Comparing certificates Experimental feature

You are comparing two certificates. By default, only differing attributes are shown. Use the button below to show/hide all attributes.

Showing only differing attributes.
Fortinet FortiManager 5.6.6 build 7352 190510 (EAL4+)
2017-48-INF-3131
vinCERTcore, versión 4.0.5.5733
2016-01-INF-2264
name Fortinet FortiManager 5.6.6 build 7352 190510 (EAL4+) vinCERTcore, versión 4.0.5.5733
category Network and Network-Related Devices and Systems Products for Digital Signatures
status active archived
not_valid_after 29.05.2025 24.04.2023
not_valid_before 29.05.2020 24.04.2018
cert_link https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/2017-48-Diploma.pdf https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/2016-01-CCRA.pdf
report_link https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/2017-48-INF-3131.pdf https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/2016-01-INF-2264%20v2.pdf
st_link https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/2017-48-ST.pdf https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/2016-01-ST-v1.12.pdf
manufacturer Fortinet, Inc. Víntegris, SL.
manufacturer_web https://www.fortinet.com/ https://www.vintegris.com/
security_level EAL4+, ALC_FLR.3 EAL4+, ALC_FLR.2
dgst 27ade261a5b0a226 1c5f79388b3fab19
heuristics/cert_id 2017-48-INF-3131 2016-01-INF-2264
heuristics/extracted_sars ASE_INT.1, ALC_CMC.4, ASE_ECD.1, ADV_IMP.1, ATE_COV.2, ASE_TSS.1, ALC_TAT.1, ASE_SPD.1, ALC_DEL.1, ALC_LCD.1, ALC_FLR.3, AGD_OPE.1, AVA_VAN.3, AGD_PRE.1, ALC_CMS.4, ATE_FUN.1, ADV_ARC.1, ASE_OBJ.2, ADV_TDS.3, ATE_DPT.1, ASE_REQ.2, ALC_DVS.1, ADV_FSP.4, ATE_IND.2, ASE_CCL.1 ASE_INT.1, ASE_ECD.1, ADV_IMP.1, ATE_COV.2, ALC_TAT.1, ASE_SPD.1, ALC_DEL.1, ALC_LCD.1, AGD_OPE.1, AVA_VAN.3, AGD_PRE.1, ALC_CMS.4, ATE_FUN.1, ADV_ARC.1, ASE_OBJ.2, ADV_TDS.3, ATE_DPT.1, ALC_FLR.2, ASE_REQ.2, ALC_DVS.1, ADV_FSP.4, ATE_IND.2, ASE_CCL.1
heuristics/extracted_versions 5.6.6 4.0.5.5733
heuristics/scheme_data
  • category: Others
  • certification_date: 29.05.2020
  • enhanced:
    • category: Others
    • cc_version: Common Criteria 3.1 release 5
    • cert_link: https://oc.ccn.cni.es/en/component/djcatalog2/?format=raw&task=download&fid=939
    • certification_date: 29.05.2020
    • description: TOE Overview The TOE provides network management to one or more Fortinet network security devices. Authorized administrators are able to configure and manage devices, using functions that include verification and update of firmware and license information. Administrators can create and modify policies and objects and push them to the devices. The TOE is able to retrieve up-to-date antivirus and intrusion prevention signatures from Fortinet’s FortiGuard service to push to the managed devices. The TOE is capable of grouping devices into administrative domains (ADOMs), which simplifies the application of policies, distribution of content security and firmware updates for large implementations. ADOMs are implemented in the evaluated configuration. The TOE has extensive logging capabilities which include the logging of administrative actions and logging of use of the trusted cryptographic channels. The TOE is a software only TOE. It is supported by the FortiManager appliance hardware, which is in the operational environment.
    • evaluation_facility: Applus Laboratories
    • level: EAL4 + ALC_FLR.3
    • manufacturer: Fortinet, Inc.
    • report_link: https://oc.ccn.cni.es/en/component/djcatalog2/?format=raw&task=download&fid=940
    • status: Certified
    • target_link: https://oc.ccn.cni.es/en/component/djcatalog2/?format=raw&task=download&fid=938
    • type: Product
  • manufacturer: Fortinet, Inc.
