Comparing certificates Experimental feature

You are comparing two certificates. By default, only differing attributes are shown. Use the button below to show/hide all attributes.

Showing only differing attributes.
IBM Tivoli Directory Server Version 6.2
BSI-DSZ-CC-0535-2009
V3Pro2004 and AhnLab Policy Center 3.0
KECS-ISIS-0073-2007
name IBM Tivoli Directory Server Version 6.2 V3Pro2004 and AhnLab Policy Center 3.0
category Key Management Systems Other Devices and Systems
scheme DE KR
not_valid_after 01.09.2019 01.06.2019
not_valid_before 16.03.2009 17.09.2007
report_link https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/0535a.pdf https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/ISIS-73-EN.pdf
st_link https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/0535B.pdf https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/ISIS-73-ST-EN.pdf
manufacturer IBM Corporation AhnLab, Inc.
manufacturer_web https://www.ibm.com https://www.ahnlab.com/
security_level EAL4+, ALC_FLR.1 EAL4
dgst 2a967f12da0a46c2 a8f7a4c49c242ddc
heuristics/cert_id BSI-DSZ-CC-0535-2009 KECS-ISIS-0073-2007
heuristics/cert_lab BSI []
heuristics/cpe_matches cpe:2.3:a:ibm:tivoli_directory_server:6.2.0.54:*:*:*:*:*:*:*, cpe:2.3:a:ibm:tivoli_directory_server:6.2.0.49:*:*:*:*:*:*:*, cpe:2.3:a:ibm:tivoli_directory_server:6.2.0.56:*:*:*:*:*:*:*, cpe:2.3:a:ibm:tivoli_directory_server:6.2.0.23:*:*:*:*:*:*:*, cpe:2.3:a:ibm:tivoli_directory_server:6.2.0.36:*:*:*:*:*:*:*, cpe:2.3:a:ibm:tivoli_directory_server:6.2.0.10:*:*:*:*:*:*:*, cpe:2.3:a:ibm:tivoli_directory_server:6.2.0.33:*:*:*:*:*:*:*, cpe:2.3:a:ibm:tivoli_directory_server:6.2.0.21:*:*:*:*:*:*:*, cpe:2.3:a:ibm:tivoli_directory_server:6.2.0.11:*:*:*:*:*:*:*, cpe:2.3:a:ibm:tivoli_directory_server:6.2.0.32:*:*:*:*:*:*:*, cpe:2.3:a:ibm:tivoli_directory_server:6.2.0.47:*:*:*:*:*:*:*, cpe:2.3:a:ibm:tivoli_directory_server:6.2.0.48:*:*:*:*:*:*:*, cpe:2.3:a:ibm:tivoli_directory_server:6.2.0.14:*:*:*:*:*:*:*, cpe:2.3:a:ibm:tivoli_directory_server:6.2.0.39:*:*:*:*:*:*:*, cpe:2.3:a:ibm:tivoli_directory_server:6.2.0.7:*:*:*:*:*:*:*, cpe:2.3:a:ibm:tivoli_directory_server:6.2.0.50:*:*:*:*:*:*:*, cpe:2.3:a:ibm:tivoli_directory_server:6.2.0.44:*:*:*:*:*:*:*, cpe:2.3:a:ibm:tivoli_directory_server:6.2.0.0:*:*:*:*:*:*:*, cpe:2.3:a:ibm:tivoli_directory_server:6.2.0.13:*:*:*:*:*:*:*, cpe:2.3:a:ibm:tivoli_directory_server:6.2.0.3:*:*:*:*:*:*:*, cpe:2.3:a:ibm:tivoli_directory_server:6.2.0.53:*:*:*:*:*:*:*, cpe:2