| name |
CA Directory r8.1 0608 (build 942) |
Citrix XenDesktop Version 5.6 Platinum Edition |
| category |
Network and Network-Related Devices and Systems |
Access Control Devices and Systems |
| scheme |
US |
UK |
| status |
archived |
archived |
| not_valid_after |
06.09.2012 |
05.01.2016 |
| not_valid_before |
30.04.2007 |
30.11.2012 |
| cert_link |
None |
None |
| report_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/st_vid3022-vr.pdf |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/CRP271%20v1.0%20for%20Citrix%20XenDesktop%205.6.pdf |
| st_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/st_vid3022-st.pdf |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/ST271%20v1-1%20for%20Citrix%20XenDesktop%205.6.pdf |
| manufacturer |
CA Technologies |
Citrix Systems, Inc. |
| manufacturer_web |
https://www.ca.com |
https://www.citrix.com |
| security_level |
EAL3 |
EAL2+, ALC_FLR.2 |
| dgst |
2be2ede185c90a0b |
b2f82e211fa2ac3f |
| heuristics/cert_id |
CCEVS-VR-0040-2007 |
CRP271 |
| heuristics/cert_lab |
US |
[] |
| heuristics/cpe_matches |
{} |
cpe:2.3:a:citrix:xendesktop:5.6:*:*:*:*:*:*:* |
| heuristics/verified_cpe_matches |
{} |
{} |
| heuristics/related_cves |
{} |
CVE-2016-6493, CVE-2012-6314, CVE-2014-4700 |
| heuristics/direct_transitive_cves |
{} |
CVE-2014-4700, CVE-2016-6493, CVE-2016-4810 |
| heuristics/indirect_transitive_cves |
{} |
CVE-2014-4700, CVE-2016-6493, CVE-2016-4810 |
| heuristics/extracted_sars |
AVA_VLA.1, AVA_MSU.1, AGD_ADM.1, ALC_DVS.1, ATE_IND.2, ADV_RCR.1, ATE_DPT.1, AVA_SOF.1, ADV_HLD.2, AGD_USR.1, ATE_COV.2, ATE_FUN.1, ADV_FSP.1 |
ASE_CCL.1, ATE_FUN.1, ASE_OBJ.2, ALC_CMS.2, ASE_INT.1, ASE_REQ.2, AGD_PRE.1, ATE_IND.2, ASE_ECD.1, AVA_VAN.2, ADV_TDS.1, ALC_FLR.2, ASE_SPD.1, ALC_CMC.2, ADV_FSP.2, ATE_COV.1, AGD_OPE.1, ALC_DEL.1, ASE_TSS.1, ADV_ARC.1 |
| heuristics/extracted_versions |
8.1 |
5.6 |
| heuristics/prev_certificates |
{} |
{} |
| heuristics/next_certificates |
{} |
{} |
| heuristics/report_references/directly_referenced_by |
{} |
CRP281 |
| heuristics/report_references/directly_referencing |
{} |
CRP256 |
| heuristics/report_references/indirectly_referenced_by |
{} |
CRP282, CRP281 |
| heuristics/report_references/indirectly_referencing |
{} |
CRP256 |
| heuristics/scheme_data |
- api_url: https://www.niap-ccevs.org/api/project/product/pcl_products/3022/
- categories: ['Network Access Control']
- category: Network Access Control
- certification_date: 30.04.2007
- evaluation_facility: CygnaCom Solutions, Inc
- expiration_date:
- id: CCEVS-VR-VID3022
- product: CA Directory r8.1 0608 (build 942)