  • product: Fortinet FortiManager 5.6.6 build 7352 190510 (EAL4+)
  • product_link: https://oc.ccn.cni.es/en/certified-products/certified-products/368-fortinet-fortimanager-5-6-6-build-7352-190510-eal4
pdf_data/cert_filename 2017-48-Diploma.pdf 2016-01-CCRA.pdf
pdf_data/cert_keywords/cc_security_level
  • EAL:
    • EAL 2: 1
    • EAL4: 2
    • EAL4+: 2
  • EAL:
    • EAL4: 1
    • EAL4 augmented: 1
pdf_data/cert_keywords/cc_sar
  • ALC:
    • ALC_FLR: 2
    • ALC_FLR.3: 1
  • ALC:
    • ALC_FLR.2: 1
pdf_data/cert_keywords/cc_claims
  • O:
    • O.E: 1
  • T:
    • T.I: 1
  • T:
    • T.I: 1
pdf_data/cert_keywords/eval_facility
  • Applus:
    • Applus Laboratories: 1
pdf_data/cert_metadata
  • /Author:
  • /CreationDate:
  • /Creator:
  • /Keywords:
  • /ModDate:
  • /Producer:
  • /Subject:
  • /Title:
  • /Trapped:
  • pdf_file_size_bytes: 868949
  • pdf_hyperlinks: {}
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 2
  • /CreationDate: D:20180404121729+02'00'
  • pdf_file_size_bytes: 746055
  • pdf_hyperlinks: {}
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 2
pdf_data/report_filename 2017-48-INF-3131.pdf 2016-01-INF-2264 v2.pdf
pdf_data/report_keywords/cc_cert_id
  • ES:
    • 2017-48-INF-3131-v1: 1
  • ES:
    • 2016-1-INF-2264 v2: 1
pdf_data/report_keywords/cc_security_level
  • EAL:
    • EAL 1: 1
    • EAL 2: 1
    • EAL 4: 2
    • EAL2: 1
    • EAL4: 10
    • EAL4+: 11
  • ITSEC:
    • ITSEC Evaluation: 1
  • EAL:
    • EAL 1: 1
    • EAL 2: 1
    • EAL 4: 2
    • EAL 4+: 2
    • EAL4: 2
  • ITSEC:
    • ITSEC Evaluation: 1
pdf_data/report_keywords/cc_sar
  • ADV:
    • ADV_ARC.1: 1
    • ADV_IMP.1: 1
  • AGD:
    • AGD_OPE.1: 1
  • ALC:
    • ALC_CMC.4: 1
    • ALC_DEL.1: 1
    • ALC_FLR: 3
    • ALC_FLR.3: 9
    • ALC_TAT.1: 1
  • ASE:
    • ASE_CCL.1: 1
    • ASE_INT.1: 1
    • ASE_REQ.2: 1
  • ATE:
    • ATE_COV.2: 1
    • ATE_FUN.1: 1
  • AVA:
    • AVA_VAN.3: 1
  • AGD:
    • AGD_OPE.1: 1
    • AGD_PRE.1: 1
  • ALC:
    • ALC_FLR: 2
    • ALC_FLR.2: 2
pdf_data/report_keywords/cc_sfr
  • FAU:
    • FAU_GEN.1: 1
    • FAU_SAR.1: 1
  • FCS:
    • FCS_CKM.1: 3
    • FCS_CKM.4: 1
  • FDP:
    • FDP_ACC.1: 1
  • FIA:
    • FIA_AFL.1: 1
    • FIA_UAU.2: 1
  • FMT:
    • FMT_MSA.1: 1
    • FMT_MTD.1: 1
    • FMT_SMR.1: 1
  • FPT:
    • FPT_ITC.1: 1
  • FTA:
    • FTA_SSL.3: 1
  • FTP:
    • FTP_ITC.1: 1
  • FAU:
    • FAU_ARP.1: 1
    • FAU_GEN.2: 1
    • FAU_SAR.1: 1
    • FAU_SAR.3: 1
  • FCS:
    • FCS_CKM.4: 1
  • FDP:
    • FDP_ACC: 2
    • FDP_ACF: 2
    • FDP_ETC.1: 1
    • FDP_ETC.2: 1
    • FDP_ITC.2: 1
    • FDP_ROL.1: 1
    • FDP_UIT: 2
  • FIA:
    • FIA_AFL.1: 1
    • FIA_UAU.1: 1
    • FIA_UAU.6: 1
    • FIA_USB.1: 1
  • FMT:
    • FMT_MOF.1: 1
    • FMT_MSA: 1