.3:a:ibm:tivoli_directory_server:6.2.0.52:*:*:*:*:*:*:*, cpe:2.3:a:ibm:tivoli_directory_server:6.2.0.37:*:*:*:*:*:*:*, cpe:2.3:a:ibm:tivoli_directory_server:6.2.0.12:*:*:*:*:*:*:*, cpe:2.3:a:ibm:tivoli_directory_server:6.2.0.29:*:*:*:*:*:*:*, cpe:2.3:a:ibm:tivoli_directory_server:6.2.0.41:*:*:*:*:*:*:*, cpe:2.3:a:ibm:tivoli_directory_server:6.2.0.24:*:*:*:*:*:*:*, cpe:2.3:a:ibm:tivoli_directory_server:6.2.0.25:*:*:*:*:*:*:*, cpe:2.3:a:ibm:tivoli_directory_server:6.2.0.45:*:*:*:*:*:*:*, cpe:2.3:a:ibm:tivoli_directory_server:6.2.0.55:*:*:*:*:*:*:*, cpe:2.3:a:ibm:tivoli_directory_server:6.2.0.51:*:*:*:*:*:*:*, cpe:2.3:a:ibm:tivoli_directory_server:6.2.0.5:*:*:*:*:*:*:*, cpe:2.3:a:ibm:tivoli_directory_server:6.2.0.4:*:*:*:*:*:*:*, cpe:2.3:a:ibm:tivoli_directory_server:6.2.0.20:*:*:*:*:*:*:*, cpe:2.3:a:ibm:tivoli_directory_server:6.2.0:*:*:*:*:*:*:*, cpe:2.3:a:ibm:tivoli_directory_server:6.2.0.31:*:*:*:*:*:*:*, cpe:2.3:a:ibm:tivoli_directory_server:6.2.0.46:*:*:*:*:*:*:*, cpe:2.3:a:ibm:tivoli_directory_server:6.2.0.30:*:*:*:*:*:*:*, cpe:2.3:a:ibm:tivoli_directory_server:6.2.0.38:*:*:*:*:*:*:*, cpe:2.3:a:ibm:tivoli_directory_server:6.2.0.15:*:*:*:*:*:*:*, cpe:2.3:a:ibm:tivoli_directory_server:6.2.0.6:*:*:*:*:*:*:*, cpe:2.3:a:ibm:tivoli_directory_server:6.2.0.40:*:*:*:*:*:*:*, cpe:2.3:a:ibm:tivoli_directory_server:6.2.0.34:*:*:*:*:*:*:*, cpe:2.3:a:ibm:tivoli_directory_server:6.2.0.2:*:*:*:*:*:*:*, cpe:2.3:a:ibm:tivoli_directory_server:6.2.0.42:*:*:*:*:*:*:*, cpe:2.3:a:ibm:tivoli_directory_server:6.2.0.19:*:*:*:*:*:*:*, cpe:2.3:a:ibm:tivoli_directory_server:6.2.0.27:*:*:*:*:*:*:*, cpe:2.3:a:ibm:tivoli_directory_server:6.2.0.8:*:*:*:*:*:*:*, cpe:2.3:a:ibm:tivoli_directory_server:6.2.0.43:*:*:*:*:*:*:*, cpe:2.3:a:ibm:tivoli_directory_server:6.2.0.22:*:*:*:*:*:*:*, cpe:2.3:a:ibm:tivoli_directory_server:6.2.0.35:*:*:*:*:*:*:*, cpe:2.3:a:ibm:tivoli_directory_server:6.2.0.1:*:*:*:*:*:*:*, cpe:2.3:a:ibm:tivoli_directory_server:6.2.0.26:*:*:*:*:*:*:* {}
heuristics/related_cves CVE-2012-2191, CVE-2012-0740, CVE-2015-1978, CVE-2012-0726, CVE-2011-1206, CVE-2012-2203, CVE-2015-1959, CVE-2015-0138, CVE-2012-0743, CVE-2011-2758, CVE-2015-1976, CVE-2015-1974, CVE-2015-1977, CVE-2011-1820, CVE-2015-1972, CVE-2015-1975, CVE-2011-2759, CVE-2014-6100, CVE-2015-2019 {}
