': 2, 'ADV_SPM': 2}, 'AGD': {'AGD_ADM.1': 1, 'AGD_USR.1': 1, 'AGD_ADM': 2, 'AGD_USR': 2}, 'ALC': {'ALC_FLR.1': 6, 'ALC_DVS.1': 1, 'ALC_TAT.1': 1, 'ALC_DVS': 2, 'ALC_FLR': 2, 'ALC_LCD': 1, 'ALC_TAT': 2}, 'ATE': {'ATE_COV.2': 1, 'ATE_DPT.1': 1, 'ATE_FUN.1': 1, 'ATE_IND.2': 1, 'ATE_COV': 2, 'ATE_DPT': 2, 'ATE_FUN': 2, 'ATE_IND': 2}, 'AVA': {'AVA_MSU.1': 1, 'AVA_SOF.1': 1, 'AVA_VLA.2': 2, 'AVA_CCA': 2, 'AVA_MSU': 2, 'AVA_SOF': 4, 'AVA_VLA': 4, 'AVA_VLA.3': 1, 'AVA_VLA.4': 1}, 'ASE': {'ASE_DES.1': 1, 'ASE_ENV.1': 1, 'ASE_INT.1': 1, 'ASE_OBJ.1': 1, 'ASE_PPC.1': 1, 'ASE_REQ.1': 1, 'ASE_SRE.1': 1, 'ASE_TSS.1': 1}}, 'cc_sfr': {'FAU': {'FAU_GEN.1': 1, 'FAU_GEN.2': 1, 'FAU_SAR.1': 1, 'FAU_SAR.2': 1, 'FAU_STG.1': 1}, 'FDP': {'FDP_ACC.2': 2, 'FDP_ACF.1': 2}, 'FIA': {'FIA_AFL': 2, 'FIA_ATD.1': 1, 'FIA_SOS': 2, 'FIA_UAU.1': 1, 'FIA_UID.1': 1, 'FIA_SOS.1': 1}, 'FMT': {'FMT_MOF': 2, 'FMT_MSA.1': 1, 'FMT_MSA.3': 1, 'FMT_MTD.1': 1, 'FMT_SMF.1': 1, 'FMT_SMR.1': 1}, 'FPT': {'FPT_RVM.1': 1, 'FPT_STM.1': 1}}, 'cc_claims': {'T': {'T.ENTRY': 1, 'T.ACCESS': 2, 'T.ACCOUNT': 1, 'T.BYPASS': 1}, 'A': {'A.PHYSICAL': 2, 'A.ADMIN': 2, 'A.TOENEV': 1, 'A.COMM': 2, 'A.COOP': 2, 'A.ROUTE': 2, 'A.TIME': 2, 'A.TOEENV': 1}}, 'vendor': {'Microsoft': {'Microsoft': 4}}, 'eval_facility': {'atsec': {'atsec': 5}}, 'symmetric_crypto': {}, 'asymmetric_crypto': {}, 'pq_crypto': {}, 'hash_function': {}, 'crypto_scheme': {}, 'crypto_protocol': {'TLS': {'SSL': {'SSL': 2}}}, 'randomness': {}, 'cipher_mode': {}, 'ecc_curve': {}, 'crypto_engine': {}, 'tls_cipher_suite': {}, 'crypto_library': {}, 'vulnerability': {}, 'side_channel_analysis': {}, 'technical_report_id': {'BSI': {'BSI 7125': 2, 'BSI 7148': 1, 'BSI 7149': 1}}, 'device_model': {}, 'tee_name': {}, 'os_name': {}, 'cplc_data': {}, 'ic_data_group': {}, 'standard_id': {'BSI': {'AIS 32': 1, 'AIS33': 1}, 'RFC': {'RFC 1777': 2, 'RFC 2251': 1}, 'ISO': {'ISO/IEC 15408:1999': 1}}, 'javacard_version': {}, 'javacard_api_const': {}, 'javacard_packages': {}, 'certification_process': {'ConfidentialDocument': {'Technical Report BSI-DSZ-CC-0283, Version 1.0, 2006-02-23, atsec information security GmbH (confidential document) User Guidance Documentation: [9] IBM Tivoli Directory Server Version 6.0 Administration Guide': 1}}}.
    • The st_keywords property was set to {'cc_cert_id': {}, 'cc_protection_profile_id': {}, 'cc_security_level': {'EAL': {'EAL 4': 9, 'EAL 4 augmented': 3}}, 'cc_sar': {'ACM': {'ACM_AUT.1': 3, 'ACM_CAP.4': 1, 'ACM_SCP.2': 3}, 'ADO': {'ADO_DEL.2': 3, 'ADO_IGS.1': 1}, 'ADV': {'ADV_FSP.2': 3, 'ADV_HLD.2': 1, 'ADV_IMP.1': 3, 'ADV_LLD.1': 1, 'ADV_RCR.1': 3, 'ADV_SPM.1': 1}, 'AGD': {'AGD_ADM.1': 1, 'AGD_USR.1': 3, 'AGD_SPM.1': 2}, 'ALC': {'ALC_FLR.1': 10, 'ALC_DVS.1': 3, 'ALC_LCD.1': 3, 'ALC_TAT.1': 1}, 'ATE': {'ATE_COV.2': 3, 'ATE_DPT.1': 1, 'ATE_FUN.1': 3, 'ATE_IND.2': 1}, 'AVA': {'AVA_MSU.2': 1, 'AVA_SOF.1': 1, 'AVA_VLA.2': 1, 'AVA_MSU.1': 2, 