- scheme: US
- url: https://www.niap-ccevs.org/products/3022
- vendor: CA Technologies
|
|
| heuristics/st_references/directly_referenced_by |
{} |
{} |
| heuristics/st_references/directly_referencing |
{} |
{} |
| heuristics/st_references/indirectly_referenced_by |
{} |
{} |
| heuristics/st_references/indirectly_referencing |
{} |
{} |
| heuristics/protection_profiles |
{} |
{} |
| maintenance_updates |
|
|
| protection_profiles |
|
|
| protection_profile_links |
{} |
{} |
| pdf_data/cert_filename |
None |
None |
| pdf_data/cert_frontpage |
|
|
| pdf_data/cert_keywords/cc_cert_id |
|
|
| pdf_data/cert_keywords/cc_protection_profile_id |
|
|
| pdf_data/cert_keywords/cc_security_level |
|
|
| pdf_data/cert_keywords/cc_sar |
|
|
| pdf_data/cert_keywords/cc_sfr |
|
|
| pdf_data/cert_keywords/cc_claims |
|
|
| pdf_data/cert_keywords/vendor |
|
|
| pdf_data/cert_keywords/eval_facility |
|
|
| pdf_data/cert_keywords/symmetric_crypto |
|
|
| pdf_data/cert_keywords/asymmetric_crypto |
|
|
| pdf_data/cert_keywords/pq_crypto |
|
|
| pdf_data/cert_keywords/hash_function |
|
|
| pdf_data/cert_keywords/crypto_scheme |
|
|
| pdf_data/cert_keywords/crypto_protocol |
|
|
| pdf_data/cert_keywords/randomness |
|
|
| pdf_data/cert_keywords/cipher_mode |
|
|
| pdf_data/cert_keywords/ecc_curve |
|
|
| pdf_data/cert_keywords/crypto_engine |
|
|
| pdf_data/cert_keywords/tls_cipher_suite |
|
|
| pdf_data/cert_keywords/crypto_library |
|
|
| pdf_data/cert_keywords/vulnerability |
|
|
| pdf_data/cert_keywords/side_channel_analysis |
|
|
| pdf_data/cert_keywords/technical_report_id |
|
|
| pdf_data/cert_keywords/device_model |
|
|
| pdf_data/cert_keywords/tee_name |
|
|
| pdf_data/cert_keywords/os_name |
|
|
| pdf_data/cert_keywords/cplc_data |
|
|
| pdf_data/cert_keywords/ic_data_group |
|
|
| pdf_data/cert_keywords/standard_id |
|
|
| pdf_data/cert_keywords/javacard_version |
|
|
| pdf_data/cert_keywords/javacard_api_const |
|
|
| pdf_data/cert_keywords/javacard_packages |
|
|
| pdf_data/cert_keywords/certification_process |
|
|
| pdf_data/cert_metadata |
|
|
| pdf_data/report_filename |
st_vid3022-vr.pdf |
CRP271 v1.0 for Citrix XenDesktop 5.6.pdf |
| pdf_data/report_frontpage |
- US:
- cert_id: CCEVS-VR-07-0040
- cert_item: CA Directory, r8.1 0608 (build 942) for the Sun Solaris Platform
- cert_lab: US NIAP
|
|
| pdf_data/report_keywords/cc_cert_id |
- US:
- CCEVS-VR-06-3022: 23
- CCEVS-VR-07-0040: 1
|
|
| pdf_data/report_keywords/cc_protection_profile_id |
|
|
| pdf_data/report_keywords/cc_security_level |
|
- EAL:
- EAL2: 3
- EAL2 augmented: 1
|
