IDnomic ID CA Version 1.3.7

CSV information ?

Status active
Valid from 12.05.2021
Valid until 12.05.2026
Scheme 🇫🇷 FR
Manufacturer IDNOMIC
Category Key Management Systems
Security level EAL4+, ALC_FLR.3

Heuristics summary ?

Certificate ID: ANSSI-CC-2021/17

Certificate ?

Extracted keywords

Security level
EAL 4, EAL2, EAL4
Security Assurance Requirements (SAR)
ALC_FLR.3
Certificates
ANSSI-CC-2021/17
Evaluation facilities
OPPIDA

File metadata

Creation date D:20210519154758+02'00'
Modification date D:20210519154758+02'00'
Pages 2
Creator PScript5.dll Version 5.2.2
Producer Acrobat Distiller 11.0 (Windows)

Certification report ?

Extracted keywords

Symmetric Algorithms
DES

Security level
EAL 4, EAL2, EAL4, EAL 1, EAL 3, EAL 5, EAL 7, ITSEC E3 Elémentaire
Security Assurance Requirements (SAR)
ADV_ARC, ADV_FSP, ADV_IMP, ADV_INT, ADV_SPM, ADV_TDS, AGD_OPE, AGD_PRE, ALC_FLR.3, ALC_FLR, ALC_CMC, ALC_CMS, ALC_DEL, ALC_DVS, ALC_LCD, ALC_TAT, ATE_COV, ATE_DPT, ATE_FUN, ATE_IND, AVA_VAN.3, AVA_VAN, ASE_CCL, ASE_ECD, ASE_INT, ASE_OBJ, ASE_REQ, ASE_SPD, ASE_TSS
Certificates
ANSSI-CC-2021/17
Evaluation facilities
CESTI, OPPIDA

Standards
CCMB-2017-04-001, CCMB-2017-04-002, CCMB-2017-04-003, CCMB-2017-04-004

File metadata

Creation date D:20210519154641+02'00'
Modification date D:20210519154641+02'00'
Pages 14
Creator PScript5.dll Version 5.2.2
Producer Acrobat Distiller 11.0 (Windows)

Security target ?

Extracted keywords

Asymmetric Algorithms
ECDSA
Protocols
SSH, TLS, IPsec

Security level
EAL4, EAL4 augmented
Claims
T.PRIVILEGED_USER_ERROR, T.UNDETECTED_ACTIONS, T.UNAUTHORIZED_ACCESS, T.TSF_FAILURE, T.UNAUTHORIZED_UPDATE, T.USER_DATA_REUSE, T.UNAUTHENTICATED_TRANSACTIONS, T.WEAK_CRYPTO, A.NO_GENERAL_PURPOSE, A.PHYSICAL, A.TRUSTED_ADMIN, A.BACK_UP, A.COMSEC, A.NTP, A.OPERATING_SYSTEM, A.HSM, A.RPM_SIGNATURE, OT.RECOVERY, OT.INTEGRITY_PROTECTION, OT.TOE_ADMINISTRATION, OT.AUDIT_PROTECTION, OT.AUDIT_LOSS_RESPONSE, OT.SYSTEM_MONITORING, OT.VERIFIABLE_UPDATES, OT.RESIDUAL_INFORMATION_CLEARING, OT.KEY_ESCROW, OT.CERTIFICATES, OT.NON_REPUDIATION, OT.CONFIGURATION_MANAGEMENT, OE.NO_GENERAL_PURPOSE, OE.PHYSICAL, OE.TRUSTED_ADMIN, OE.BACKUP, OE.COMSEC, OE.NTP, OE.OPERATING_SYSTEM, OE.HSM, OE.RPM_SIGNATURE
Security Assurance Requirements (SAR)
ADV_ARC.1, ADV_IMP.1, ADV_TDS.1, ADV_TDS.3, ADV_FSP.4, ADV_FSP.1, ADV_FSP.2, ADV_TDS.2, AGD_OPE.1, AGD_PRE.1, ALC_FLR.3, ALC_CMC.4, ALC_DEL.1, ALC_TAT.1, ALC_DVS.1, ALC_LCD.1, ATE_COV.2, ATE_DPT.1, ATE_IND.2, ATE_FUN.1, ATE_COV.1, AVA_VAN.4, AVA_VAN.3, ASE_CCL.1, ASE_INT.1, ASE_REQ.2, ASE_TSS.1, ASE_ECD.1, ASE_REQ.1, ASE_OBJ.2, ASE_SPD.1
Security Functional Requirements (SFR)
FAU_STG_EXT, FAU_STG.4, FAU_STG.3, FAU_GEN.1, FAU_GEN.2, FAU_SAR.1, FAU_SAR.3, FAU_SEL.1, FAU_STG.1, FAU_GEN.1.1, FAU_GEN.1.2, FAU_GEN.2.1, FAU_SAR.1.1, FAU_SAR.1.2, FAU_SAR.3.1, FAU_SEL.1.1, FAU_STG.1.1, FAU_STG.1.2, FAU_STG.3.1, FAU_GEN, FCO_NRO_EXT, FCO_NRR_EXT, FCO_NRO_EXT.2, FCO_NRR_EXT.2, FCO_NRO_EXT.2.1, FCO_NRO_EXT.2.3, FCO_NRO_EXT.2.4, FCO_NRO_EXT.2.5, FCO_NRR_EXT.2.1, FCO_NRO_EXT.2.2, FCS_CKM.4, FCS_CKM.1, FCS_COP.1, FCS_CKM.5, FCS_CKM_EXT, FCS_STG_EXT, FCS_CKM_EXT.1, FCS_CKM_EXT.2, FCS_STG_EXT.1, FCS_CKM.1.1, FCS_CKM_EXT.1.1, FCS_CKM_EXT.2.1, FCS_CKM.4.1, FCS_COP.1.1, FCS_STG_EXT.1.1, FCS_CKM.2, FCS_CKM, FDP_CER_EXT, FDP_CSI_EXT, FDP_CRL_EXT, FDP_STG_EXT, FDP_CER_EXT.1, FDP_CER_EXT.2, FDP_CER_EXT.3, FDP_CSI_EXT.1, FDP_CRL_EXT.1, FDP_STG_EXT.1, FDP_RIP.2, FDP_CER_EXT.1.1, FDP_CER_EXT.1.2, FDP_CER_EXT.1.3, FDP_CER_EXT.2.1, FDP_CER_EXT.3.1, FDP_CSI_EXT.1.1, FDP_CSI_EXT.1.2, FDP_CRL_EXT.1.1, FDP_STG_EXT.1.1, FDP_RIP.2.1, FDP_ITC.1, FDP_ITC.2, FIA_UAU.2, FIA_UID.2, FIA_UAU.2.1, FIA_UID.2.1, FIA_CMC_EXT.1, FIA_EST_EXT.1, FIA_UID.1, FMT_MOF.1, FMT_MTD.1, FMT_SMF.1, FMT_SMR.2, FMT_SMF, FMT_SMF.1.1, FMT_SMR, FMT_SMR.2.1, FMT_SMR.2.2, FMT_SMR.2.3, FMT_MOF.1.1, FMT_MTD, FMT_MTD.1.1, FMT_SMR.1, FPT_TST.2, FPT_STM.1, FPT_TUD_EXT.1, FPT_FLS.1, FPT_SKP_EXT, FPT_TUD_EXT, FPT_SKP_EXT.1, FPT_SKP_EXT.1.1, FPT_TUD_EXT.1.1, FPT_TUD_EXT.1.2, FPT_TUD_EXT.1.3, FTA_TAB.1, FTA_SSL.3, FTA_SSL.4, FTA_SSL.4.1, FTP_ITC.1, FTP_TRP.1, FTP_TUD_EXT.1
Evaluation facilities
OPPIDA

Standards
PKCS#11, RFC 5280, RFC 5652, RFC 6960, X.509

File metadata

Title Common Criteria Security Target
Subject IDnomic ID CA
Author IDnomic
Creation date D:20210423093956+02'00'
Modification date D:20210423094159+02'00'
Pages 58
Creator Acrobat PDFMaker 17 pour Word
Producer Adobe PDF Library 17.11.238

Heuristics ?