'AVA_VLA.1': 2}}, 'cc_sfr': {'FAU': {'FAU_GEN.1': 16, 'FAU_GEN.2': 11, 'FAU_SAR.1': 12, 'FAU_SAR.2': 10, 'FAU_STG.1': 8, 'FAU_GEN.1.1': 1, 'FAU_GEN.1.2': 1, 'FAU_GEN.2.1': 1, 'FAU_SAR.1.1': 1, 'FAU_SAR.1.2': 1, 'FAU_SAR.2.1': 1, 'FAU_STG.1.1': 1, 'FAU_STG.1.2': 1}, 'FDP': {'FDP_ACC.2': 12, 'FDP_ACF.1': 12, 'FDP_ACC.2.1': 1, 'FDP_ACC.2.2': 1, 'FDP_ACF.1.1': 1, 'FDP_ACF.1.2': 1, 'FDP_ACF.1.3': 1, 'FDP_ACF.1.4': 1, 'FDP_ACC.1': 2, 'FDP_IFC.1': 1}, 'FIA': {'FIA_AFL': 22, 'FIA_ATD.1': 11, 'FIA_SOS': 26, 'FIA_UAU.1': 18, 'FIA_UID.1': 13, 'FIA_AFL.1': 1, 'FIA_SOS.1': 2, 'FIA_AFL.1.1': 2, 'FIA_AFL.1.2': 2, 'FIA_ATD.1.1': 1, 'FIA_SOS.1.1': 2, 'FIA_UAU.1.1': 1, 'FIA_UAU.1.2': 1, 'FIA_UID.1.1': 1, 'FIA_UID.1.2': 1}, 'FMT': {'FMT_MOF': 25, 'FMT_MSA.1': 13, 'FMT_MSA.3': 10, 'FMT_MTD.1': 10, 'FMT_SMF.1': 16, 'FMT_SMR.1': 18, 'FMT_MOF.1': 1, 'FMT_MOF.1.1': 2, 'FMT_MSA.1.1': 1, 'FMT_MSA.3.1': 1, 'FMT_MSA.3.2': 1, 'FMT_MTD.1.1': 1, 'FMT_SMF.1.1': 1, 'FMT_SMR.1.1': 1, 'FMT_SMR.1.2': 1}, 'FPT': {'FPT_RVM.1': 10, 'FPT_STM.1': 16, 'FPT_RVM.1.1': 1, 'FPT_STM.1.1': 1}}, 'cc_claims': {'O': {'O.AUTHENTICATE': 7, 'O.AUTHORIZE': 5, 'O.ACCOUNT': 6, 'O.BYPASS': 4}, 'T': {'T.ENTRY': 3, 'T.ACCESS': 2, 'T.ACCOUNT': 3, 'T.BYPASS': 2}, 'A': {'A.PHYSICAL': 3, 'A.ADMIN': 2, 'A.TOEENV': 3, 'A.COMM': 2, 'A.COOP': 3, 'A.ROUTE': 2, 'A.TIME': 3}, 'OE': {'OE.MANAGE': 9, 'OE.ENVMANAGE': 6, 'OE.PHYSICAL': 8, 'OE.DATABASE': 7, 'OE.SOPHISTICATED': 6, 'OE.BACKUP': 4, 'OE.COMMUNICATION': 8, 'OE.ROUTE': 4, 'OE.TIME': 8}}, 'vendor': {'Microsoft': {'Microsoft': 2}}, 'eval_facility': {}, 'symmetric_crypto': {}, 'asymmetric_crypto': {}, 'pq_crypto': {}, 'hash_function': {}, 'crypto_scheme': {}, 'crypto_protocol': {'TLS': {'SSL': {'SSL': 7}, 'TLS': {'TLS': 9}}}, 'randomness': {}, 'cipher_mode': {}, 'ecc_curve': {}, 'crypto_engine': {}, 'tls_cipher_suite': {}, 'crypto_library': {}, 'vulnerability': {}, 'side_channel_analysis': {}, 'technical_report_id': {}, 'device_model': {}, 'tee_name': {}, 'os_name': {}, 'cplc_data': {}, 'ic_data_group': {}, 'standard_id': {'RFC': {'RFC1274': 1, 'RFC 1274': 1, 'RFC1777': 1, 'RFC 1777': 3, 'RFC1778': 1, 'RFC 1778': 1, 'RFC1779': 1, 'RFC 1779': 1, 'RFC1823': 1, 'RFC 1823': 1, 'RFC2052': 1, 'RFC 2052': 1, 'RFC2219': 1, 'RFC 2219': 1, 'RFC2222': 1, 'RFC 2222': 1, 'RFC2247': 1, 'RFC 2247': 1, 'RFC2251': 1, 'RFC 2251': 2, 'RFC2252': 1, 'RFC 2252': 1, 'RFC2253': 1, 'RFC 2253': 1, 'RFC2254': 1, 'RFC 2254': 1, 'RFC2255': 1, 'RFC 2255': 1, 'RFC2256': 1, 'RFC 2256': 1, 'RFC2596': 1, 'RFC 2596': 1, 'RFC2696': 1, 'RFC 2696': 1, 'RFC2829': 1, 'RFC 2829': 1, 'RFC2830': 1, 'RFC 2830': 1, 'RFC2849': 1, 'RFC 2849': 1, 'RFC2891': 1, 'RFC 2891': 1}, 'CC': {'CCIMB-99-031': 1}}, 'javacard_version': {}, 'javacard_api_const': {}, 'javacard_packages': {}, 'certification_process': {}}.
    • The report_filename property was set to 0283a.pdf.
    • The st_filename property was set to 0283b.pdf.