| pdf_data/report_keywords/cc_sar |
- ACM:
- ACM_CAP.3: 1
- ACM_SCP.1: 1
- ADO:
- ADO_DEL.1: 2
- ADO_IGS.1: 3
- ADV:
- ADV_FSP.1: 1
- ADV_HLD.2: 1
- ADV_RCR.1: 1
- AGD:
- AGD_ADM.1: 2
- AGD_USR.1: 2
- ALC:
- ATE:
- ATE_COV: 1
- ATE_COV.2: 2
- ATE_DPT: 1
- ATE_DPT.1: 1
- ATE_FUN: 1
- ATE_FUN.1: 1
- ATE_IND.2: 3
- AVA:
- AVA_MSU.1: 1
- AVA_SOF.1: 1
- AVA_VLA.1: 2
|
|
| pdf_data/report_keywords/cc_sfr |
- FAU:
- FAU_SAR.1: 1
- FAU_SEL.1: 1
- FDP:
- FDP_ACC.1: 1
- FDP_ACF.1: 1
- FIA:
- FIA_AFL.1: 3
- FIA_ATD.1: 1
- FIA_SOS.1: 2
- FIA_UAU: 3
- FIA_UAU.1: 1
- FIA_UAU.2: 1
- FIA_UID.1: 1
- FIA_UID.2: 1
- FMT:
- FMT_MSA: 2
- FMT_MTD: 2
- FMT_SMF.1: 1
- FMT_SMR.1: 1
- FPT:
|
|
| pdf_data/report_keywords/cc_claims |
|
|
| pdf_data/report_keywords/vendor |
|
|
| pdf_data/report_keywords/eval_facility |
|
|
| pdf_data/report_keywords/symmetric_crypto |
|
|
| pdf_data/report_keywords/asymmetric_crypto |
|
|
| pdf_data/report_keywords/pq_crypto |
|
|
| pdf_data/report_keywords/hash_function |
|
|
| pdf_data/report_keywords/crypto_scheme |
|
|
| pdf_data/report_keywords/crypto_protocol |
|
|
| pdf_data/report_keywords/randomness |
|
|
| pdf_data/report_keywords/cipher_mode |
|
|
| pdf_data/report_keywords/ecc_curve |
|
|
| pdf_data/report_keywords/crypto_engine |
|
|
| pdf_data/report_keywords/tls_cipher_suite |
|
|
| pdf_data/report_keywords/crypto_library |
|
|
| pdf_data/report_keywords/vulnerability |
- CVE:
- CVE-2004-0079: 1
- CVE-2005-3653: 1
|
|
| pdf_data/report_keywords/side_channel_analysis |
|
|
| pdf_data/report_keywords/technical_report_id |
|
|
| pdf_data/report_keywords/device_model |
|
|
| pdf_data/report_keywords/tee_name |
|
|
| pdf_data/report_keywords/os_name |
|
|
| pdf_data/report_keywords/cplc_data |
|
|
| pdf_data/report_keywords/ic_data_group |
|
|
| pdf_data/report_keywords/standard_id |
|
- CC:
- CCMB-2009-07-001: 1
- CCMB-2009-07-002: 1
- CCMB-2009-07-003: 1
- CCMB-2009-07-004: 1
|
| pdf_data/report_keywords/javacard_version |
|
|
| pdf_data/report_keywords/javacard_api_const |
|
|
| pdf_data/report_keywords/javacard_packages |
|
|
| pdf_data/report_keywords/certification_process |
- OutOfScope:
- Only - Out of Scope DXconsole DUA/LDUA The system configuration consists of two Sun SPARC Solaris 9 machines. On one: 1
- Out of Scope: 3
- and Software is Out of Scope DXconsole SSLD Ingres db DUA/LDUA Figure 3. TOE’s physical scope by product components used 16 CA: 1
- before use. RPC DSA RPB DSA RPA DSA DXserver DUA/LDUA TOE machine Remote Machine and Software is Out of Scope DXconsole SSLD Ingres db DUA/LDUA RPC DSA RPB DSA RPA DSA DXserver DUA/LDUA TOE machine Remote: 1