heuristics/extracted_sars ALC_FLR.1, AGD_USR.1, ADV_HLD.2, ADV_FSP.2, AVA_MSU.2, ATE_DPT.1, ALC_DVS.1, AGD_SPM.1, ALC_LCD.1, ADV_IMP.1, ADV_RCR.1, ATE_IND.2, ADV_SPM.1, ATE_COV.2, ATE_FUN.1, AVA_SOF.1, ALC_TAT.1, AVA_VLA.2, ADV_LLD.1, AGD_ADM.1 AGD_USR.1, ADV_HLD.2, AVA_SOF.1, ADV_FSP.2, AVA_MSU.2, ADV_RCR.1, ALC_DVS.1, ALC_TAT.1, ALC_LCD.1, ATE_DPT.1, ADV_IMP.1, ADV_SPM.1, AVA_VLA.2, ADV_LLD.1, ATE_IND.2, AGD_ADM.1, ATE_COV.2, ATE_FUN.1
heuristics/extracted_versions 6.2 3.0
heuristics/report_references/directly_referencing BSI-DSZ-CC-0283-2006 {}
heuristics/report_references/indirectly_referencing BSI-DSZ-CC-0283-2006 {}
pdf_data/report_filename 0535a.pdf ISIS-73-EN.pdf
pdf_data/report_frontpage
  • DE:
    • cert_id: BSI-DSZ-CC-0535-2009
    • cert_item: IBM Tivoli Directory Server Version 6.2
    • cert_lab: BSI
    • developer: IBM Corporation
    • match_rules: ['(BSI-DSZ-CC-.+?) (?:for|For) (.+?) from (.*)']
  • DE:
pdf_data/report_keywords/cc_cert_id
  • DE:
    • BSI-DSZ-CC-0283-2006: 2
    • BSI-DSZ-CC-0535-2009: 17
  • KR:
    • KECS-ISIS-0073-2007: 1
pdf_data/report_keywords/cc_security_level
  • EAL:
    • EAL 1: 1
    • EAL 4: 4
    • EAL 4 augmented: 2
    • EAL 7: 1
    • EAL1: 5
    • EAL2: 3
    • EAL3: 4
    • EAL4: 9
    • EAL4 augmented: 1
    • EAL5: 6
    • EAL6: 3
    • EAL7: 4
  • EAL:
    • EAL4: 3
pdf_data/report_keywords/cc_sar
  • ACM:
    • ACM_AUT: 2
    • ACM_CAP: 2
    • ACM_SCP: 2
  • ADO:
    • ADO_DEL: 2
    • ADO_IGS: 2
  • ADV:
    • ADV_FSP: 2
    • ADV_HLD: 2
    • ADV_IMP: 2
    • ADV_INT: 2
    • ADV_LLD: 2
    • ADV_RCR: 2
    • ADV_SPM: 2
  • AGD:
    • AGD_ADM: 2
    • AGD_USR: 2
  • ALC:
    • ALC_DVS: 2
    • ALC_FLR: 2
    • ALC_FLR.1: 4
    • ALC_LCD: 1
    • ALC_TAT: 2
  • APE:
    • APE_DES: 1
    • APE_ENV: 1
    • APE_INT: 1
    • APE_OBJ: 1
    • APE_REQ: 1
    • APE_SRE: 1
  • ASE:
    • ASE_DES: 1
    • ASE_ENV: 1
    • ASE_INT: 1
    • ASE_OBJ: 1
    • ASE_PPC: 1
    • ASE_REQ: 1
    • ASE_SRE: 1
    • ASE_TSS: 1
  • ATE:
    • ATE_COV: 2
    • ATE_DPT: 2
    • ATE_FUN: 2
    • ATE_IND: 2
  • AVA:
    • AVA_CCA: 2
    • AVA_MSU: 2
    • AVA_SOF: 3
    • AVA_VLA: 3
    • AVA_VLA.2: 1
    • AVA_VLA.3: 1
    • AVA_VLA.4: 1
  • ATE:
    • ATE_COV: 1
    • ATE_DPT: 1
pdf_data/report_keywords/cc_sfr
  • FIA:
    • FIA_SOS.1: 1
pdf_data/report_keywords/cc_claims
  • OE:
    • OE.BACKUP: 1
    • OE.DATABASE: 1
    • OE.ENCRYPT: 1
    • OE.ENVMANAGE: 1
    • OE.MANAGE: 1
    • OE.PHYSICAL: 1
    • OE.ROUTE: 1
    • OE.SOPHISTICATED: 1
    • OE.TIME: 1
  • A:
    • A.AVCONFILICT: 1
    • A.CERT: 1
    • A.GUARD: 1
    • A.INTERNALENTITY: 1
    • A.NO_EVIL: 1