    The computed heuristics were updated.

    • The cert_lab property was set to ['BSI'].
    • The cert_id property was set to BSI-DSZ-CC-0283-2006.
    • The report_references property was updated, with the {'directly_referenced_by': {'_type': 'Set', 'elements': ['BSI-DSZ-CC-0428-2008', 'BSI-DSZ-CC-0535-2009']}, 'indirectly_referenced_by': {'_type': 'Set', 'elements': ['BSI-DSZ-CC-0428-2008', 'BSI-DSZ-CC-0535-2009']}} data.
    • The extracted_sars property was updated, with the {'_type': 'Set', 'elements': [{'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_LLD', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_INT', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_TAT', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_FUN', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_DVS', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_IMP', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_SPM', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_PPC', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AVA_SOF', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_OBJ', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_TSS', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AGD_SPM', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AGD_ADM', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_HLD', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_FSP', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_DES', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AGD_USR', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AVA_MSU', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AVA_VLA', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_ENV', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_SRE', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_COV', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_REQ', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_RCR', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_DPT', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_LCD', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_IND', 'level': 2}]} values added.
    • The direct_transitive_cves property was set to {'_type': 'Set', 'elements': ['CVE-2012-0726', 'CVE-2015-1974', 'CVE-2011-2758', 'CVE-2012-0740', 'CVE-2015-0138', 'CVE-2015-1959', 'CVE-2015-2019', 'CVE-2015-1975', 'CVE-2012-0743', 'CVE-2012-2203', 'CVE-2015-1978', 'CVE-2015-1972', 'CVE-2011-2759', 'CVE-2011-1206', 'CVE-2008-2943', 'CVE-2015-1977', 'CVE-2015-1976', 'CVE-2012-2191', 'CVE-2010-4217', 'CVE-2011-1820', 'CVE-2014-6100']}.
    • The indirect_transitive_cves property was set to {'_type': 'Set', 'elements': ['CVE-2012-0726', 'CVE-2015-1974', 'CVE-2011-2758', 'CVE-2012-0740', 'CVE-2015-0138', 'CVE-2015-1959', 'CVE-2015-2019', 'CVE-2015-1975', 'CVE-2012-0743', 'CVE-2012-2203', 'CVE-2015-1978', 'CVE-2015-1972', 'CVE-2011-2759', 'CVE-2011-1206', 'CVE-2008-2943', 'CVE-2015-1977', 'CVE-2015-1976', 'CVE-2012-2191', 'CVE-2010-4217', 'CVE-2011-1820', 'CVE-2014-6100']}.
  • 17.08.2024 The certificate data changed.
    Certificate changed

    The report_link was updated.

    • The new value is https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/0283a.pdf.

    The st_link was updated.

    • The new value is https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/0283b.pdf.

    The state of the certificate object was updated.

    • The report property was updated, with the {'download_ok': False, 'convert_ok': False, 'extract_ok': False, 'pdf_hash': None, 'txt_hash': None} data.
    • The st property was updated, with the {'download_ok': False, 'convert_ok': False, 'extract_ok': False, 'pdf_hash': None, 'txt_hash': None} data.

    The PDF extraction data was updated.

    • The report_metadata property was set to None.
    • The st_metadata property was set to None.
    • The report_frontpage property was set to None.
    • The report_keywords property was set to None.
    • The st_keywords property was set to None.
    • The report_filename property was set to None.
    • The st_filename property was set to None.

    The computed heuristics were updated.

    • The cert_lab property was set to None.
    • The cert_id property was set to None.
    • The report_references property was updated, with the {'directly_referenced_by': None, 'indirectly_referenced_by': None} data.
    • The extracted_sars property was updated, with the {'_type': 'Set', 'elements': [{'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_LLD', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_INT', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_TAT', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_FUN', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_DVS', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_IMP', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_SPM', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_PPC', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AVA_SOF', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_OBJ', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AGD_SPM', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AGD_ADM', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_TSS', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_HLD', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_FSP', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_DES', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AGD_USR', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AVA_MSU', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AVA_VLA', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_ENV', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_SRE', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_COV', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_REQ', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_RCR', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_DPT', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_LCD', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_IND', 'level': 2}]} values discarded.
    • The direct_transitive_cves property was set to None.
    • The indirect_transitive_cves property was set to None.
  • 12.08.2024 The certificate data changed.
    Certificate changed

    The computed heuristics were updated.