- iGateway affects the DXmanager module of eTrust Directory 8.1. DXmanager is not installed and out of scope for the evaluation. Also applies to the HTTP interface which is not an interface to the TOE. •: 1
- in scope) and the SSLD (out of scope) though not depicted: 1
- of the evaluation. Therefore, the cryptographic algorithms performed within the SSLD component are out of scope and not verified by this evaluation. Aspects of the following security functions are controlled : 1
- out of scope: 3
- used for the Developers Testing. The TOE DSA box includes the Ingres db (in scope) and the SSLD (out of scope) though not depicted. RPC DSA RPB DSA RPA DSA TOE DSA DUA/LDUA TOE machine Remote Machine For Test: 1
|
|
| pdf_data/report_metadata |
- /Author: wshanahan
- /CreationDate: D:20070717085537-04'00'
- /Creator: Acrobat PDFMaker 7.0 for Word
- /ModDate: D:20070717085839-04'00'
- /Producer: Acrobat Distiller 7.0 (Windows)
- /SourceModified: D:20070717125458
- /Title: National Information Assurance Partnership
- pdf_file_size_bytes: 184938
- pdf_hyperlinks: http://www.cygnacom.com/
- pdf_is_encrypted: False
- pdf_number_of_pages: 23
|
|
| pdf_data/st_filename |
st_vid3022-st.pdf |
ST271 v1-1 for Citrix XenDesktop 5.6.pdf |
| pdf_data/st_frontpage |
|
|
| pdf_data/st_keywords/cc_cert_id |
|
|
| pdf_data/st_keywords/cc_protection_profile_id |
|
|
| pdf_data/st_keywords/cc_security_level |
|
- EAL:
- EAL2: 5
- EAL2 augmented: 2
|
| pdf_data/st_keywords/cc_sar |
- ACM:
- ACM_CAP.3: 3
- ACM_SCP.1: 3
- ADO:
- ADO_DEL.1: 3
- ADO_IGS.1: 3
- ADV:
- ADV_FSP.1: 3
- ADV_HLD.2: 3
- ADV_RCR.1: 3
- AGD:
- AGD_ADM.1: 3
- AGD_USR.1: 3
- ALC:
- ATE:
- ATE_COV.2: 3
- ATE_DPT.1: 3
- ATE_FUN.1: 3
- ATE_IND.2: 3
- AVA:
- AVA_MSU.1: 3
- AVA_SOF.1: 3
- AVA_VLA.1: 4
|
- ADV:
- ADV_ARC.1: 1
- ADV_FSP.2: 1
- ADV_TDS.1: 1
- AGD:
- AGD_OPE.1: 1
- AGD_PRE.1: 1
- ALC:
- ALC_CMC.2: 1
- ALC_CMS.2: 1
- ALC_DEL.1: 1
- ALC_FLR.2: 5
- ASE:
- ASE_CCL.1: 1
- ASE_ECD.1: 1
- ASE_INT.1: 1
- ASE_OBJ.2: 1
- ASE_REQ.2: 1
- ASE_SPD.1: 1
- ASE_TSS.1: 1
- ATE:
- ATE_COV.1: 1
- ATE_FUN.1: 1
- ATE_IND.2: 1
- AVA:
|
| pdf_data/st_keywords/cc_sfr |
- FAU:
- FAU_GEN.1: 17
- FAU_GEN.1.1: 1
- FAU_GEN.1.2: 1
- FAU_SAR.1: 11
- FAU_SAR.1.1: 1
- FAU_SAR.1.2: 1
- FAU_SEL.1: 17
- FAU_SEL.1.1: 1
- FDP:
- FDP_ACC.1: 16
- FDP_ACC.1.1: 1
- FDP_ACF.1: 15
- FDP_ACF.1.1: 4
- FDP_ACF.1.2: 7
- FDP_ACF.1.3: 1
- FDP_ACF.1.4: 1
- FIA:
- FIA_AFL.1: 16
- FIA_AFL.1.1: 1
- FIA_AFL.1.2: 1
- FIA_ATD.1: 13
- FIA_ATD.1.1: 1
- FIA_SOS.1: 16
- FIA_SOS.1.1: 1
- FIA_UAU: 25
- FIA_UAU.1: 17