    • FMT_MSA.3: 1
    • FMT_SMR.2: 1
  • FPT:
    • FPT_TDC.1: 1
  • FTA:
    • FTA_SSL.3: 1
    • FTA_TSE.1: 1
  • FTP:
    • FTP_ITC.1: 1
pdf_data/report_keywords/cc_claims
  • O:
    • O.S: 3
pdf_data/report_keywords/eval_facility
  • Applus:
    • Applus Laboratories: 5
  • Applus:
    • Applus Laboratories: 1
pdf_data/report_keywords/crypto_protocol
  • TLS:
    • TLS:
      • TLS: 1
  • SSH:
    • SSH: 3
pdf_data/report_keywords/standard_id
  • FIPS:
    • FIPS PUB 140-2: 2
  • ISO:
    • ISO/IEC 15408: 4
  • PKCS:
    • PKCS#11: 1
pdf_data/report_keywords/certification_process
  • OutOfScope:
    • are stored in vinCERTcore. Digital signatures are always performed remotely in the vinCERTcore HSM (out of scope of evaluation). Password protected key usage is also supported. The vinCERTagent and the vinCERTweb: 1
    • factor and second factor authentication mechanisms. Both vinCERTweb and vinCERTagent connects (out of scope of ST) to this subsystem to allow end-user authentication to the TOE. HSM subsystem is responsible: 1
    • out of scope: 4
    • to manage the certificate creation flow in the system using the external vinCERTweb product (out of scope of evaluation) and storing them in the HSM. The operative can be performed in two different ways: •: 1
    • using the related functionalities on vinCERTweb. It’s required a vinCERTagent software (out of scope of evaluation) installed for digital signature purposes. This agent is compatible with CSP and: 1
pdf_data/report_metadata
  • /Author: .
  • /CreationDate: D:20180322165059+01'00'
  • /Creator: PDFCreator Version 1.3.2
  • /Keywords:
  • /ModDate: D:20180322165059+01'00'
  • /Producer: GPL Ghostscript 9.05
  • /Subject:
  • /Title: 2016-01-INF-2264 v2
  • pdf_file_size_bytes: 1304805
  • pdf_hyperlinks: {}
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 17
pdf_data/st_filename 2017-48-ST.pdf 2016-01-ST-v1.12.pdf
pdf_data/st_keywords/cc_security_level
  • EAL:
    • EAL 4: 4
    • EAL4: 2
    • EAL4+: 4
  • EAL:
    • EAL 4: 1
    • EAL 4+: 3
    • EAL4: 7
    • EAL4 augmented: 4
    • EAL4+: 4
pdf_data/st_keywords/cc_sar
  • ADV:
    • ADV_ARC.1: 1
    • ADV_FSP.4: 1
    • ADV_IMP.1: 1
    • ADV_TDS.3: 1
  • AGD:
    • AGD_OPE.1: 1
    • AGD_PRE.1: 1
  • ALC:
    • ALC_CMC.4: 1
    • ALC_CMS.4: 1
    • ALC_DEL.1: 1
    • ALC_DVS.1: 1
    • ALC_FLR.3: 6
    • ALC_LCD.1: 1
    • ALC_TAT.1: 1
  • ASE:
    • ASE_CCL.1: 1
    • ASE_ECD.1: 1
    • ASE_INT.1: 1
    • ASE_OBJ.2: 1
    • ASE_REQ.2: 1
    • ASE_SPD.1: 1
    • ASE_TSS.1: 1
  • ATE:
    • ATE_COV.2: 1
    • ATE_DPT.1: 1
    • ATE_FUN.1: 1
    • ATE_IND.2: 1
  • AVA:
    • AVA_VAN.3: 1
  • ADV:
    • ADV_ARC.1: 1
    • ADV_FSP.4: 1
    • ADV_IMP.1: 1
    • ADV_TDS.3: 1
  • AGD:
    • AGD_OPE.1: 1
    • AGD_PRE.1: 1
  • ALC:
    • ALC_CMS.4: 1
    • ALC_DEL.1: 1
    • ALC_DVS.1: 1
    • ALC_FLR.2: 6
    • ALC_LCD.1: 1
    • ALC_TAT.1: 1
  • ASE:
    • ASE_CCL.1: 1
    • ASE_ECD.1: 1
    • ASE_INT.1: 1
    • ASE_OBJ.2: 1
    • ASE_REQ.2: 1
    • ASE_SPD.1: 1
  • ATE:
    • ATE_COV.2: 1
    • ATE_DPT.1: 1
    • ATE_FUN.1: 1
    • ATE_IND.2: 1
  • AVA:
    • AVA_VAN.3: 1
pdf_data/st_keywords/cc_sfr
  • FAU:
    • FAU_GEN.1: 11
    • FAU_GEN.1.1: 1
    • FAU_GEN.1.2: 1
    • FAU_GEN.2: 7
    • FAU_GEN.2.1: 1
    • FAU_SAR.1: 15
    • FAU_SAR.1.1: 1
    • FAU_SAR.1.2: 1
    • FAU_SAR.2: 9
    • FAU_SAR.2.1: 1
  • FCS:
    • FCS_CKM.1: 35
    • FCS_CKM.2: 3
    • FCS_CKM.4: 18
    • FCS_CKM.4.1: 1
    • FCS_COP.1: 17
    • FCS_COP.1.1: 1
  • FDP:
    • FDP_ACC.1: 14
    • FDP_ACC.1.1: 1
    • FDP_ACF.1: 9
    • FDP_ACF.1.1: 1
    • FDP_ACF.1.2: 1
    • FDP_ACF.1.3: 1
    • FDP_ACF.1.4: 1
    • FDP_IFC.1: 2
    • FDP_ITC.1: 2
    • FDP_ITC.2: 2
  • FIA:
    • FIA_AFL.1: 9
    • FIA_AFL.1.1: 1
    • FIA_AFL.1.2: 1
    • FIA_SOS.1: 8
    • FIA_SOS.1.1: 1
    • FIA_UAU.1: 4
    • FIA_UAU.2: 12
    • FIA_UAU.2.1: 1
    • FIA_UID.1: 9
    • FIA_UID.2: 13
    • FIA_UID.2.1: 1
  • FMT:
    • FMT_MSA.1: 15
    • FMT_MSA.1.1: 1
    • FMT_MSA.3: 14
    • FMT_MSA.3.1: 1
    • FMT_MSA.3.2: 1
    • FMT_MTD.1: 11
    • FMT_MTD.1.1: 1
    • FMT_SMF.1: 13
    • FMT_SMF.1.1: 1
    • FMT_SMR.1: 18
    • FMT_SMR.1.1: 1
    • FMT_SMR.1.2: 1
  • FPT:
    • FPT_ITC.1: 8
    • FPT_ITC.1.1: 1
    • FPT_STM.1: 11
    • FPT_STM.1.1: 1
  • FTA:
    • FTA_SSL.3: 7
    • FTA_SSL.3.1: 1
  • FTP:
    • FTP_ITC.1: 8
    • FTP_ITC.1.1: 1
    • FTP_ITC.1.2: 1
    • FTP_ITC.1.3: 1
    • FTP_TRP.1: 8
    • FTP_TRP.1.1: 1
    • FTP_TRP.1.2: 1
    • FTP_TRP.1.3: 1
  • FAU:
    • FAU_ARP: 1
    • FAU_ARP.1: 10
    • FAU_ARP.1.1: 1
    • FAU_GEN: 1
    • FAU_GEN.1: 12
    • FAU_GEN.1.1: 1
    • FAU_GEN.1.2: 1
    • FAU_GEN.2: 9
    • FAU_GEN.2.1: 1
    • FAU_SAA: 1
    • FAU_SAA.1: 6
    • FAU_SAA.1.1: 1
    • FAU_SAA.1.2: 1
    • FAU_SAR: 1
    • FAU_SAR.1: 7
    • FAU_SAR.1.1: 1
    • FAU_SAR.1.2: 1
    • FAU_SAR.2: 4
    • FAU_SAR.2.1: 1
    • FAU_SAR.3: 4
    • FAU_SAR.3.1: 1
    • FAU_STG: 1
    • FAU_STG.2: 4
    • FAU_STG.2.1: 1
    • FAU_STG.2.2: 1
    • FAU_STG.2.3: 1
  • FCS:
    • FCS_CKM: 1
    • FCS_CKM.4: 5
    • FCS_CKM.4.1: 1
    • FCS_COP: 1
    • FCS_COP.1: 6
    • FCS_COP.1.1: 1
  • FDP:
    • FDP_ACC: 51
    • FDP_ACC.1: 10
    • FDP_ACF: 52
    • FDP_ACF.1: 13
    • FDP_ETC: 1
    • FDP_ETC.1: 22
    • FDP_ETC.1.1: 1
    • FDP_ETC.1.2: 1
    • FDP_ETC.2: 21
    • FDP_ETC.2.1: 1
    • FDP_ETC.2.2: 1
    • FDP_ETC.2.3: 1
    • FDP_ETC.2.4: 1
    • FDP_ITC: 1
    • FDP_ITC.1: 17
    • FDP_ITC.1.1: 1