    • The report_references property was updated, with the {'directly_referenced_by': {'__discard__': {'_type': 'Set', 'elements': ['BSI-DSZ-CC-0535-2009']}}, 'indirectly_referenced_by': {'__discard__': {'_type': 'Set', 'elements': ['BSI-DSZ-CC-0535-2009']}}} data.
    • The direct_transitive_cves property was updated, with the {'_type': 'Set', 'elements': ['CVE-2011-2759', 'CVE-2011-2758', 'CVE-2012-0740']} values discarded.
    • The indirect_transitive_cves property was updated, with the {'_type': 'Set', 'elements': ['CVE-2011-2759', 'CVE-2011-2758', 'CVE-2012-0740']} values discarded.
  • 23.07.2024 The certificate was first processed.
    New certificate

    A new Common Criteria certificate with the product name IBM Tivoli Directory Server Version 6.0 Fix Pack 1, Interim Fix 5 was processed.

Raw data

{
  "_type": "sec_certs.sample.cc.CCCertificate",
  "category": "Key Management Systems",
  "cert_link": null,
  "dgst": "13374c6e26b3a532",
  "heuristics": {
    "_type": "sec_certs.sample.cc.CCCertificate.Heuristics",
    "annotated_references": null,
    "cert_id": "BSI-DSZ-CC-0283-2006",
    "cert_lab": [
      "BSI"
    ],
    "cpe_matches": {
      "_type": "Set",
      "elements": [
        "cpe:2.3:a:ibm:tivoli_directory_server:6.0.0.76:*:*:*:*:*:*:*",
        "cpe:2.3:a:ibm:tivoli_directory_server:6.0.0.8:*:*:*:*:*:*:*",
        "cpe:2.3:a:ibm:tivoli_directory_server:6.0:*:*:*:*:*:*:*",
        "cpe:2.3:a:ibm:tivoli_directory_server:6.0.0.77:*:*:*:*:*:*:*",
        "cpe:2.3:a:ibm:tivoli_directory_server:6.0.0.75:*:*:*:*:*:*:*",
        "cpe:2.3:a:ibm:tivoli_directory_server:6.0.0.71:*:*:*:*:*:*:*",
        "cpe:2.3:a:ibm:tivoli_directory_server:6.0.0.78:*:*:*:*:*:*:*",
        "cpe:2.3:a:ibm:tivoli_directory_server:6.0.0.70:*:*:*:*:*:*:*",
        "cpe:2.3:a:ibm:tivoli_directory_server:6.0.0:*:*:*:*:*:*:*",
        "cpe:2.3:a:ibm:tivoli_directory_server:6.0.0.7:*:*:*:*:*:*:*",
        "cpe:2.3:a:ibm:tivoli_directory_server:6.0.0.74:*:*:*:*:*:*:*",
        "cpe:2.3:a:ibm:tivoli_directory_server:6.0.0.73:*:*:*:*:*:*:*",
        "cpe:2.3:a:ibm:tivoli_directory_server:6.0.0.72:*:*:*:*:*:*:*",
        "cpe:2.3:a:ibm:tivoli_directory_server:6.0.0.69:*:*:*:*:*:*:*"
      ]
    },
    "direct_transitive_cves": {
      "_type": "Set",
      "elements": [
        "CVE-2011-2759",
        "CVE-2012-0726",
        "CVE-2010-4217",
        "CVE-2015-1977",
        "CVE-2012-2191",
        "CVE-2011-2758",
        "CVE-2012-2203",
        "CVE-2015-0138",
        "CVE-2011-1820",
        "CVE-2015-1978",
        "CVE-2012-0740",
        "CVE-2015-1959",
        "CVE-2012-0743",
        "CVE-2011-1206",
        "CVE-2015-1976",
        "CVE-2015-2019",
        "CVE-2014-6100",
        "CVE-2015-1972",
        "CVE-2008-2943",
        "CVE-2015-1974",
        "CVE-2015-1975"
      ]
    },
    "extracted_sars": {
      "_type": "Set",
      "elements": [
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ASE_ENV",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ASE_INT",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ASE_REQ",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ASE_PPC",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "AVA_MSU",
          "level": 2
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ATE_FUN",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ALC_TAT",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "AGD_SPM",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ASE_DES",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ADV_SPM",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "AVA_SOF",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ADV_FSP",
          "level": 2
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ALC_LCD",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ASE_OBJ",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "AVA_VLA",
          "level": 2
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ADV_RCR",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ALC_FLR",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ATE_DPT",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ADV_LLD",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ALC_DVS",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ATE_COV",