Certificate ID: ANSSI-CC-2021/17

Extracted SARs

ADV_FSP.4, ADV_IMP.1, ATE_FUN.1, AGD_OPE.1, ASE_SPD.1, AGD_PRE.1, ATE_IND.2, ALC_DVS.1, ASE_CCL.1, ATE_COV.2, ADV_ARC.1, ATE_DPT.1, ADV_TDS.3, ASE_ECD.1, ALC_LCD.1, ALC_DEL.1, ASE_OBJ.2, AVA_VAN.4, ALC_FLR.3, ALC_TAT.1, ASE_INT.1, ALC_CMC.4, ASE_REQ.2, ASE_TSS.1

Scheme data ?

Product IDnomic ID CA Version 1.3.7
Url https://cyber.gouv.fr/produits-certifies/idnomic-id-ca-version-137
Description Le produit évalué est « IDnomic ID CA, Version 1.3.7 » développé par IDNOMIC, marque commerciale de KEYNECTIS SA. Ce produit est une autorité de certification (AC) et intervient en tant que composant principal dans une infrastructure de gestion de clés (IGC). La TOE consiste en des programmes, formats de données, procédures, protocoles de communications, politiques de sécurité et mécanismes de cr
Sponsor IDNOMIC
Developer IDNOMIC
Cert Id 2021/17
Level EAL4+
Expiration Date 12 Mai 2026
Enhanced
Cert Id 2021/17
Certification Date 12/05/2021
Expiration Date 12/05/2026
Category Produits pour ordinateur personnel et serveur
Cc Version Critères Communs version 3.1r5
Developer IDNOMIC
Sponsor IDNOMIC
Evaluation Facility OPPIDA
Level EAL4+
Protection Profile
Mutual Recognition SOG-IS CCRA
Augmented ALC_FLR.3
Cert Link https://cyber.gouv.fr/sites/default/files/2021/05/certificat_2021_17fr.pdf
Target Link https://cyber.gouv.fr/sites/default/files/2021/05/anssi-cible-2021-17en.pdf
Report Link https://cyber.gouv.fr/sites/default/files/2021/05/anssi-cc-2021_17fr.pdf

References ?

No references are available for this certificate.

Updates ?

  • 14.10.2024 The certificate data changed.
    Certificate changed

    The computed heuristics were updated.

    • The scheme_data property was set to {'product': 'IDnomic ID CA Version 1.3.7', 'url': 'https://cyber.gouv.fr/produits-certifies/idnomic-id-ca-version-137', 'description': 'Le produit évalué est « IDnomic ID CA, Version 1.3.7 » développé par IDNOMIC, marque commerciale de KEYNECTIS SA.\nCe produit est une autorité de certification (AC) et intervient en tant que composant principal dans une infrastructure de gestion de clés (IGC). La TOE consiste en des programmes, formats de données, procédures, protocoles de communications, politiques de sécurité et mécanismes de cr', 'sponsor': 'IDNOMIC', 'developer': 'IDNOMIC', 'cert_id': '2021/17', 'level': 'EAL4+', 'expiration_date': '12 Mai 2026', 'enhanced': {'cert_id': '2021/17', 'certification_date': '12/05/2021', 'expiration_date': '12/05/2026', 'category': 'Produits pour ordinateur personnel et serveur', 'cc_version': 'Critères Communs version 3.1r5', 'developer': 'IDNOMIC', 'sponsor': 'IDNOMIC', 'evaluation_facility': 'OPPIDA', 'level': 'EAL4+', 'protection_profile': '', 'mutual_recognition': 'SOG-IS\n CCRA', 'augmented': 'ALC_FLR.3', 'cert_link': 'https://cyber.gouv.fr/sites/default/files/2021/05/certificat_2021_17fr.pdf', 'target_link': 'https://cyber.gouv.fr/sites/default/files/2021/05/anssi-cible-2021-17en.pdf', 'report_link': 'https://cyber.gouv.fr/sites/default/files/2021/05/anssi-cc-2021_17fr.pdf'}}.
  • 02.09.2024 The certificate data changed.
    Certificate changed

    The computed heuristics were updated.

    • The scheme_data property was set to None.
  • 22.08.2024 The certificate data changed.
    Certificate changed

    The state of the certificate object was updated.

    • The st property was updated, with the {'download_ok': True, 'convert_ok': True, 'extract_ok': True, 'pdf_hash': 'c0bf5b4f90559db4c7e2814af6a7605c75c960374a482392d4f869c8e6037731', 'txt_hash': '1d3ffe8d0a26c11cb213f8c2fa3b3076473ea3399d6b2269f8ff527fa90b852d'} data.
    • The cert property was updated, with the {'download_ok': True, 'convert_ok': True, 'extract_ok': True, 'pdf_hash': '7cecd3c179e0da323c7ee414394afd9b9dc77305aa752523a10346c42d1d8d13', 'txt_hash': '0d62468afedc2a985a83d3a66a345bf2cb5601a215db1c7fc8dcdaf048545d5c'} data.

    The PDF extraction data was updated.