    • A.PHYSICAL: 1
    • A.SAFEITENTITY: 1
    • A.TIMESTAMP: 1
  • O:
    • O.ADMIN_ROLE: 1
    • O.ALARM: 1
    • O.AUDIT: 1
    • O.INA: 1
    • O.MANAGE: 1
    • O.SECURE_UPDATE: 1
    • O.SELF_PROTECTION: 1
    • O.STRENGTHENOS: 1
    • O.TSFDATA_PROTECT: 1
    • O.VIRUS: 1
  • OE:
    • OE.AUDIT_SEARCH: 1
    • OE.AUDIT_STORAGE: 1
    • OE.AVCONFLICT: 1
    • OE.CERT: 1
    • OE.DOM_SEPARATION: 1
    • OE.GUARD: 1
    • OE.INTERNALENTITY: 1
    • OE.NO_BYPASS: 1
    • OE.NO_EVIL: 1
    • OE.PHYSICAL: 1
    • OE.RESIDUAL_INFO: 1
    • OE.SAFEITENTITY: 1
    • OE.TIMESTAMP: 1
    • OE.TOE_ACCESS: 1
pdf_data/report_keywords/vendor
  • Microsoft:
    • Microsoft: 2
  • Microsoft:
    • Microsoft: 4
pdf_data/report_keywords/eval_facility
  • atsec:
    • atsec: 3
  • KISA:
    • KISA: 3
pdf_data/report_keywords/crypto_protocol
  • TLS:
    • SSL:
      • SSL: 2
pdf_data/report_keywords/technical_report_id
  • BSI:
    • BSI 7125: 2
    • BSI 7148: 1
    • BSI 7149: 1
pdf_data/report_keywords/standard_id
  • BSI:
    • AIS 14: 1
    • AIS 19: 1
    • AIS 32: 1
    • AIS 34: 1
    • AIS 38: 1
  • ISO:
    • ISO/IEC 15408:2005: 2
  • RFC:
    • RFC 1777: 1
pdf_data/report_keywords/certification_process
  • ConfidentialDocument:
    • 7] Evaluation Technical Report, Version 3, 24.02.2009, atsec information security GmbH (confidential document) 13.1 Guidance documentation [8] IBM Tivoli Directory Server Version 6.2, Administration Guide: 1
  • OutOfScope:
    • If the administrator does not set the V3 security lock with Policy Agent in passive mode, it is out of scope of the evaluation because it is not enterprise environment, the TOE operating environment: 1
    • out of scope: 1
pdf_data/report_metadata
  • /Author: Bundesamt für Sicherheit in der Informationstechnik
  • /CreationDate: D:20090512082323+02'00'
  • /Creator: Writer
  • /Keywords: "IBM Tivoli Directory Server Version 6.2, IBM Corporation, BSI-DSZ-CC-0535-2009, Common Criteria, Certification, Zertifizierung"
  • /ModDate: D:20090513082602+02'00'
  • /Producer: StarOffice 9
  • /Subject: Common Criteria Certification
  • /Title: Certification Report BSI-DSZ-CC-0535-2009
  • pdf_file_size_bytes: 380147
  • pdf_hyperlinks: http://www.bsi.bund.de/
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 34
  • /Author: KYH
  • /CreationDate: D:20071203103449+09'00'
  • /Creator: PScript5.dll Version 5.2.2
  • /ModDate: D:20071203103449+09'00'
  • /Producer: Acrobat Distiller 7.0.5 (Windows)