          "level": 2
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ASE_TSS",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "AGD_USR",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "AGD_ADM",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ATE_IND",
          "level": 2
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ADV_IMP",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ASE_SRE",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ADV_HLD",
          "level": 2
        }
      ]
    },
    "extracted_versions": {
      "_type": "Set",
      "elements": [
        "6.0"
      ]
    },
    "indirect_transitive_cves": {
      "_type": "Set",
      "elements": [
        "CVE-2011-2759",
        "CVE-2012-0726",
        "CVE-2010-4217",
        "CVE-2015-1977",
        "CVE-2012-2191",
        "CVE-2011-2758",
        "CVE-2012-2203",
        "CVE-2015-0138",
        "CVE-2011-1820",
        "CVE-2015-1978",
        "CVE-2012-0740",
        "CVE-2015-1959",
        "CVE-2012-0743",
        "CVE-2011-1206",
        "CVE-2015-1976",
        "CVE-2015-2019",
        "CVE-2014-6100",
        "CVE-2015-1972",
        "CVE-2008-2943",
        "CVE-2015-1974",
        "CVE-2015-1975"
      ]
    },
    "next_certificates": [],
    "prev_certificates": [],
    "related_cves": {
      "_type": "Set",
      "elements": [
        "CVE-2012-0726",
        "CVE-2010-4217",
        "CVE-2012-2191",
        "CVE-2009-3089",
        "CVE-2010-4788",
        "CVE-2012-2203",
        "CVE-2010-2927",
        "CVE-2006-0717",
        "CVE-2015-0138",
        "CVE-2011-1820",
        "CVE-2015-1978",
        "CVE-2009-5073",
        "CVE-2010-4786",
        "CVE-2010-4787",
        "CVE-2005-3567",
        "CVE-2015-1959",
        "CVE-2012-0743",
        "CVE-2011-1206",
        "CVE-2010-4216",
        "CVE-2015-1976",
        "CVE-2015-2019",
        "CVE-2015-1972",
        "CVE-2009-5072",
        "CVE-2010-4789",
        "CVE-2015-1974",
        "CVE-2015-1975"
      ]
    },
    "report_references": {
      "_type": "sec_certs.sample.certificate.References",
      "directly_referenced_by": {
        "_type": "Set",
        "elements": [
          "BSI-DSZ-CC-0535-2009",
          "BSI-DSZ-CC-0428-2008"
        ]
      },
      "directly_referencing": null,
      "indirectly_referenced_by": {
        "_type": "Set",
        "elements": [
          "BSI-DSZ-CC-0535-2009",
          "BSI-DSZ-CC-0428-2008"
        ]
      },
      "indirectly_referencing": null
    },
    "scheme_data": null,
    "st_references": {
      "_type": "sec_certs.sample.certificate.References",
      "directly_referenced_by": null,
      "directly_referencing": null,
      "indirectly_referenced_by": null,
      "indirectly_referencing": null
    },
    "verified_cpe_matches": null
  },
  "maintenance_updates": {
    "_type": "Set",
    "elements": []
  },
  "manufacturer": "IBM Corporation",
  "manufacturer_web": "https://www.ibm.com",
  "name": "IBM Tivoli Directory Server Version 6.0 Fix Pack 1, Interim Fix 5",
  "not_valid_after": "2019-09-01",
  "not_valid_before": "2006-03-02",
  "pdf_data": {
    "_type": "sec_certs.sample.cc.CCCertificate.PdfData",
    "cert_filename": null,
    "cert_frontpage": null,
    "cert_keywords": null,
    "cert_metadata": null,
    "report_filename": "0283a.pdf",
    "report_frontpage": {
      "DE": {
        "cert_id": "BSI-DSZ-CC-0283-2006",
        "cert_item": "IBM Tivoli Directory Server Version 6.0 Fix Pack 1, Interim Fix 5",
        "cert_lab": "BSI",
        "developer": "IBM Corporation",
        "match_rules": [
          "(BSI-DSZ-CC-.+?) (?:for|For) (.+?) from (.*)"
        ]
      }
    },
    "report_keywords": {
      "asymmetric_crypto": {},
      "cc_cert_id": {
        "DE": {
          "BSI-DSZ-CC-0235-2004": 5,
          "BSI-DSZ-CC-0283": 2,
          "BSI-DSZ-CC-0283-2006": 30
        }
      },
      "cc_claims": {
        "A": {
          "A.ADMIN": 2,
          "A.COMM": 2,
          "A.COOP": 2,
          "A.PHYSICAL": 2,
          "A.ROUTE": 2,
          "A.TIME": 2,
          "A.TOEENV": 1,
          "A.TOENEV": 1
        },
        "T": {
          "T.ACCESS": 2,
          "T.ACCOUNT": 1,
          "T.BYPASS": 1,
          "T.ENTRY": 1