    • The st_metadata property was set to {'pdf_file_size_bytes': 1023987, 'pdf_is_encrypted': False, 'pdf_number_of_pages': 58, '/Author': 'IDnomic', '/Category': '[Mettre à jour la propriété "Catégorie" du document pour insérer ici le numéro de chrono/ref du document]', '/Company': 'Microsoft', '/CreationDate': "D:20210423093956+02'00'", '/Creator': 'Acrobat PDFMaker 17 pour Word', '/MSIP_Label_e463cba9-5f6c-478d-9329-7b2295e4e8ed_ActionId': '09aba970-b117-4f0a-bebd-4540198027e9', '/MSIP_Label_e463cba9-5f6c-478d-9329-7b2295e4e8ed_ContentBits': '0', '/MSIP_Label_e463cba9-5f6c-478d-9329-7b2295e4e8ed_Enabled': 'true', '/MSIP_Label_e463cba9-5f6c-478d-9329-7b2295e4e8ed_Method': 'Standard', '/MSIP_Label_e463cba9-5f6c-478d-9329-7b2295e4e8ed_Name': 'All Employees_2', '/MSIP_Label_e463cba9-5f6c-478d-9329-7b2295e4e8ed_SetDate': '2021-01-08T16:57:10Z', '/MSIP_Label_e463cba9-5f6c-478d-9329-7b2295e4e8ed_SiteId': '33440fc6-b7c7-412c-bb73-0e70b0198d5a', '/ModDate': "D:20210423094159+02'00'", '/Producer': 'Adobe PDF Library 17.11.238', '/SourceModified': '', '/Subject': 'IDnomic ID CA', '/Title': 'Common Criteria Security Target', 'pdf_hyperlinks': {'_type': 'Set', 'elements': []}}.
    • The cert_metadata property was set to {'pdf_file_size_bytes': 279186, 'pdf_is_encrypted': False, 'pdf_number_of_pages': 2, '/Author': '', '/CreationDate': "D:20210519154758+02'00'", '/Creator': 'PScript5.dll Version 5.2.2', '/ModDate': "D:20210519154758+02'00'", '/Producer': 'Acrobat Distiller 11.0 (Windows)', '/Title': '', 'pdf_hyperlinks': {'_type': 'Set', 'elements': []}}.
    • The st_keywords property was set to {'cc_cert_id': {}, 'cc_protection_profile_id': {}, 'cc_security_level': {'EAL': {'EAL4': 2, 'EAL4 augmented': 2}}, 'cc_sar': {'ADV': {'ADV_ARC.1': 6, 'ADV_IMP.1': 5, 'ADV_TDS.1': 2, 'ADV_TDS.3': 6, 'ADV_FSP.4': 6, 'ADV_FSP.1': 2, 'ADV_FSP.2': 2, 'ADV_TDS.2': 1}, 'AGD': {'AGD_OPE.1': 6, 'AGD_PRE.1': 5}, 'ALC': {'ALC_FLR.3': 4, 'ALC_CMC.4': 2, 'ALC_DEL.1': 2, 'ALC_TAT.1': 4, 'ALC_DVS.1': 3, 'ALC_LCD.1': 3}, 'ATE': {'ATE_COV.2': 3, 'ATE_DPT.1': 3, 'ATE_IND.2': 2, 'ATE_FUN.1': 6, 'ATE_COV.1': 2}, 'AVA': {'AVA_VAN.4': 2, 'AVA_VAN.3': 2}, 'ASE': {'ASE_CCL.1': 2, 'ASE_INT.1': 3, 'ASE_REQ.2': 3, 'ASE_TSS.1': 2, 'ASE_ECD.1': 4, 'ASE_REQ.1': 2, 'ASE_OBJ.2': 2, 'ASE_SPD.1': 1}}, 'cc_sfr': {'FAU': {'FAU_STG_EXT': 1, 'FAU_STG.4': 1, 'FAU_STG.3': 6, 'FAU_GEN.1': 12, 'FAU_GEN.2': 6, 'FAU_SAR.1': 7, 'FAU_SAR.3': 5, 'FAU_SEL.1': 6, 'FAU_STG.1': 7, 'FAU_GEN.1.1': 1, 'FAU_GEN.1.2': 1, 'FAU_GEN.2.1': 1, 'FAU_SAR.1.1': 1, 'FAU_SAR.1.2': 1, 'FAU_SAR.3.1': 1, 'FAU_SEL.1.1': 1, 'FAU_STG.1.1': 1, 'FAU_STG.1.2': 1, 'FAU_STG.3.1': 1, 'FAU_GEN': 6}, 'FCO': {'FCO_NRO_EXT': 3, 'FCO_NRR_EXT': 3, 'FCO_NRO_EXT.2': 13, 'FCO_NRR_EXT.2': 12, 'FCO_NRO_EXT.2.1': 2, 'FCO_NRO_EXT.2.3': 2, 'FCO_NRO_EXT.2.4': 2, 'FCO_NRO_EXT.2.5': 2, 'FCO_NRR_EXT.2.1': 2, 'FCO_NRO_EXT.2.2': 1}, 'FCS': {'FCS_CKM.4': 16, 'FCS_CKM.1': 15, 'FCS_COP.1': 44, 'FCS_CKM.5': 1, 'FCS_CKM_EXT': 4, 'FCS_STG_EXT': 3, 'FCS_CKM_EXT.1': 12, 'FCS_CKM_EXT.2': 12, 'FCS_STG_EXT.1': 13, 'FCS_CKM.1.1': 1, 'FCS_CKM_EXT.1.1': 2, 'FCS_CKM_EXT.2.1': 2, 'FCS_CKM.4.1': 1, 'FCS_COP.1.1': 4, 'FCS_STG_EXT.1.1': 2, 'FCS_CKM.2': 1, 'FCS_CKM': 1}, 'FDP': {'FDP_CER_EXT': 5, 'FDP_CSI_EXT': 3, 'FDP_CRL_EXT': 3, 'FDP_STG_EXT': 3, 'FDP_CER_EXT.1': 14, 'FDP_CER_EXT.2': 12, 'FDP_CER_EXT.3': 12, 'FDP_CSI_EXT.1': 16, 'FDP_CRL_EXT.1': 12, 'FDP_STG_EXT.1': 12, 'FDP_RIP.2': 14, 'FDP_CER_EXT.1.1': 2, 'FDP_CER_EXT.1.2': 2, 'FDP_CER_EXT.1.3': 2, 'FDP_CER_EXT.2.1': 2, 'FDP_CER_EXT.3.1': 1, 'FDP_CSI_EXT.1.1': 2, 'FDP_CSI_EXT.1.2': 2, 'FDP_CRL_EXT.1.1': 2, 'FDP_STG_EXT.1.1': 2, 'FDP_RIP.2.1': 1, 'FDP_ITC.1': 5, 'FDP_ITC.2': 5}, 'FIA': {'FIA_UAU.2': 5, 'FIA_UID.2': 6, 'FIA_UAU.2.1': 1, 'FIA_UID.2.1': 1, 'FIA_CMC_EXT.1': 3, 'FIA_EST_EXT.1': 3, 'FIA_UID.1': 2}, 'FMT': {'FMT_MOF.1': 24, 'FMT_MTD.1': 7, 'FMT_SMF.1': 15, 'FMT_SMR.2': 5, 'FMT_SMF': 1, 'FMT_SMF.1.1': 1, 'FMT_SMR': 1, 'FMT_SMR.2.1': 3, 'FMT_SMR.2.2': 1, 'FMT_SMR.2.3': 1, 'FMT_MOF.1.1': 4, 'FMT_MTD': 1, 'FMT_MTD.1.1': 1, 'FMT_SMR.1': 5}, 'FPT': {'FPT_TST.2': 1, 'FPT_STM.1': 2, 'FPT_TUD_EXT.1': 12, 'FPT_FLS.1': 1, 'FPT_SKP_EXT': 3, 'FPT_TUD_EXT': 3, 'FPT_SKP_EXT.1': 12, 'FPT_SKP_EXT.1.1': 2, 'FPT_TUD_EXT.1.1': 2, 'FPT_TUD_EXT.1.2': 2, 'FPT_TUD_EXT.1.3': 2}, 'FTA': {'FTA_TAB.1': 1, 'FTA_SSL.3': 1, 'FTA_SSL.4': 7, 'FTA_SSL.4.1': 1}, 'FTP': {'FTP_ITC.1': 1, 'FTP_TRP.1': 1, 'FTP_TUD_EXT.1': 1}}, 'cc_claims': {'T': {'T.PRIVILEGED_USER_ERROR': 2, 'T.UNDETECTED_ACTIONS': 1, 'T.UNAUTHORIZED_ACCESS': 2, 'T.TSF_FAILURE': 1, 'T.UNAUTHORIZED_UPDATE': 2, 'T.USER_DATA_REUSE': 1, 'T.UNAUTHENTICATED_TRANSACTIONS': 2, 'T.WEAK_CRYPTO': 1}, 'A': {'A.NO_GENERAL_PURPOSE': 2, 'A.PHYSICAL': 1, 'A.TRUSTED_ADMIN': 2, 'A.BACK_UP': 1, 'A.COMSEC': 1, 'A.NTP': 3, 'A.OPERATING_SYSTEM': 2, 'A.HSM': 1, 'A.RPM_SIGNATURE': 2}, 'OT': {'OT.RECOVERY': 1, 'OT.INTEGRITY_PROTECTION': 1, 'OT.TOE_ADMINISTRATION': 6, 'OT.AUDIT_PROTECTION': 6, 'OT.AUDIT_LOSS_RESPONSE': 5, 'OT.SYSTEM_MONITORING': 3, 'OT.VERIFIABLE_UPDATES': 6, 'OT.RESIDUAL_INFORMATION_CLEARING': 3, 'OT.KEY_ESCROW': 3, 'OT.CERTIFICATES': 5, 'OT.NON_REPUDIATION': 3, 'OT.CONFIGURATION_MANAGEMENT': 5}, 'OE': {'OE.NO_GENERAL_PURPOSE': 3, 'OE.PHYSICAL': 3, 'OE.TRUSTED_ADMIN': 3, 'OE.BACKUP': 3, 'OE.COMSEC': 5, 'OE.NTP': 3, 'OE.OPERATING_SYSTEM': 3, 'OE.HSM': 3, 'OE.RPM_SIGNATURE': 3}}, 'vendor': {}, 'eval_facility': {'OPPIDA': {'OPPIDA': 1}}, 'symmetric_crypto': {}, 'asymmetric_crypto': {'ECC': {'ECDSA': {'ECDSA': 5}}}, 'pq_crypto': {}, 'hash_function': {}, 'crypto_scheme': {}, 'crypto_protocol': {'SSH': {'SSH': 2}, 'TLS': {'TLS': {'TLS': 9}}, 'IPsec': {'IPsec': 1}}, 'randomness': {}, 'cipher_mode': {}, 'ecc_curve': {}, 'crypto_engine': {}, 'tls_cipher_suite': {}, 'crypto_library': {}, 'vulnerability': {}, 'side_channel_analysis': {}, 'technical_report_id': {}, 'device_model': {}, 'tee_name': {}, 'os_name': {}, 'cplc_data': {}, 'ic_data_group': {}, 'standard_id': {'PKCS': {'PKCS#11': 1}, 'RFC': {'RFC 5280': 11, 'RFC 5652': 1, 'RFC 6960': 2}, 'X509': {'X.509': 5}}, 'javacard_version': {}, 'javacard_api_const': {}, 'javacard_packages': {}, 'certification_process': {}}.
    • The cert_keywords property was set to {'cc_cert_id': {'FR': {'ANSSI-CC-2021/17': 2}}, 'cc_protection_profile_id': {}, 'cc_security_level': {'EAL': {'EAL 4': 1, 'EAL2': 1, 'EAL4': 1}}, 'cc_sar': {'ALC': {'ALC_FLR.3': 1}}, 'cc_sfr': {}, 'cc_claims': {}, 'vendor': {}, 'eval_facility': {'OPPIDA': {'OPPIDA': 2}}, 'symmetric_crypto': {}, 'asymmetric_crypto': {}, 'pq_crypto': {}, 'hash_function': {}, 'crypto_scheme': {}, 'crypto_protocol': {}, 'randomness': {}, 'cipher_mode': {}, 'ecc_curve': {}, 'crypto_engine': {}, 'tls_cipher_suite': {}, 'crypto_library': {}, 'vulnerability': {}, 'side_channel_analysis': {}, 'technical_report_id': {}, 'device_model': {}, 'tee_name': {}, 'os_name': {}, 'cplc_data': {}, 'ic_data_group': {}, 'standard_id': {}, 'javacard_version': {}, 'javacard_api_const': {}, 'javacard_packages': {}, 'certification_process': {}}.
    • The st_filename property was set to anssi-cible-2021-17en.pdf.
    • The cert_filename property was set to certificat_2021_17fr.pdf.