  • /Title: ISIS-73-EN.hwp
  • pdf_file_size_bytes: 330437
  • pdf_hyperlinks: {}
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 26
pdf_data/st_filename 0535B.pdf ISIS-73-ST-EN.pdf
pdf_data/st_keywords/cc_security_level
  • EAL:
    • EAL 4: 9
    • EAL 4 augmented: 3
  • EAL:
    • EAL4: 6
pdf_data/st_keywords/cc_sar
  • ACM:
    • ACM_AUT.1: 2
    • ACM_CAP.4: 1
    • ACM_SCP.2: 2
  • ADO:
    • ADO_DEL.2: 2
    • ADO_IGS.1: 1
  • ADV:
    • ADV_FSP.2: 2
    • ADV_HLD.2: 1
    • ADV_IMP.1: 2
    • ADV_LLD.1: 1
    • ADV_RCR.1: 2
    • ADV_SPM.1: 1
  • AGD:
    • AGD_ADM.1: 1
    • AGD_SPM.1: 1
    • AGD_USR.1: 2
  • ALC:
    • ALC_DVS.1: 2
    • ALC_FLR.1: 10
    • ALC_LCD.1: 2
    • ALC_TAT.1: 1
  • ATE:
    • ATE_COV.2: 2
    • ATE_DPT.1: 1
    • ATE_FUN.1: 2
    • ATE_IND.2: 1
  • AVA:
    • AVA_MSU.1: 1
    • AVA_MSU.2: 1
    • AVA_SOF.1: 1
    • AVA_VLA.1: 1
    • AVA_VLA.2: 1
  • ACM:
    • ACM_AUT.1: 2
    • ACM_CAP.4: 2
    • ACM_SCP.2: 3
  • ADO:
    • ADO_DEL.2: 2
    • ADO_IGS.1: 2
  • ADV:
    • ADV_FSP.2: 2
    • ADV_HLD.2: 2
    • ADV_IMP.1: 2
    • ADV_LLD.1: 2
    • ADV_RCR.1: 2
    • ADV_SPM.1: 2
  • AGD:
    • AGD_ADM.1: 3
    • AGD_USR.1: 2
  • ALC:
    • ALC_DVS.1: 2
    • ALC_LCD.1: 2
    • ALC_TAT.1: 2
  • ATE:
    • ATE_COV.2: 2
    • ATE_DPT.1: 3
    • ATE_FUN.1: 2
    • ATE_IND.2: 3
  • AVA:
    • AVA_MSU.2: 4
    • AVA_SOF.1: 2
    • AVA_VLA.2: 3
pdf_data/st_keywords/cc_sfr
  • FAU:
    • FAU_GEN.1: 17
    • FAU_GEN.1.1: 1
    • FAU_GEN.1.2: 1
    • FAU_GEN.2: 12
    • FAU_GEN.2.1: 1
    • FAU_SAR.1: 12
    • FAU_SAR.1.1: 1
    • FAU_SAR.1.2: 1
    • FAU_SAR.2: 10
    • FAU_SAR.2.1: 1
    • FAU_STG.1: 8
    • FAU_STG.1.1: 1
    • FAU_STG.1.2: 1
  • FCS:
    • FCS_CKM.1: 3
    • FCS_CKM.4: 3
    • FCS_COP: 28
    • FCS_COP.1.1: 2
  • FDP:
    • FDP_ACC.1: 3
    • FDP_ACC.2: 13
    • FDP_ACC.2.1: 1
    • FDP_ACC.2.2: 1
    • FDP_ACF.1: 16
    • FDP_ACF.1.1: 1
    • FDP_ACF.1.2: 3
    • FDP_ACF.1.3: 1
    • FDP_ACF.1.4: 1
    • FDP_IFC.1: 2
    • FDP_ITC.1: 2
    • FDP_ITC.2: 2
  • FIA:
    • FIA_AFL: 23
    • FIA_AFL.1: 1
    • FIA_AFL.1.1: 2
    • FIA_AFL.1.2: 2
    • FIA_ATD.1: 12
    • FIA_ATD.1.1: 1
    • FIA_SOS: 28
    • FIA_SOS.1: 3
    • FIA_SOS.1.1: 2
    • FIA_UAU.1: 18
    • FIA_UAU.1.1: 1
    • FIA_UAU.1.2: 1
    • FIA_UID.1: 13
    • FIA_UID.1.1: 1
    • FIA_UID.1.2: 1
  • FMT:
    • FMT_MOF: 26
    • FMT_MOF.1: 1
    • FMT_MOF.1.1: 2
    • FMT_MSA.1: 17
    • FMT_MSA.1.1: 1