        }
      },
      "cc_protection_profile_id": {},
      "cc_sar": {
        "ACM": {
          "ACM_AUT": 2,
          "ACM_AUT.1": 1,
          "ACM_CAP": 2,
          "ACM_CAP.4": 1,
          "ACM_SCP": 2,
          "ACM_SCP.1": 1
        },
        "ADO": {
          "ADO_DEL": 2,
          "ADO_DEL.2": 1,
          "ADO_IGS": 2,
          "ADO_IGS.1": 1
        },
        "ADV": {
          "ADV_FSP": 2,
          "ADV_FSP.2": 1,
          "ADV_HLD": 2,
          "ADV_HLD.2": 1,
          "ADV_IMP": 2,
          "ADV_IMP.1": 1,
          "ADV_INT": 2,
          "ADV_LLD": 2,
          "ADV_LLD.1": 1,
          "ADV_RCR": 2,
          "ADV_RCR.1": 1,
          "ADV_SPM": 2,
          "ADV_SPM.1": 1
        },
        "AGD": {
          "AGD_ADM": 2,
          "AGD_ADM.1": 1,
          "AGD_USR": 2,
          "AGD_USR.1": 1
        },
        "ALC": {
          "ALC_DVS": 2,
          "ALC_DVS.1": 1,
          "ALC_FLR": 2,
          "ALC_FLR.1": 6,
          "ALC_LCD": 1,
          "ALC_TAT": 2,
          "ALC_TAT.1": 1
        },
        "ASE": {
          "ASE_DES.1": 1,
          "ASE_ENV.1": 1,
          "ASE_INT.1": 1,
          "ASE_OBJ.1": 1,
          "ASE_PPC.1": 1,
          "ASE_REQ.1": 1,
          "ASE_SRE.1": 1,
          "ASE_TSS.1": 1
        },
        "ATE": {
          "ATE_COV": 2,
          "ATE_COV.2": 1,
          "ATE_DPT": 2,
          "ATE_DPT.1": 1,
          "ATE_FUN": 2,
          "ATE_FUN.1": 1,
          "ATE_IND": 2,
          "ATE_IND.2": 1
        },
        "AVA": {
          "AVA_CCA": 2,
          "AVA_MSU": 2,
          "AVA_MSU.1": 1,
          "AVA_SOF": 4,
          "AVA_SOF.1": 1,
          "AVA_VLA": 4,
          "AVA_VLA.2": 2,
          "AVA_VLA.3": 1,
          "AVA_VLA.4": 1
        }
      },
      "cc_security_level": {
        "EAL": {
          "EAL 1": 1,
          "EAL 4": 1,
          "EAL 7": 1,
          "EAL1": 5,
          "EAL2": 3,
          "EAL3": 4,
          "EAL4": 10,
          "EAL4 augmented": 3,
          "EAL4+": 1,
          "EAL5": 6,
          "EAL6": 3,
          "EAL7": 4
        }
      },
      "cc_sfr": {
        "FAU": {
          "FAU_GEN.1": 1,
          "FAU_GEN.2": 1,
          "FAU_SAR.1": 1,
          "FAU_SAR.2": 1,
          "FAU_STG.1": 1
        },
        "FDP": {
          "FDP_ACC.2": 2,
          "FDP_ACF.1": 2
        },
        "FIA": {
          "FIA_AFL": 2,
          "FIA_ATD.1": 1,
          "FIA_SOS": 2,
          "FIA_SOS.1": 1,
          "FIA_UAU.1": 1,
          "FIA_UID.1": 1
        },
        "FMT": {
          "FMT_MOF": 2,
          "FMT_MSA.1": 1,
          "FMT_MSA.3": 1,
          "FMT_MTD.1": 1,
          "FMT_SMF.1": 1,
          "FMT_SMR.1": 1
        },
        "FPT": {
          "FPT_RVM.1": 1,
          "FPT_STM.1": 1
        }
      },
      "certification_process": {
        "ConfidentialDocument": {
          "Technical Report BSI-DSZ-CC-0283, Version 1.0, 2006-02-23, atsec information security GmbH (confidential document) User Guidance Documentation: [9] IBM Tivoli Directory Server Version 6.0 Administration Guide": 1
        }
      },
      "cipher_mode": {},
      "cplc_data": {},
      "crypto_engine": {},
      "crypto_library": {},
      "crypto_protocol": {
        "TLS": {
          "SSL": {
            "SSL": 2
          }
        }
      },
      "crypto_scheme": {},
      "device_model": {},
      "ecc_curve": {},
      "eval_facility": {
        "atsec": {
          "atsec": 5
        }
      },
      "hash_function": {},
      "ic_data_group": {},
      "javacard_api_const": {},
      "javacard_packages": {},
      "javacard_version": {},
      "os_name": {},
      "pq_crypto": {},
      "randomness": {},
      "side_channel_analysis": {},
      "standard_id": {
        "BSI": {
          "AIS 32": 1,
          "AIS33": 1
        },
        "ISO": {
          "ISO/IEC 15408:1999": 1
        },
        "RFC": {
          "RFC 1777": 2,
          "RFC 2251": 1
        }
      },
      "symmetric_crypto": {},
      "technical_report_id": {
        "BSI": {
          "BSI 7125": 2,
          "BSI 7148": 1,
          "BSI 7149": 1
        }
      },
      "tee_name": {},
      "tls_cipher_suite": {},
      "vendor": {
        "Microsoft": {