    • FDP_ITC.1.2: 1
    • FDP_ITC.1.3: 1
    • FDP_ITC.2: 29
    • FDP_ITC.2.1: 1
    • FDP_ITC.2.2: 1
    • FDP_ITC.2.3: 1
    • FDP_ITC.2.4: 1
    • FDP_ITC.2.5: 1
    • FDP_RIP: 1
    • FDP_RIP.1: 11
    • FDP_ROL: 1
    • FDP_ROL.1: 4
    • FDP_ROL.1.2: 1
    • FDP_SDI: 1
    • FDP_SDI.2: 7
    • FDP_SDI.2.1: 1
    • FDP_SDI.2.2: 1
    • FDP_UIT: 7
    • FDP_UIT.1: 5
  • FIA:
    • FIA_AFL: 1
    • FIA_AFL.1: 9
    • FIA_AFL.1.1: 1
    • FIA_AFL.1.2: 1
    • FIA_ATD: 1
    • FIA_ATD.1: 6
    • FIA_ATD.1.1: 1
    • FIA_UAU: 2
    • FIA_UAU.1: 11
    • FIA_UAU.1.1: 1
    • FIA_UAU.1.2: 1
    • FIA_UAU.5: 4
    • FIA_UAU.5.1: 1
    • FIA_UAU.5.2: 1
    • FIA_UAU.6: 6
    • FIA_UAU.6.1: 1
    • FIA_UID: 1
    • FIA_UID.1: 10
    • FIA_UID.1.1: 1
    • FIA_UID.1.2: 1
    • FIA_USB: 1
    • FIA_USB.1: 8
    • FIA_USB.1.1: 1
    • FIA_USB.1.2: 1
    • FIA_USB.1.3: 1
  • FMT:
    • FMT_MOF: 1
    • FMT_MOF.1: 8
    • FMT_MOF.1.1: 1
    • FMT_MSA: 22
    • FMT_MSA.1: 3
    • FMT_MSA.3: 17
    • FMT_MSA.3.1: 1
    • FMT_MSA.3.2: 1
    • FMT_SMF: 3
    • FMT_SMF.1: 15
    • FMT_SMF.1.1: 1
    • FMT_SMR: 1
    • FMT_SMR.1: 4
    • FMT_SMR.2: 11
    • FMT_SMR.2.1: 1
    • FMT_SMR.2.2: 1
    • FMT_SMR.2.3: 1
  • FPT:
    • FPT_STM.1: 2
    • FPT_TDC: 1
    • FPT_TDC.1: 28
    • FPT_TDC.1.1: 1
    • FPT_TDC.1.2: 1
    • FPT_TST: 1
    • FPT_TST.1: 5
    • FPT_TST.1.1: 1
    • FPT_TST.1.2: 1
    • FPT_TST.1.3: 1
  • FTA:
    • FTA_SSL: 3
    • FTA_SSL.3: 5
    • FTA_SSL.3.1: 1
    • FTA_SSL.4: 3
    • FTA_SSL.4.1: 1
    • FTA_TSE: 1
    • FTA_TSE.1: 16
    • FTA_TSE.1.1: 1
  • FTP:
    • FTP_ITC: 1
    • FTP_ITC.1: 20
    • FTP_ITC.1.1: 1
    • FTP_ITC.1.3: 1
    • FTP_TRP: 1
    • FTP_TRP.1: 8
    • FTP_TRP.1.1: 1
    • FTP_TRP.1.3: 1
pdf_data/st_keywords/cc_claims
  • A:
    • A.DELIVER: 3
    • A.LOCATE: 2
    • A.MANAGE: 2
    • A.NOEVIL: 3
  • O:
    • O.ACCESS: 9
    • O.ADMIN: 9
    • O.AUDIT: 11
    • O.ENCRYP: 6
    • O.IDAUTH: 14
    • O.PROTCT: 9
    • O.TIME: 11
  • OE:
    • OE.ADMIN: 10
    • OE.PHYCAL: 6
  • T:
    • T.AUDACC: 3
    • T.NOAUTH: 2
    • T.PRIVIL: 3
    • T.PROCOM: 2
  • O:
    • O.S: 3
pdf_data/st_keywords/eval_facility
  • EWA:
    • EWA-Canada: 1
pdf_data/st_keywords/symmetric_crypto
  • AES_competition:
    • AES:
      • AES: 8
  • constructions:
    • MAC:
      • HMAC: 2
      • HMAC-SHA-256: 1
      • HMAC-SHA-384: 1
pdf_data/st_keywords/asymmetric_crypto
  • ECC:
    • ECDH:
      • ECDHE: 1
  • FF:
    • DH:
      • DH: 5
      • DHE: 1
      • Diffie-Hellman: 4
pdf_data/st_keywords/hash_function
  • SHA:
    • SHA1:
      • SHA-1: 2
    • SHA2:
      • SHA-256: 3
      • SHA-384: 2
  • PBKDF:
    • PBKDF2: 2
pdf_data/st_keywords/crypto_scheme
  • KEX:
    • Key Exchange: 3