    The computed heuristics were updated.

    • The extracted_sars property was updated, with the {'_type': 'Set', 'elements': [{'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_FSP', 'level': 4}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_IMP', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_FUN', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AGD_OPE', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_SPD', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AGD_PRE', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_IND', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_DVS', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_CCL', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_COV', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_ARC', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_DPT', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_TDS', 'level': 3}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_ECD', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_LCD', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_DEL', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_OBJ', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AVA_VAN', 'level': 4}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_INT', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_TAT', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_CMC', 'level': 4}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_REQ', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_TSS', 'level': 1}]} values added.
  • 19.08.2024 The certificate data changed.
    Certificate changed

    The state of the certificate object was updated.

    • The report property was updated, with the {'download_ok': True, 'convert_ok': True, 'extract_ok': True, 'pdf_hash': '080e2277524778c58ebdeeffbf38b7f8082866b4924e6d0a3867d2a33a0e3d3b', 'txt_hash': '83004789d08d8073012f835ba105e965483b6f9326bf4aa3b96789367040acd7'} data.

    The PDF extraction data was updated.

    • The report_metadata property was set to {'pdf_file_size_bytes': 223359, 'pdf_is_encrypted': False, 'pdf_number_of_pages': 14, '/Author': '', '/CreationDate': "D:20210519154641+02'00'", '/Creator': 'PScript5.dll Version 5.2.2', '/ModDate': "D:20210519154641+02'00'", '/Producer': 'Acrobat Distiller 11.0 (Windows)', '/Title': '', 'pdf_hyperlinks': {'_type': 'Set', 'elements': []}}.
    • The report_frontpage property was set to {'FR': {}}.
    • The report_keywords property was set to {'cc_cert_id': {'FR': {'ANSSI-CC-2021/17': 2}}, 'cc_protection_profile_id': {}, 'cc_security_level': {'EAL': {'EAL 4': 2, 'EAL2': 2, 'EAL4': 2, 'EAL 1': 1, 'EAL 3': 1, 'EAL 5': 1, 'EAL 7': 1}, 'ITSEC': {'ITSEC E3 Elémentaire': 1}}, 'cc_sar': {'ADV': {'ADV_ARC': 1, 'ADV_FSP': 1, 'ADV_IMP': 1, 'ADV_INT': 1, 'ADV_SPM': 1, 'ADV_TDS': 1}, 'AGD': {'AGD_OPE': 1, 'AGD_PRE': 1}, 'ALC': {'ALC_FLR.3': 2, 'ALC_FLR': 2, 'ALC_CMC': 1, 'ALC_CMS': 1, 'ALC_DEL': 1, 'ALC_DVS': 1, 'ALC_LCD': 1, 'ALC_TAT': 1}, 'ATE': {'ATE_COV': 1, 'ATE_DPT': 1, 'ATE_FUN': 1, 'ATE_IND': 1}, 'AVA': {'AVA_VAN.3': 1, 'AVA_VAN': 1}, 'ASE': {'ASE_CCL': 1, 'ASE_ECD': 1, 'ASE_INT': 1, 'ASE_OBJ': 1, 'ASE_REQ': 1, 'ASE_SPD': 1, 'ASE_TSS': 1}}, 'cc_sfr': {}, 'cc_claims': {}, 'vendor': {}, 'eval_facility': {'CESTI': {'CESTI': 1}, 'OPPIDA': {'OPPIDA': 3}}, 'symmetric_crypto': {'DES': {'DES': {'DES': 1}}}, 'asymmetric_crypto': {}, 'pq_crypto': {}, 'hash_function': {}, 'crypto_scheme': {}, 'crypto_protocol': {}, 'randomness': {}, 'cipher_mode': {}, 'ecc_curve': {}, 'crypto_engine': {}, 'tls_cipher_suite': {}, 'crypto_library': {}, 'vulnerability': {}, 'side_channel_analysis': {}, 'technical_report_id': {}, 'device_model': {}, 'tee_name': {}, 'os_name': {}, 'cplc_data': {}, 'ic_data_group': {}, 'standard_id': {'CC': {'CCMB-2017-04-001': 1, 'CCMB-2017-04-002': 1, 'CCMB-2017-04-003': 1, 'CCMB-2017-04-004': 1}}, 'javacard_version': {}, 'javacard_api_const': {}, 'javacard_packages': {}, 'certification_process': {}}.
    • The report_filename property was set to anssi-cc-2021_17fr.pdf.