          "Microsoft": 4
        }
      },
      "vulnerability": {}
    },
    "report_metadata": {
      "/Author": "BSI",
      "/Company": "BSI, Postfach 200363, 53133 Bonn",
      "/CreationDate": "D:20060321102231+01\u002700\u0027",
      "/Creator": "Acrobat PDFMaker 7.0.5 f\u00fcr Word",
      "/Keywords": "CC, Common Criteria, BSI-DSZ-CC-0283-2006, IBM Tivoli Directory Server Version 6.0, IBM,",
      "/ModDate": "D:20060323072639+01\u002700\u0027",
      "/Producer": "Acrobat Distiller 7.0.5 (Windows)",
      "/SourceModified": "D:20060316063228",
      "/Subject": "Certification Report",
      "/Title": "Certification Report BSI-DSZ-CC-0283-2006 ",
      "pdf_file_size_bytes": 1075575,
      "pdf_hyperlinks": {
        "_type": "Set",
        "elements": []
      },
      "pdf_is_encrypted": false,
      "pdf_number_of_pages": 50
    },
    "st_filename": "0283b.pdf",
    "st_frontpage": null,
    "st_keywords": {
      "asymmetric_crypto": {},
      "cc_cert_id": {},
      "cc_claims": {
        "A": {
          "A.ADMIN": 2,
          "A.COMM": 2,
          "A.COOP": 3,
          "A.PHYSICAL": 3,
          "A.ROUTE": 2,
          "A.TIME": 3,
          "A.TOEENV": 3
        },
        "O": {
          "O.ACCOUNT": 6,
          "O.AUTHENTICATE": 7,
          "O.AUTHORIZE": 5,
          "O.BYPASS": 4
        },
        "OE": {
          "OE.BACKUP": 4,
          "OE.COMMUNICATION": 8,
          "OE.DATABASE": 7,
          "OE.ENVMANAGE": 6,
          "OE.MANAGE": 9,
          "OE.PHYSICAL": 8,
          "OE.ROUTE": 4,
          "OE.SOPHISTICATED": 6,
          "OE.TIME": 8
        },
        "T": {
          "T.ACCESS": 2,
          "T.ACCOUNT": 3,
          "T.BYPASS": 2,
          "T.ENTRY": 3
        }
      },
      "cc_protection_profile_id": {},
      "cc_sar": {
        "ACM": {
          "ACM_AUT.1": 3,
          "ACM_CAP.4": 1,
          "ACM_SCP.2": 3
        },
        "ADO": {
          "ADO_DEL.2": 3,
          "ADO_IGS.1": 1
        },
        "ADV": {
          "ADV_FSP.2": 3,
          "ADV_HLD.2": 1,
          "ADV_IMP.1": 3,
          "ADV_LLD.1": 1,
          "ADV_RCR.1": 3,
          "ADV_SPM.1": 1
        },
        "AGD": {
          "AGD_ADM.1": 1,
          "AGD_SPM.1": 2,
          "AGD_USR.1": 3
        },
        "ALC": {
          "ALC_DVS.1": 3,
          "ALC_FLR.1": 10,
          "ALC_LCD.1": 3,
          "ALC_TAT.1": 1
        },
        "ATE": {
          "ATE_COV.2": 3,
          "ATE_DPT.1": 1,
          "ATE_FUN.1": 3,
          "ATE_IND.2": 1
        },
        "AVA": {
          "AVA_MSU.1": 2,
          "AVA_MSU.2": 1,
          "AVA_SOF.1": 1,
          "AVA_VLA.1": 2,
          "AVA_VLA.2": 1
        }
      },
      "cc_security_level": {
        "EAL": {
          "EAL 4": 9,
          "EAL 4 augmented": 3
        }
      },
      "cc_sfr": {
        "FAU": {
          "FAU_GEN.1": 16,
          "FAU_GEN.1.1": 1,
          "FAU_GEN.1.2": 1,
          "FAU_GEN.2": 11,
          "FAU_GEN.2.1": 1,
          "FAU_SAR.1": 12,
          "FAU_SAR.1.1": 1,
          "FAU_SAR.1.2": 1,
          "FAU_SAR.2": 10,
          "FAU_SAR.2.1": 1,
          "FAU_STG.1": 8,
          "FAU_STG.1.1": 1,
          "FAU_STG.1.2": 1
        },
        "FDP": {
          "FDP_ACC.1": 2,
          "FDP_ACC.2": 12,
          "FDP_ACC.2.1": 1,
          "FDP_ACC.2.2": 1,
          "FDP_ACF.1": 12,
          "FDP_ACF.1.1": 1,
          "FDP_ACF.1.2": 1,
          "FDP_ACF.1.3": 1,
          "FDP_ACF.1.4": 1,
          "FDP_IFC.1": 1
        },
        "FIA": {
          "FIA_AFL": 22,
          "FIA_AFL.1": 1,
          "FIA_AFL.1.1": 2,
          "FIA_AFL.1.2": 2,
          "FIA_ATD.1": 11,
          "FIA_ATD.1.1": 1,
          "FIA_SOS": 26,
          "FIA_SOS.1": 2,
          "FIA_SOS.1.1": 2,
          "FIA_UAU.1": 18,
          "FIA_UAU.1.1": 1,
          "FIA_UAU.1.2": 1,
          "FIA_UID.1": 13,
          "FIA_UID.1.1": 1,
          "FIA_UID.1.2": 1
        },
        "FMT": {
          "FMT_MOF": 25,
          "FMT_MOF.1": 1,
          "FMT_MOF.1.1": 2,
          "FMT_MSA.1": 13,
          "FMT_MSA.1.1": 1,
          "FMT_MSA.3": 10,
          "FMT_MSA.3.1": 1,
          "FMT_MSA.3.2": 1,
          "FMT_MTD.1": 10,
          "FMT_MTD.1.1": 1,
          "FMT_SMF.1": 16,