    • FMT_MSA.2: 14
    • FMT_MSA.2.1: 1
    • FMT_MSA.3: 10
    • FMT_MSA.3.1: 1
    • FMT_MSA.3.2: 1
    • FMT_MTD.1: 10
    • FMT_MTD.1.1: 1
    • FMT_SMF.1: 16
    • FMT_SMF.1.1: 1
    • FMT_SMR.1: 20
    • FMT_SMR.1.1: 1
    • FMT_SMR.1.2: 1
  • FPT:
    • FPT_RVM.1: 10
    • FPT_RVM.1.1: 1
    • FPT_STM.1: 17
    • FPT_STM.1.1: 1
  • FAU:
    • FAU_APR.1: 2
    • FAU_ARP.1: 10
    • FAU_ARP.1.1: 1
    • FAU_GEN.1: 17
    • FAU_GEN.1.1: 1
    • FAU_GEN.1.2: 1
    • FAU_GEN.2: 9
    • FAU_GEN.2.1: 1
    • FAU_SAA.1: 13
    • FAU_SAA.1.1: 1
    • FAU_SAA.1.2: 1
    • FAU_SAR.1: 20
    • FAU_SAR.1.1: 2
    • FAU_SAR.1.2: 2
    • FAU_SAR.2: 12
    • FAU_SAR.2.1: 1
    • FAU_SAR.3: 13
    • FAU_SAR.3.1: 2
    • FAU_SSA.1: 1
    • FAU_STG.1: 6
    • FAU_STG.1.1: 1
    • FAU_STG.1.2: 1
    • FAU_STG.3: 1
    • FAU_STG.4: 11
    • FAU_STG.4.1: 1
  • FDP:
    • FDP_ACF: 4
    • FDP_IFC: 4
  • FIA:
    • FIA_AFL.1: 10
    • FIA_AFL.1.1: 1
    • FIA_AFL.1.2: 1
    • FIA_SOS.1: 10
    • FIA_SOS.1.1: 1
    • FIA_UAU.1: 6
    • FIA_UAU.2: 16
    • FIA_UAU.2.1: 2
    • FIA_UAU.6: 14
    • FIA_UAU.6.1: 2
    • FIA_UID.1: 8
    • FIA_UID.2: 18
    • FIA_UID.2.1: 2
  • FMT:
    • FMT_MOF.1: 27
    • FMT_MOF.1.1: 1
    • FMT_MTD.1: 32
    • FMT_MTD.1.1: 1
    • FMT_MTD.2: 12
    • FMT_MTD.2.1: 1
    • FMT_MTD.2.2: 1
    • FMT_SMF.1: 31
    • FMT_SMF.1.1: 1
    • FMT_SMR.1: 27
    • FMT_SMR.1.1: 1
    • FMT_SMR.1.2: 1
  • FPT:
    • FPT_AMT.1: 10
    • FPT_AMT.1.1: 1
    • FPT_ITI.1: 10
    • FPT_ITI.1.1: 1
    • FPT_ITI.1.2: 1
    • FPT_ITT.1: 16
    • FPT_ITT.1.1: 2
    • FPT_SSL.3: 1
    • FPT_STM.1: 7
    • FPT_STM.1.1: 1
    • FPT_TST.1: 13
    • FPT_TST.1.1: 1
    • FPT_TST.1.2: 1
    • FPT_TST.1.3: 1
  • FTA:
    • FTA_SSL.1: 5
    • FTA_SSL.1.1: 1
    • FTA_SSL.1.2: 1
    • FTA_SSL.3: 15
    • FTA_SSL.3.1: 1
    • FTA_SSL.4: 14
    • FTA_SSL.4.1: 1
pdf_data/st_keywords/cc_claims
  • A:
    • A.ADMIN: 2
    • A.COMM: 2
    • A.COOP: 3
    • A.ENCRYPT: 3
    • A.PHYSICAL: 3
    • A.ROUTE: 2
    • A.TIME: 3
    • A.TOEENV: 3
  • O:
    • O.ACCOUNT: 6
    • O.AUTHENTICATE: 7
    • O.AUTHORIZE: 7
    • O.BYPASS: 4
  • OE:
    • OE.BACKUP: 4
    • OE.COMMUNICATION: 8
    • OE.DATABASE: 7
    • OE.ENCRYPT: 6
    • OE.ENVMANAGE: 6
    • OE.MANAGE: 9
    • OE.PHYSICAL: 8
    • OE.ROUTE: 4
    • OE.SOPHISTICATED: 6
    • OE.TIME: 8
  • T:
    • T.ACCESS: 2
    • T.ACCOUNT: 3
    • T.BYPASS: 2
    • T.ENTRY: 3
  • A:
    • A.AVCONFLICT: 3