    The computed heuristics were updated.

    • The cert_id property was set to ANSSI-CC-2021/17.
    • The extracted_sars property was updated, with the {'_type': 'Set', 'elements': [{'_type': 'sec_certs.sample.sar.SAR', 'family': 'AVA_VAN', 'level': 3}]} values added.
  • 17.08.2024 The certificate data changed.
    Certificate changed

    The report_link was updated.

    • The new value is https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/anssi-cc-2021_17fr.pdf.

    The st_link was updated.

    • The new value is https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/anssi-cible-2021-17en.pdf.

    The state of the certificate object was updated.

    • The report property was updated, with the {'download_ok': False, 'convert_ok': False, 'extract_ok': False, 'pdf_hash': None, 'txt_hash': None} data.
    • The st property was updated, with the {'download_ok': False, 'convert_ok': False, 'extract_ok': False, 'pdf_hash': None, 'txt_hash': None} data.

    The PDF extraction data was updated.

    • The report_metadata property was set to None.
    • The st_metadata property was set to None.
    • The report_frontpage property was set to None.
    • The report_keywords property was set to None.
    • The st_keywords property was set to None.
    • The report_filename property was set to None.
    • The st_filename property was set to None.

    The computed heuristics were updated.

    • The cert_id property was set to None.
    • The extracted_sars property was updated, with the {'_type': 'Set', 'elements': [{'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_FSP', 'level': 4}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_IMP', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_FUN', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AGD_OPE', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_SPD', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AGD_PRE', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_IND', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_DVS', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_CCL', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_COV', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_ARC', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_DPT', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_TDS', 'level': 3}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_ECD', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_LCD', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_DEL', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_OBJ', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AVA_VAN', 'level': 4}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_TAT', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_INT', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_CMC', 'level': 4}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_REQ', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_TSS', 'level': 1}]} values discarded.
  • 12.08.2024 The certificate data changed.
    Certificate changed

    The state of the certificate object was updated.

    • The cert property was updated, with the {'download_ok': False, 'convert_ok': False, 'extract_ok': False, 'pdf_hash': None, 'txt_hash': None} data.

    The PDF extraction data was updated.

    • The cert_metadata property was set to None.
    • The cert_keywords property was set to None.
    • The cert_filename property was set to None.

    The computed heuristics were updated.

    • The scheme_data property was set to {'product': 'IDnomic ID CA Version 1.3.7', 'url': 'https://cyber.gouv.fr/produits-certifies/idnomic-id-ca-version-137', 'description': 'Le produit évalué est « IDnomic ID CA, Version 1.3.7 » développé par IDNOMIC, marque commerciale de KEYNECTIS SA.\nCe produit est une autorité de certification (AC) et intervient en tant que composant principal dans une infrastructure de gestion de clés (IGC). La TOE consiste en des programmes, formats de données, procédures, protocoles de communications, politiques de sécurité et mécanismes de cr', 'sponsor': 'IDNOMIC', 'developer': 'IDNOMIC', 'cert_id': '2021/17', 'level': 'EAL4+', 'expiration_date': '12 Mai 2026', 'enhanced': {'cert_id': '2021/17', 'certification_date': '12/05/2021', 'expiration_date': '12/05/2026', 'category': 'Produits pour ordinateur personnel et serveur', 'cc_version': 'Critères Communs version 3.1r5', 'developer': 'IDNOMIC', 'sponsor': 'IDNOMIC', 'evaluation_facility': 'OPPIDA', 'level': 'EAL4+', 'protection_profile': '', 'mutual_recognition': 'SOG-IS\n CCRA', 'augmented': 'ALC_FLR.3', 'cert_link': 'https://cyber.gouv.fr/sites/default/files/2021/05/certificat_2021_17fr.pdf', 'target_link': 'https://cyber.gouv.fr/sites/default/files/2021/05/anssi-cible-2021-17en.pdf', 'report_link': 'https://cyber.gouv.fr/sites/default/files/2021/05/anssi-cc-2021_17fr.pdf'}}.
  • 31.07.2024 The certificate data changed.
    Certificate changed

    The computed heuristics were updated.

    • The scheme_data property was set to None.
  • 23.07.2024 The certificate was first processed.
    New certificate

    A new Common Criteria certificate with the product name IDnomic ID CA Version 1.3.7 was processed.