- FIA_UAU.1.1: 1
- FIA_UAU.1.2: 1
- FIA_UAU.2: 9
- FIA_UAU.2.1: 1
- FIA_UAU.5: 3
- FIA_UAU.5.1: 1
- FIA_UID.1: 19
- FIA_UID.1.1: 1
- FIA_UID.1.2: 1
- FIA_UID.2: 8
- FIA_UID.2.1: 1
- FMT:
- FMT_MSA: 34
- FMT_MSA.1: 2
- FMT_MSA.3: 2
- FMT_MTD: 45
- FMT_MTD.1: 2
- FMT_SMF.1: 16
- FMT_SMF.1.1: 1
- FMT_SMR.1: 19
- FMT_SMR.1.1: 1
- FMT_SMR.1.2: 1
- FPT:
- FPT_RVM: 1
- FPT_RVM.1: 5
- FPT_RVM_EXP: 1
- FPT_SEP: 1
- FPT_SEP.1: 5
- FPT_STM.1: 11
- FPT_STM.1.1: 1
- FTP:
- FTP_ITC: 1
- FTP_ITC.1: 3
- FTP_ITC_EXP.1: 2
|
- FCO:
- FCO_SCO: 38
- FCO_SCO.1: 21
- FCO_SCO.1.1: 1
- FCO_SCO.1.2: 1
- FCO_SCO.1.3: 2
- FCO_SCO.1.4: 1
- FCS:
- FCS_ECA: 18
- FCS_ECA.1: 7
- FCS_ECA.1.1: 1
- FDP:
- FDP_ACC: 24
- FDP_ACC.1: 5
- FDP_ACF: 23
- FDP_ACF.1: 10
- FDP_IFC.1: 1
- FDP_RIP: 7
- FDP_RIP.1: 1
- FIA:
- FIA_ATD: 8
- FIA_ATD.1: 1
- FIA_UAU: 8
- FIA_UAU.2: 1
- FIA_UID: 10
- FIA_UID.1: 2
- FIA_UID.2: 1
- FMT:
- FMT_MOF: 10
- FMT_MOF.1: 1
- FMT_MSA: 35
- FMT_MSA.1: 3
- FMT_MSA.3: 6
- FMT_SMF: 17
- FMT_SMF.1: 4
- FMT_SMR: 18
- FMT_SMR.1: 6
|
| pdf_data/st_keywords/cc_claims |
- A:
- A.DIRECTORY_SYSTEM: 1
- A.DIRECTORY_SYSTEM_SECURITY_: 1
- A.DIRECTORY_SYSTEM_SECURITY_POLI: 1
- A.DIRECTORY_SYSTEM_SECURITY_POLICY_: 1
- A.INTEROP: 2
- A.NO_EVIL: 2
- A.NO_GENERAL_PURPOSE: 2
- A.PHYSICAL: 3
- A.REMOTE_ADMIN_DUA_: 1
- A.REMOTE_ADMIN_DUA_ENVIRONMENT: 2
- A.USERS: 2
- D:
- O:
- O.AUDIT: 6
- O.MANAGE: 9
- O.MEDIATE: 7
- O.PARTIAL_SELF_: 1
- O.PARTIAL_SELF_PROTECTION: 3
- O.PARTIAL_TRUSTEDCOMM: 6
- O.TOE_ACCESS: 4
- OE:
- OE.AUDIT_ACCESS: 7
- OE.DISTRIBUTED_AUTHENTICA: 1
- OE.DISTRIBUTED_AUTHENTICATION: 4
- OE.PARTIAL_SELF_: 1
- OE.PARTIAL_SELF_PROTECTION: 2
- OE.PARTIAL_TRUSTEDCOMM: 7
- OE.TIME: 6
- T:
- T.MASQUERADE: 4
- T.TSF_COMPROMISE: 6
- T.UNAUTHORIZED_ACCESS: 3
- T.UNIDENTIFIED_ACTIONS: 3
|
|
| pdf_data/st_keywords/vendor |
|
|
| pdf_data/st_keywords/eval_facility |
|
|
| pdf_data/st_keywords/symmetric_crypto |
|
|
| pdf_data/st_keywords/asymmetric_crypto |
|
|
| pdf_data/st_keywords/pq_crypto |
|
|
| pdf_data/st_keywords/hash_function |
|
|
| pdf_data/st_keywords/crypto_scheme |
|
|
| pdf_data/st_keywords/crypto_protocol |
|
|
| pdf_data/st_keywords/randomness |
|
|
| pdf_data/st_keywords/cipher_mode |
|
|
| pdf_data/st_keywords/ecc_curve |
|
|
| pdf_data/st_keywords/crypto_engine |
|
|
| pdf_data/st_keywords/tls_cipher_suite |
|
- TLS:
- TLS_RSA_WITH_AES_128_CBC_SHA: 3
|
| pdf_data/st_keywords/crypto_library |
|
|
| pdf_data/st_keywords/vulnerability |
|
|
| pdf_data/st_keywords/side_channel_analysis |
|
|
| pdf_data/st_keywords/technical_report_id |
|
|
| pdf_data/st_keywords/device_model |