    • A.CERT: 3
    • A.GUARD: 3
    • A.INTERNALENTITY: 3
    • A.NO_EVIL: 3
    • A.PHISICAL: 2
    • A.SAFEITENTITY: 3
    • A.TIMESTAMP: 3
  • O:
    • O.ADMIN_ROLE: 5
    • O.ALARM: 6
    • O.AUDIT: 10
    • O.AUIDT: 2
    • O.INA: 16
    • O.MANAGE: 14
    • O.SECURE_UPDATE: 6
    • O.SELF_PROTECTION: 5
    • O.STRENGTHENOS: 5
    • O.TSFDATA_PROTECT: 8
    • O.VIRUS: 10
  • OE:
    • OE.AUDIT_SEARCH: 5
    • OE.AUDIT_STORAGE: 7
    • OE.AVCONFLICT: 3
    • OE.CERT: 3
    • OE.DOM_SEPARATION: 5
    • OE.GAURD: 1
    • OE.GUARD: 2
    • OE.INTERNALENTITY: 3
    • OE.NO_BYPASS: 5
    • OE.NO_EVIL: 3
    • OE.PHISICAL: 2
    • OE.PHYSICAL: 1
    • OE.RESIDUAL_INFO: 2
    • OE.SAFEITENTITY: 4
    • OE.TIMESTAMP: 7
    • OE.TOE_ACCESS: 13
  • T:
    • T.AUDIT_COMPROMISE: 8
    • T.DOWN_INTERFERENCE: 3
    • T.MASQUERADE: 5
    • T.RESIDUAL_DATA: 3
    • T.TRANS_DESTORY: 3
    • T.TSF_COMPROMISE: 9
    • T.UNATTEND_SESS: 5
    • T.UNIDENTIFIED_ACTIONS: 5
    • T.VIRUS: 4
pdf_data/st_keywords/vendor
  • Microsoft:
    • Microsoft: 1
  • Microsoft:
    • Microsoft: 21
pdf_data/st_keywords/symmetric_crypto
  • miscellaneous:
    • SEED:
      • SEED: 1
pdf_data/st_keywords/hash_function
  • MD:
    • MD5:
      • MD5: 10
  • SHA:
    • SHA1:
      • SHA-1: 10
    • SHA2:
      • SHA-224: 1
pdf_data/st_keywords/crypto_scheme
  • MAC:
    • MAC: 2
pdf_data/st_keywords/crypto_protocol
  • TLS:
    • SSL:
      • SSL: 7
    • TLS:
      • TLS: 9
pdf_data/st_keywords/randomness
  • RNG:
    • RNG: 1
pdf_data/st_keywords/cipher_mode
  • CBC:
    • CBC: 1
pdf_data/st_keywords/side_channel_analysis
  • FI:
    • malfunction: 1
pdf_data/st_keywords/tee_name
  • IBM:
    • SE: 3
pdf_data/st_keywords/standard_id
  • CC:
    • CCMB-2005-08-001: 1
    • CCMB-2005-08-002: 1
    • CCMB-2005-08-004: 1
  • FIPS:
    • FIPS 140-2: 1
    • FIPS 180-2: 1
    • FIPS 186-2: 1
    • FIPS140-2: 2
    • FIPS180-2: 2
    • FIPS186-2: 2
  • RFC:
    • RFC 1274: 1
    • RFC 1777: 3
    • RFC 1778: 1
    • RFC 1779: 1
    • RFC 1823: 1
    • RFC 2052: 1
    • RFC 2219: 1
    • RFC 2222: 1
    • RFC 2247: 1
    • RFC 2251: 2
    • RFC 2252: 1
    • RFC 2253: 1
    • RFC 2254: 1
    • RFC 2255: 1
    • RFC 2256: 1
    • RFC 2596: 1
    • RFC 2696: 1
    • RFC 2829: 1
    • RFC 2830: 1
    • RFC 2831: 2
    • RFC 2849: 1
    • RFC 2891: 1
    • RFC1274: 1
    • RFC1777: 1
    • RFC1778: 1
    • RFC1779: 1
    • RFC1823: 1
    • RFC2052: 1
    • RFC2219: 1