Raw data

{
  "_type": "sec_certs.sample.cc.CCCertificate",
  "category": "Key Management Systems",
  "cert_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/certificat_2021_17fr.pdf",
  "dgst": "34c4331a0995e7f6",
  "heuristics": {
    "_type": "sec_certs.sample.cc.CCCertificate.Heuristics",
    "annotated_references": null,
    "cert_id": "ANSSI-CC-2021/17",
    "cert_lab": null,
    "cpe_matches": null,
    "direct_transitive_cves": null,
    "extracted_sars": {
      "_type": "Set",
      "elements": [
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ADV_ARC",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ASE_TSS",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ASE_REQ",
          "level": 2
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ATE_IND",
          "level": 2
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ATE_COV",
          "level": 2
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ALC_DVS",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ALC_TAT",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ASE_ECD",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ALC_CMC",
          "level": 4
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "AVA_VAN",
          "level": 4
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "AGD_PRE",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ADV_IMP",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ASE_OBJ",
          "level": 2
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ASE_SPD",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ASE_INT",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ADV_FSP",
          "level": 4
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ATE_DPT",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ALC_FLR",
          "level": 3
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ALC_DEL",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ASE_CCL",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ADV_TDS",
          "level": 3
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ALC_LCD",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ATE_FUN",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "AGD_OPE",
          "level": 1
        }
      ]
    },
    "extracted_versions": {
      "_type": "Set",
      "elements": [
        "1.3.7"
      ]
    },
    "indirect_transitive_cves": null,
    "related_cves": null,
    "report_references": {
      "_type": "sec_certs.sample.certificate.References",
      "directly_referenced_by": null,
      "directly_referencing": null,
      "indirectly_referenced_by": null,
      "indirectly_referencing": null
    },
    "scheme_data": {
      "cert_id": "2021/17",
      "description": "Le produit \u00e9valu\u00e9 est \u00ab IDnomic ID CA, Version 1.3.7 \u00bb d\u00e9velopp\u00e9 par IDNOMIC, marque commerciale de KEYNECTIS SA.\nCe produit est une autorit\u00e9 de certification (AC) et intervient en tant que composant principal dans une infrastructure de gestion de cl\u00e9s (IGC). La TOE consiste en des programmes, formats de donn\u00e9es, proc\u00e9dures, protocoles de communications, politiques de s\u00e9curit\u00e9 et m\u00e9canismes de cr",
      "developer": "IDNOMIC",
      "enhanced": {
        "augmented": "ALC_FLR.3",
        "category": "Produits pour ordinateur personnel et serveur",
        "cc_version": "Crit\u00e8res Communs version 3.1r5",
        "cert_id": "2021/17",
        "cert_link": "https://cyber.gouv.fr/sites/default/files/2021/05/certificat_2021_17fr.pdf",
        "certification_date": "12/05/2021",
        "developer": "IDNOMIC",
        "evaluation_facility": "OPPIDA",
        "expiration_date": "12/05/2026",
        "level": "EAL4+",
        "mutual_recognition": "SOG-IS\n                          CCRA",
        "protection_profile": "",
        "report_link": "https://cyber.gouv.fr/sites/default/files/2021/05/anssi-cc-2021_17fr.pdf",
        "sponsor": "IDNOMIC",
        "target_link": "https://cyber.gouv.fr/sites/default/files/2021/05/anssi-cible-2021-17en.pdf"
      },
      "expiration_date": "12 Mai 2026",
      "level": "EAL4+",
      "product": "IDnomic ID CA Version 1.3.7",
      "sponsor": "IDNOMIC",
      "url": "https://cyber.gouv.fr/produits-certifies/idnomic-id-ca-version-137"
    },
    "st_references": {
      "_type": "sec_certs.sample.certificate.References",
      "directly_referenced_by": null,
      "directly_referencing": null,
      "indirectly_referenced_by": null,
      "indirectly_referencing": null
    },
    "verified_cpe_matches": null
  },
  "maintenance_updates": {
    "_type": "Set",
    "elements": []
  },
  "manufacturer": "IDNOMIC",
  "manufacturer_web": "https://atos.net/en/solutions/cyber-security-products/idnomic-pki-solutions-for-digital-identities-security",
  "name": "IDnomic ID CA Version 1.3.7",
  "not_valid_after": "2026-05-12",
  "not_valid_before": "2021-05-12",
  "pdf_data": {
    "_type": "sec_certs.sample.cc.CCCertificate.PdfData",
    "cert_filename": "certificat_2021_17fr.pdf",
    "cert_frontpage": null,
    "cert_keywords": {
      "asymmetric_crypto": {},
      "cc_cert_id": {
        "FR": {
          "ANSSI-CC-2021/17": 2
        }
      },
      "cc_claims": {},
      "cc_protection_profile_id": {},
      "cc_sar": {
        "ALC": {
          "ALC_FLR.3": 1
        }
      },
      "cc_security_level": {
        "EAL": {
          "EAL 4": 1,
          "EAL2": 1,
          "EAL4": 1
        }
      },
      "cc_sfr": {},
      "certification_process": {},
      "cipher_mode": {},
      "cplc_data": {},
      "crypto_engine": {},
      "crypto_library": {},
      "crypto_protocol": {},
      "crypto_scheme": {},
      "device_model": {},
      "ecc_curve": {},
      "eval_facility": {
        "OPPIDA": {
          "OPPIDA": 2
        }
      },
      "hash_function": {},
      "ic_data_group": {},
      "javacard_api_const": {},
      "javacard_packages": {},
      "javacard_version": {},
      "os_name": {},
      "pq_crypto": {},
      "randomness": {},
      "side_channel_analysis": {},
      "standard_id": {},
      "symmetric_crypto": {},
      "technical_report_id": {},
      "tee_name": {},
      "tls_cipher_suite": {},
      "vendor": {},
      "vulnerability": {}
    },
    "cert_metadata": {
      "/Author": "",
      "/CreationDate": "D:20210519154758+02\u002700\u0027",
      "/Creator": "PScript5.dll Version 5.2.2",
      "/ModDate": "D:20210519154758+02\u002700\u0027",
      "/Producer": "Acrobat Distiller 11.0 (Windows)",
      "/Title": "",
      "pdf_file_size_bytes": 279186,
      "pdf_hyperlinks": {
        "_type": "Set",
        "elements": []
      },