|
|
| pdf_data/st_keywords/tee_name |
|
|
| pdf_data/st_keywords/os_name |
|
|
| pdf_data/st_keywords/cplc_data |
|
|
| pdf_data/st_keywords/ic_data_group |
|
|
| pdf_data/st_keywords/standard_id |
|
- CC:
- CCMB-2009-07-001: 1
- CCMB-2009-07-002: 1
- CCMB-2009-07-003: 1
- CCMB-2009-07-004: 1
- FIPS:
- FIPS 140: 2
- FIPS 140-2: 9
- FIPS PUB 140-2: 1
- FIPS140-2: 10
- RFC:
- RFC 2246: 2
- RFC 3602: 1
- RFC 5246: 1
|
| pdf_data/st_keywords/javacard_version |
|
|
| pdf_data/st_keywords/javacard_api_const |
|
|
| pdf_data/st_keywords/javacard_packages |
|
|
| pdf_data/st_keywords/certification_process |
|
- OutOfScope:
- 18 1.4.3 Summary of items out of scope of the TOE : 2
- Ver 1-1 SPB 16 November 2012 Page 19 of 54 Figure 4: Logical boundaries 1.4.3 Summary of items out of scope of the TOE The items out of scope of the TOE include the Microsoft components with which Citrix: 1
- integrates, as detailed in section 1.2.3. Also out of scope of the TOE are the following Citrix components which are included in XenDesktop Platinum Edition: : 1
- out of scope: 4
|
| pdf_data/st_metadata |
- /Author: krogers
- /Company: CygnaCom Solutions, Inc.
- /CreationDate: D:20070717085137-04'00'
- /Creator: Acrobat PDFMaker 7.0 for Word
- /ModDate: D:20070717085341-04'00'
- /Producer: Acrobat Distiller 7.0 (Windows)
- /SourceModified: D:20070711135902
- /Title: APPENDIX E (CERTIFICATE POLICY TAXONOMY)
- pdf_file_size_bytes: 620673
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 86
|
- /Author: Peter Buck
- /CreationDate: D:20121120101708+00'00'
- /Creator: Microsoft® Word 2010
- /ModDate: D:20121120101708+00'00'
- /Producer: Microsoft® Word 2010
- pdf_file_size_bytes: 1375510
- pdf_hyperlinks: http://www.commoncriteriaportal.org/
- pdf_is_encrypted: False
- pdf_number_of_pages: 54
|
| state/cert/convert_garbage |
None |
None |
| state/cert/convert_ok |
False |
False |
| state/cert/download_ok |
False |
False |
| state/cert/extract_ok |
False |
False |
| state/cert/pdf_hash |
Equal |
Equal |
| state/cert/txt_hash |
Equal |
Equal |
| state/report/convert_garbage |
None |
None |
| state/report/convert_ok |
True |
True |
| state/report/download_ok |
True |
True |
| state/report/extract_ok |
True |
True |
| state/report/pdf_hash |
Different |
Different |
| state/report/txt_hash |
Different |
Different |
| state/st/convert_garbage |
None |
None |
| state/st/convert_ok |
True |
True |
| state/st/download_ok |
True |
True |
| state/st/extract_ok |
True |
True |
| state/st/pdf_hash |
Different |
Different |
| state/st/txt_hash |
Different |
Different |