    • RFC2222: 1
    • RFC2247: 1
    • RFC2251: 1
    • RFC2252: 1
    • RFC2253: 1
    • RFC2254: 1
    • RFC2255: 1
    • RFC2256: 1
    • RFC2596: 1
    • RFC2696: 1
    • RFC2829: 1
    • RFC2830: 1
    • RFC2831: 2
    • RFC2849: 1
    • RFC2891: 1
pdf_data/st_keywords/certification_process
  • OutOfScope:
    • 98 APC uses SMS for notification on the situation that authorized administrator is set. This is out of scope because additional contract with a mobile service provider is necessary for this function. APC: 1
    • 99 APC creates reports with pre-defined formats and audit records. This function is out of scope since it is independent with generating and storing audit records. AhnLab, Korea 24/109 APC: 1
    • files for support of V3+ Neo. Since the operating system of the TOE is Windows XP, This is out of scope. 91 The following functions are out of scope for policy server. Hierarchical Domain Management : 1
    • out of scope: 6
    • system in case that the system has been registered on the APC. 101 The following functions are out of scope for policy agent. User Information Input 102 An additional feature for the Policy Agent user: 1
    • updates itself by the policy server’s command. 2.2.3 Out of Coverage 88 The following functions are out of scope of V3 Run as a Update Server 89 Without APC, V3 runs as an update server for the other V3s. V3 +: 1
pdf_data/st_metadata
  • /Author: IBM
  • /CreationDate: D:20090512084028-04'00'
  • /Creator: Acrobat PDFMaker 7.0.7 for Word
  • /Keywords: Lightweight Directory Access Protocol (LDAP), Access Control List (ACL), Password Policy (PP), Audit Service (AS), IBM Tivoli Directory Server (TDS)
  • /ModDate: D:20090513082915+02'00'
  • /Producer: Acrobat Distiller 7.0.5 (Windows)
  • /Subject: Security Target
  • /Title: IBM Tivoli Directory Server 6.2 Security Target
  • pdf_file_size_bytes: 552394
  • pdf_hyperlinks: {}
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 74
  • /Author: KYH
  • /CreationDate: D:20071203103747+09'00'
  • /Creator: PScript5.dll Version 5.2.2
  • /ModDate: D:20071203103747+09'00'
  • /Producer: Acrobat Distiller 7.0.5 (Windows)
  • /Title: Microsoft Word - ISIS-73-ST_EN.doc
  • pdf_file_size_bytes: 796288
  • pdf_hyperlinks: {}
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 109
state/report/pdf_hash Different Different
state/report/txt_hash Different Different
state/st/pdf_hash Different Different
state/st/txt_hash Different Different