      "pdf_is_encrypted": false,
      "pdf_number_of_pages": 2
    },
    "report_filename": "anssi-cc-2021_17fr.pdf",
    "report_frontpage": {
      "FR": {}
    },
    "report_keywords": {
      "asymmetric_crypto": {},
      "cc_cert_id": {
        "FR": {
          "ANSSI-CC-2021/17": 2
        }
      },
      "cc_claims": {},
      "cc_protection_profile_id": {},
      "cc_sar": {
        "ADV": {
          "ADV_ARC": 1,
          "ADV_FSP": 1,
          "ADV_IMP": 1,
          "ADV_INT": 1,
          "ADV_SPM": 1,
          "ADV_TDS": 1
        },
        "AGD": {
          "AGD_OPE": 1,
          "AGD_PRE": 1
        },
        "ALC": {
          "ALC_CMC": 1,
          "ALC_CMS": 1,
          "ALC_DEL": 1,
          "ALC_DVS": 1,
          "ALC_FLR": 2,
          "ALC_FLR.3": 2,
          "ALC_LCD": 1,
          "ALC_TAT": 1
        },
        "ASE": {
          "ASE_CCL": 1,
          "ASE_ECD": 1,
          "ASE_INT": 1,
          "ASE_OBJ": 1,
          "ASE_REQ": 1,
          "ASE_SPD": 1,
          "ASE_TSS": 1
        },
        "ATE": {
          "ATE_COV": 1,
          "ATE_DPT": 1,
          "ATE_FUN": 1,
          "ATE_IND": 1
        },
        "AVA": {
          "AVA_VAN": 1,
          "AVA_VAN.3": 1
        }
      },
      "cc_security_level": {
        "EAL": {
          "EAL 1": 1,
          "EAL 3": 1,
          "EAL 4": 2,
          "EAL 5": 1,
          "EAL 7": 1,
          "EAL2": 2,
          "EAL4": 2
        },
        "ITSEC": {
          "ITSEC E3 El\u00e9mentaire": 1
        }
      },
      "cc_sfr": {},
      "certification_process": {},
      "cipher_mode": {},
      "cplc_data": {},
      "crypto_engine": {},
      "crypto_library": {},
      "crypto_protocol": {},
      "crypto_scheme": {},
      "device_model": {},
      "ecc_curve": {},
      "eval_facility": {
        "CESTI": {
          "CESTI": 1
        },
        "OPPIDA": {
          "OPPIDA": 3
        }
      },
      "hash_function": {},
      "ic_data_group": {},
      "javacard_api_const": {},
      "javacard_packages": {},
      "javacard_version": {},
      "os_name": {},
      "pq_crypto": {},
      "randomness": {},
      "side_channel_analysis": {},
      "standard_id": {
        "CC": {
          "CCMB-2017-04-001": 1,
          "CCMB-2017-04-002": 1,
          "CCMB-2017-04-003": 1,
          "CCMB-2017-04-004": 1
        }
      },
      "symmetric_crypto": {
        "DES": {
          "DES": {
            "DES": 1
          }
        }
      },
      "technical_report_id": {},
      "tee_name": {},
      "tls_cipher_suite": {},
      "vendor": {},
      "vulnerability": {}
    },
    "report_metadata": {
      "/Author": "",
      "/CreationDate": "D:20210519154641+02\u002700\u0027",
      "/Creator": "PScript5.dll Version 5.2.2",
      "/ModDate": "D:20210519154641+02\u002700\u0027",
      "/Producer": "Acrobat Distiller 11.0 (Windows)",
      "/Title": "",
      "pdf_file_size_bytes": 223359,
      "pdf_hyperlinks": {
        "_type": "Set",
        "elements": []
      },
      "pdf_is_encrypted": false,
      "pdf_number_of_pages": 14
    },
    "st_filename": "anssi-cible-2021-17en.pdf",
    "st_frontpage": null,
    "st_keywords": {
      "asymmetric_crypto": {
        "ECC": {
          "ECDSA": {
            "ECDSA": 5
          }
        }
      },
      "cc_cert_id": {},
      "cc_claims": {
        "A": {
          "A.BACK_UP": 1,
          "A.COMSEC": 1,
          "A.HSM": 1,
          "A.NO_GENERAL_PURPOSE": 2,
          "A.NTP": 3,
          "A.OPERATING_SYSTEM": 2,
          "A.PHYSICAL": 1,
          "A.RPM_SIGNATURE": 2,
          "A.TRUSTED_ADMIN": 2
        },
        "OE": {
          "OE.BACKUP": 3,
          "OE.COMSEC": 5,
          "OE.HSM": 3,
          "OE.NO_GENERAL_PURPOSE": 3,
          "OE.NTP": 3,
          "OE.OPERATING_SYSTEM": 3,
          "OE.PHYSICAL": 3,
          "OE.RPM_SIGNATURE": 3,
          "OE.TRUSTED_ADMIN": 3
        },
        "OT": {
          "OT.AUDIT_LOSS_RESPONSE": 5,
          "OT.AUDIT_PROTECTION": 6,
          "OT.CERTIFICATES": 5,
          "OT.CONFIGURATION_MANAGEMENT": 5,
          "OT.INTEGRITY_PROTECTION": 1,
          "OT.KEY_ESCROW": 3,
          "OT.NON_REPUDIATION": 3,
          "OT.RECOVERY": 1,
          "OT.RESIDUAL_INFORMATION_CLEARING": 3,
          "OT.SYSTEM_MONITORING": 3,
          "OT.TOE_ADMINISTRATION": 6,
          "OT.VERIFIABLE_UPDATES": 6
        },
        "T": {
          "T.PRIVILEGED_USER_ERROR": 2,
          "T.TSF_FAILURE": 1,
          "T.UNAUTHENTICATED_TRANSACTIONS": 2,
          "T.UNAUTHORIZED_ACCESS": 2,
          "T.UNAUTHORIZED_UPDATE": 2,
          "T.UNDETECTED_ACTIONS": 1,
          "T.USER_DATA_REUSE": 1,
          "T.WEAK_CRYPTO": 1
        }
      },
      "cc_protection_profile_id": {},
      "cc_sar": {
        "ADV": {
          "ADV_ARC.1": 6,
          "ADV_FSP.1": 2,
          "ADV_FSP.2": 2,
          "ADV_FSP.4": 6,
          "ADV_IMP.1": 5,
          "ADV_TDS.1": 2,
          "ADV_TDS.2": 1,
          "ADV_TDS.3": 6
        },
        "AGD": {
          "AGD_OPE.1": 6,
          "AGD_PRE.1": 5
        },
        "ALC": {
          "ALC_CMC.4": 2,
          "ALC_DEL.1": 2,
          "ALC_DVS.1": 3,
          "ALC_FLR.3": 4,
          "ALC_LCD.1": 3,
          "ALC_TAT.1": 4
        },
        "ASE": {
          "ASE_CCL.1": 2,
          "ASE_ECD.1": 4,
          "ASE_INT.1": 3,
          "ASE_OBJ.2": 2,
          "ASE_REQ.1": 2,
          "ASE_REQ.2": 3,
          "ASE_SPD.1": 1,
          "ASE_TSS.1": 2
        },
        "ATE": {
          "ATE_COV.1": 2,
          "ATE_COV.2": 3,
          "ATE_DPT.1": 3,
          "ATE_FUN.1": 6,
          "ATE_IND.2": 2
        },
        "AVA": {
          "AVA_VAN.3": 2,
          "AVA_VAN.4": 2
        }
      },
      "cc_security_level": {
        "EAL": {
          "EAL4": 2,
          "EAL4 augmented": 2
        }
      },
      "cc_sfr": {
        "FAU": {
          "FAU_GEN": 6,
          "FAU_GEN.1": 12,
          "FAU_GEN.1.1": 1,
          "FAU_GEN.1.2": 1,
          "FAU_GEN.2": 6,
          "FAU_GEN.2.1": 1,
          "FAU_SAR.1": 7,
          "FAU_SAR.1.1": 1,
          "FAU_SAR.1.2": 1,
          "FAU_SAR.3": 5,
          "FAU_SAR.3.1": 1,
          "FAU_SEL.1": 6,
          "FAU_SEL.1.1": 1,
          "FAU_STG.1": 7,
          "FAU_STG.1.1": 1,
          "FAU_STG.1.2": 1,
          "FAU_STG.3": 6,
          "FAU_STG.3.1": 1,
          "FAU_STG.4": 1,
          "FAU_STG_EXT": 1
        },
        "FCO": {
          "FCO_NRO_EXT": 3,
          "FCO_NRO_EXT.2": 13,
          "FCO_NRO_EXT.2.1": 2,
          "FCO_NRO_EXT.2.2": 1,
          "FCO_NRO_EXT.2.3": 2,
          "FCO_NRO_EXT.2.4": 2,
          "FCO_NRO_EXT.2.5": 2,