pdf_data/st_keywords/crypto_protocol
  • SSH:
    • SSH: 4
  • TLS:
    • TLS:
      • TLS: 8
      • TLS 1.1: 2
      • TLS 1.2: 2
  • VPN:
    • VPN: 1
  • SSH:
    • SSH: 18
  • TLS:
    • SSL:
      • SSL: 2
    • TLS:
      • TLS: 6
pdf_data/st_keywords/randomness
  • PRNG:
    • DRBG: 6
pdf_data/st_keywords/cipher_mode
  • CBC:
    • CBC: 4
  • CTR:
    • CTR: 2
pdf_data/st_keywords/tls_cipher_suite
  • TLS:
    • TLS_DHE_RSA_WITH_AES_128_CBC_SHA: 1
    • TLS_DHE_RSA_WITH_AES_256_CBC_SHA: 1
pdf_data/st_keywords/standard_id
  • CC:
    • CCMB-2017-04-001: 1
    • CCMB-2017-04-002: 1
    • CCMB-2017-04-003: 1
  • FIPS:
    • FIPS 186-4: 1
    • FIPS PUB 197: 1
  • PKCS:
    • PKCS #1: 1
    • PKCS1: 1
  • RFC:
    • RFC 2631: 1
    • RFC 4346: 1
    • RFC 5246: 2
    • RFC4346: 1
  • FIPS:
    • FIPS 140-2: 1
    • FIPS PUB 140-2: 4
  • ISO:
    • ISO/IEC 15408: 10
  • PKCS:
    • PKCS #12: 1
    • PKCS#11: 1
    • PKCS#12: 6
    • PKCS#5: 1
  • RFC:
    • RFC2986: 1
    • RFC5246: 1
    • RFC7292: 1
pdf_data/st_keywords/certification_process
  • OutOfScope:
    • are stored in vinCERTcore. Digital signatures are always performed remotely in the vinCERTcore HSM (out of scope of evaluation). Password protected key usage is also supported. The vinCERTagent and the: 1
    • factor and second factor authentication mechanisms. Both vinCERTweb and vinCERTagent connects (out of scope of ST) to this subsystem to allow end-user authentication to the TOE. HSM subsystem is responsible: 1
    • out of scope: 4
    • to manage the certificate creation flowin the system using the external vinCERTweb product (out of scope of evaluation) and storing them in the HSM. The operative can be performed in two different ways: 1
    • using the related functionalities on vinCERTweb. It's required a vinCERTagent software (out of scope of evaluation) installed for digital signature purposes. This agent is compatible with CSP and: 1
pdf_data/st_metadata
  • /Author:
  • /CreationDate:
  • /Creator:
  • /Keywords:
  • /ModDate:
  • /Producer:
  • /Subject:
  • /Title:
  • /Trapped:
  • pdf_file_size_bytes: 608207
  • pdf_hyperlinks: {}
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 51
  • /CreationDate: D:20180305120726+01'00'
  • /Creator: Microsoft® Word 2013
  • /ModDate: D:20180305120726+01'00'
  • /Producer: Microsoft® Word 2013
  • pdf_file_size_bytes: 15342857
  • pdf_hyperlinks: {}
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 97
state/cert/pdf_hash Different Different
state/cert/txt_hash Different Different
state/report/pdf_hash Different Different
state/report/txt_hash Different Different
state/st/convert_garbage False True
state/st/pdf_hash Different Different
state/st/txt_hash Different Different