          "FMT_SMF.1.1": 1,
          "FMT_SMR.1": 18,
          "FMT_SMR.1.1": 1,
          "FMT_SMR.1.2": 1
        },
        "FPT": {
          "FPT_RVM.1": 10,
          "FPT_RVM.1.1": 1,
          "FPT_STM.1": 16,
          "FPT_STM.1.1": 1
        }
      },
      "certification_process": {},
      "cipher_mode": {},
      "cplc_data": {},
      "crypto_engine": {},
      "crypto_library": {},
      "crypto_protocol": {
        "TLS": {
          "SSL": {
            "SSL": 7
          },
          "TLS": {
            "TLS": 9
          }
        }
      },
      "crypto_scheme": {},
      "device_model": {},
      "ecc_curve": {},
      "eval_facility": {},
      "hash_function": {},
      "ic_data_group": {},
      "javacard_api_const": {},
      "javacard_packages": {},
      "javacard_version": {},
      "os_name": {},
      "pq_crypto": {},
      "randomness": {},
      "side_channel_analysis": {},
      "standard_id": {
        "CC": {
          "CCIMB-99-031": 1
        },
        "RFC": {
          "RFC 1274": 1,
          "RFC 1777": 3,
          "RFC 1778": 1,
          "RFC 1779": 1,
          "RFC 1823": 1,
          "RFC 2052": 1,
          "RFC 2219": 1,
          "RFC 2222": 1,
          "RFC 2247": 1,
          "RFC 2251": 2,
          "RFC 2252": 1,
          "RFC 2253": 1,
          "RFC 2254": 1,
          "RFC 2255": 1,
          "RFC 2256": 1,
          "RFC 2596": 1,
          "RFC 2696": 1,
          "RFC 2829": 1,
          "RFC 2830": 1,
          "RFC 2849": 1,
          "RFC 2891": 1,
          "RFC1274": 1,
          "RFC1777": 1,
          "RFC1778": 1,
          "RFC1779": 1,
          "RFC1823": 1,
          "RFC2052": 1,
          "RFC2219": 1,
          "RFC2222": 1,
          "RFC2247": 1,
          "RFC2251": 1,
          "RFC2252": 1,
          "RFC2253": 1,
          "RFC2254": 1,
          "RFC2255": 1,
          "RFC2256": 1,
          "RFC2596": 1,
          "RFC2696": 1,
          "RFC2829": 1,
          "RFC2830": 1,
          "RFC2849": 1,
          "RFC2891": 1
        }
      },
      "symmetric_crypto": {},
      "technical_report_id": {},
      "tee_name": {},
      "tls_cipher_suite": {},
      "vendor": {
        "Microsoft": {
          "Microsoft": 2
        }
      },
      "vulnerability": {}
    },
    "st_metadata": {
      "/Author": "Michael",
      "/CreationDate": "D:20051018110312+02\u002700\u0027",
      "/Creator": "PScript5.dll Version 5.2.2",
      "/ModDate": "D:20051018110312+02\u002700\u0027",
      "/Producer": "Acrobat Distiller 5.0.5 (Windows)",
      "/Title": "Microsoft Word - [ST] Security Target ITDS 6.0 V1.7.1.doc",
      "pdf_file_size_bytes": 508237,
      "pdf_hyperlinks": {
        "_type": "Set",
        "elements": []
      },
      "pdf_is_encrypted": false,
      "pdf_number_of_pages": 63
    }
  },
  "protection_profiles": {
    "_type": "Set",
    "elements": []
  },
  "report_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/0283a.pdf",
  "scheme": "DE",
  "security_level": {
    "_type": "Set",
    "elements": [
      "EAL4+",
      "ALC_FLR.1"
    ]
  },
  "st_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/0283b.pdf",
  "state": {
    "_type": "sec_certs.sample.cc.CCCertificate.InternalState",
    "cert": {
      "_type": "sec_certs.sample.cc.CCCertificate.DocumentState",
      "convert_garbage": false,
      "convert_ok": false,
      "download_ok": false,
      "extract_ok": false,
      "pdf_hash": null,
      "txt_hash": null
    },
    "report": {
      "_type": "sec_certs.sample.cc.CCCertificate.DocumentState",
      "convert_garbage": false,
      "convert_ok": true,
      "download_ok": true,
      "extract_ok": true,
      "pdf_hash": "93468cab4080ab54b12d7a317b09f0397213ca50690c8b949316e15be37d01e9",
      "txt_hash": "fd0c8bd6ee0689d7e54be7480dedf3b8958060bc6aa428c4f14e0c63cffdf575"
    },
    "st": {
      "_type": "sec_certs.sample.cc.CCCertificate.DocumentState",
      "convert_garbage": false,
      "convert_ok": true,
      "download_ok": true,
      "extract_ok": true,
      "pdf_hash": "cca9b7bf4988d097b1ff58926742c49c795299ad3d180351d31519459bf15e66",
      "txt_hash": "ef92a79539ecd93178d867fe2f7692d1623b75e9083fe2a98d0ef19f61c5ff49"
    }
  },
  "status": "archived"
}