          "FCO_NRR_EXT": 3,
          "FCO_NRR_EXT.2": 12,
          "FCO_NRR_EXT.2.1": 2
        },
        "FCS": {
          "FCS_CKM": 1,
          "FCS_CKM.1": 15,
          "FCS_CKM.1.1": 1,
          "FCS_CKM.2": 1,
          "FCS_CKM.4": 16,
          "FCS_CKM.4.1": 1,
          "FCS_CKM.5": 1,
          "FCS_CKM_EXT": 4,
          "FCS_CKM_EXT.1": 12,
          "FCS_CKM_EXT.1.1": 2,
          "FCS_CKM_EXT.2": 12,
          "FCS_CKM_EXT.2.1": 2,
          "FCS_COP.1": 44,
          "FCS_COP.1.1": 4,
          "FCS_STG_EXT": 3,
          "FCS_STG_EXT.1": 13,
          "FCS_STG_EXT.1.1": 2
        },
        "FDP": {
          "FDP_CER_EXT": 5,
          "FDP_CER_EXT.1": 14,
          "FDP_CER_EXT.1.1": 2,
          "FDP_CER_EXT.1.2": 2,
          "FDP_CER_EXT.1.3": 2,
          "FDP_CER_EXT.2": 12,
          "FDP_CER_EXT.2.1": 2,
          "FDP_CER_EXT.3": 12,
          "FDP_CER_EXT.3.1": 1,
          "FDP_CRL_EXT": 3,
          "FDP_CRL_EXT.1": 12,
          "FDP_CRL_EXT.1.1": 2,
          "FDP_CSI_EXT": 3,
          "FDP_CSI_EXT.1": 16,
          "FDP_CSI_EXT.1.1": 2,
          "FDP_CSI_EXT.1.2": 2,
          "FDP_ITC.1": 5,
          "FDP_ITC.2": 5,
          "FDP_RIP.2": 14,
          "FDP_RIP.2.1": 1,
          "FDP_STG_EXT": 3,
          "FDP_STG_EXT.1": 12,
          "FDP_STG_EXT.1.1": 2
        },
        "FIA": {
          "FIA_CMC_EXT.1": 3,
          "FIA_EST_EXT.1": 3,
          "FIA_UAU.2": 5,
          "FIA_UAU.2.1": 1,
          "FIA_UID.1": 2,
          "FIA_UID.2": 6,
          "FIA_UID.2.1": 1
        },
        "FMT": {
          "FMT_MOF.1": 24,
          "FMT_MOF.1.1": 4,
          "FMT_MTD": 1,
          "FMT_MTD.1": 7,
          "FMT_MTD.1.1": 1,
          "FMT_SMF": 1,
          "FMT_SMF.1": 15,
          "FMT_SMF.1.1": 1,
          "FMT_SMR": 1,
          "FMT_SMR.1": 5,
          "FMT_SMR.2": 5,
          "FMT_SMR.2.1": 3,
          "FMT_SMR.2.2": 1,
          "FMT_SMR.2.3": 1
        },
        "FPT": {
          "FPT_FLS.1": 1,
          "FPT_SKP_EXT": 3,
          "FPT_SKP_EXT.1": 12,
          "FPT_SKP_EXT.1.1": 2,
          "FPT_STM.1": 2,
          "FPT_TST.2": 1,
          "FPT_TUD_EXT": 3,
          "FPT_TUD_EXT.1": 12,
          "FPT_TUD_EXT.1.1": 2,
          "FPT_TUD_EXT.1.2": 2,
          "FPT_TUD_EXT.1.3": 2
        },
        "FTA": {
          "FTA_SSL.3": 1,
          "FTA_SSL.4": 7,
          "FTA_SSL.4.1": 1,
          "FTA_TAB.1": 1
        },
        "FTP": {
          "FTP_ITC.1": 1,
          "FTP_TRP.1": 1,
          "FTP_TUD_EXT.1": 1
        }
      },
      "certification_process": {},
      "cipher_mode": {},
      "cplc_data": {},
      "crypto_engine": {},
      "crypto_library": {},
      "crypto_protocol": {
        "IPsec": {
          "IPsec": 1
        },
        "SSH": {
          "SSH": 2
        },
        "TLS": {
          "TLS": {
            "TLS": 9
          }
        }
      },
      "crypto_scheme": {},
      "device_model": {},
      "ecc_curve": {},
      "eval_facility": {
        "OPPIDA": {
          "OPPIDA": 1
        }
      },
      "hash_function": {},
      "ic_data_group": {},
      "javacard_api_const": {},
      "javacard_packages": {},
      "javacard_version": {},
      "os_name": {},
      "pq_crypto": {},
      "randomness": {},
      "side_channel_analysis": {},
      "standard_id": {
        "PKCS": {
          "PKCS#11": 1
        },
        "RFC": {
          "RFC 5280": 11,
          "RFC 5652": 1,
          "RFC 6960": 2
        },
        "X509": {
          "X.509": 5
        }
      },
      "symmetric_crypto": {},
      "technical_report_id": {},
      "tee_name": {},
      "tls_cipher_suite": {},
      "vendor": {},
      "vulnerability": {}
    },
    "st_metadata": {
      "/Author": "IDnomic",
      "/Category": "[Mettre \u00e0 jour la propri\u00e9t\u00e9 \"Cat\u00e9gorie\" du document pour ins\u00e9rer ici le num\u00e9ro de chrono/ref du document]",
      "/Company": "Microsoft",
      "/CreationDate": "D:20210423093956+02\u002700\u0027",
      "/Creator": "Acrobat PDFMaker 17 pour Word",
      "/MSIP_Label_e463cba9-5f6c-478d-9329-7b2295e4e8ed_ActionId": "09aba970-b117-4f0a-bebd-4540198027e9",
      "/MSIP_Label_e463cba9-5f6c-478d-9329-7b2295e4e8ed_ContentBits": "0",
      "/MSIP_Label_e463cba9-5f6c-478d-9329-7b2295e4e8ed_Enabled": "true",
      "/MSIP_Label_e463cba9-5f6c-478d-9329-7b2295e4e8ed_Method": "Standard",
      "/MSIP_Label_e463cba9-5f6c-478d-9329-7b2295e4e8ed_Name": "All Employees_2",
      "/MSIP_Label_e463cba9-5f6c-478d-9329-7b2295e4e8ed_SetDate": "2021-01-08T16:57:10Z",
      "/MSIP_Label_e463cba9-5f6c-478d-9329-7b2295e4e8ed_SiteId": "33440fc6-b7c7-412c-bb73-0e70b0198d5a",
      "/ModDate": "D:20210423094159+02\u002700\u0027",
      "/Producer": "Adobe PDF Library 17.11.238",
      "/SourceModified": "",
      "/Subject": "IDnomic ID CA",
      "/Title": "Common Criteria Security Target",
      "pdf_file_size_bytes": 1023987,
      "pdf_hyperlinks": {
        "_type": "Set",
        "elements": []
      },
      "pdf_is_encrypted": false,
      "pdf_number_of_pages": 58
    }
  },
  "protection_profiles": {
    "_type": "Set",
    "elements": []
  },
  "report_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/anssi-cc-2021_17fr.pdf",
  "scheme": "FR",
  "security_level": {
    "_type": "Set",
    "elements": [
      "ALC_FLR.3",
      "EAL4+"
    ]
  },
  "st_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/anssi-cible-2021-17en.pdf",
  "state": {
    "_type": "sec_certs.sample.cc.CCCertificate.InternalState",
    "cert": {
      "_type": "sec_certs.sample.cc.CCCertificate.DocumentState",
      "convert_garbage": false,
      "convert_ok": true,
      "download_ok": true,
      "extract_ok": true,
      "pdf_hash": "7cecd3c179e0da323c7ee414394afd9b9dc77305aa752523a10346c42d1d8d13",
      "txt_hash": "0d62468afedc2a985a83d3a66a345bf2cb5601a215db1c7fc8dcdaf048545d5c"
    },
    "report": {
      "_type": "sec_certs.sample.cc.CCCertificate.DocumentState",
      "convert_garbage": false,
      "convert_ok": true,
      "download_ok": true,
      "extract_ok": true,
      "pdf_hash": "080e2277524778c58ebdeeffbf38b7f8082866b4924e6d0a3867d2a33a0e3d3b",
      "txt_hash": "83004789d08d8073012f835ba105e965483b6f9326bf4aa3b96789367040acd7"
    },
    "st": {
      "_type": "sec_certs.sample.cc.CCCertificate.DocumentState",
      "convert_garbage": false,
      "convert_ok": true,
      "download_ok": true,
      "extract_ok": true,
      "pdf_hash": "c0bf5b4f90559db4c7e2814af6a7605c75c960374a482392d4f869c8e6037731",
      "txt_hash": "1d3ffe8d0a26c11cb213f8c2fa3b3076473ea3399d6b2269f8ff527fa90b852d"
    }
  },
  "status": "active"
}