Comparing certificates Experimental feature

You are comparing two certificates. By default, only differing attributes are shown. Use the button below to show/hide all attributes.

Showing only differing attributes.
CA ACF2 r16
CCEVS-VR-VID-10811-2017
HP XP7 Device Manager Software, HP XP7 Tiered Storage Manager Software 8.0.1-02
JISEC-CC-CRP-C0567
name CA ACF2 r16 HP XP7 Device Manager Software, HP XP7 Tiered Storage Manager Software 8.0.1-02
category Other Devices and Systems Access Control Devices and Systems
scheme US JP
not_valid_after 01.09.2019 31.07.2022
not_valid_before 01.09.2017 31.07.2017
cert_link https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/st_vid10811-ci.pdf https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/c0567_eimg.pdf
report_link https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/st_vid10811-vr.pdf https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/c0567_erpt.pdf
st_link https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/st_vid10811-st.pdf https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/c0567_est.pdf
manufacturer CA Technologies Hewlett Packard Enterprise Company
manufacturer_web https://www.ca.com https://www.hpe.co
security_level {} EAL2+, ALC_FLR.1
dgst 61c9cd7cd4d905c5 4f2b047db22622a3
heuristics/cert_id CCEVS-VR-VID-10811-2017 JISEC-CC-CRP-C0567
heuristics/cert_lab US []
heuristics/extracted_sars ADV_FSP.1, ALC_CMC.1, AVA_VAN.1, ATE_IND.1, ALC_CMS.1, AGD_OPE.1, AGD_PRE.1 ASE_INT.1, AVA_VAN.2, ADV_FSP.2, ASE_ECD.1, ALC_FLR.1, ASE_TSS.1, ASE_SPD.1, ALC_DEL.1, AGD_OPE.1, AGD_PRE.1, ALC_CMS.2, ADV_TDS.1, ATE_FUN.1, ATE_COV.1, ADV_ARC.1, ASE_OBJ.2, ASE_REQ.2, ALC_CMC.2, ATE_IND.2, ASE_CCL.1
heuristics/extracted_versions - 8.0.1
heuristics/scheme_data
  • category: Enterprise Security Management
  • certification_date: 18.08.2017
  • evaluation_facility: Booz Allen Hamilton Common Criteria Testing Laboratory
  • expiration_date: 18.08.2019
  • id: CCEVS-VR-VID10811
  • product: CA ACF2 r16
  • scheme: US
  • url: https://www.niap-ccevs.org/product/10811
  • vendor: CA Technologies
  • cert_id: JISEC-CC-CRP-C0567
  • certification_date: 01.07.2017
  • claim: EAL2+ALC_FLR.1
  • enhanced:
    • assurance_level: EAL2 Augmented with ALC_FLR.1
    • cc_version: 3.1 Release4
    • cert_link: https://www.ipa.go.jp/en/security/c0567_eimg.pdf
    • description: PRODUCT DESCRIPTION Description of TOE The TOE is HP XP7 Device Manager software and HP XP7 Tiered Storage Manager software. The TOE has functionality to manage the input or modification of information that expresses a storage system configuration (abbreviated hereafter to storage resource information). TOE Security functions The TOE provides the following security functionality: - Identification/authentication functionality (The TOE also makes it possible to use external authentication functionality provided by external authentication servers, and to use functionality for linking with external authentication groups.) - Access control functionality for storage resource information and for warning banner information - Warning banner functionality
    • evaluation_facility: Mizuho Information & Research Institute, Inc. Information Security Evaluation Office
    • product: HP XP7 Device Manager Software, HP XP7 Tiered Storage Manager Software
    • product_type: Access Control Device and Systems
    • report_link: https://www.ipa.go.jp/en/security/c0567_erpt.pdf
    • target_link: https://www.ipa.go.jp/en/security/c0567_est.pdf
    • toe_version: 8.0.1-02
    • vendor: Hewlett Packard Enterprise Company
  • expiration_date: 01.08.2022
  • supplier: Hewlett Packard Enterprise Company
  • toe_japan_name: -----
  • toe_overseas_link: https://www.ipa.go.jp/en/security/jisec/software/certified-cert/c0567_it6602.html
  • toe_overseas_name: HP XP7 Device Manager Software, HP XP7 Tiered Storage Manager Software 8.0.1-02
heuristics/protection_profiles 292a489599472031, 64065af56aac20cf {}
protection_profile_links https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/pp_esm_ac_v2.1.pdf, https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/pp_esm_pm_v2.1.pdf {}
pdf_data/cert_filename st_vid10811-ci.pdf c0567_eimg.pdf
pdf_data/cert_keywords/cc_cert_id
  • US:
    • CCEVS-VR-VID10811-2017: 1
pdf_data/cert_keywords/cc_security_level
  • EAL:
    • EAL2: 1
pdf_data/cert_keywords/cc_sar
  • ALC:
    • ALC_FLR.1: 1
pdf_data/cert_keywords/eval_facility
  • BoozAllenHamilton:
    • Booz Allen Hamilton: 1
pdf_data/cert_metadata
  • /CreationDate: D:20170901125546-04'00'
  • /ModDate: D:20170901125657-04'00'
  • /Producer: iText 2.1.0 (by lowagie.com)
  • pdf_file_size_bytes: 178593
  • pdf_hyperlinks: {}
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 1
  • /CreationDate: D:20170822151331+09'00'
  • /Creator: Microsoft® Word 2010
  • /ModDate: D:20170822151554+09'00'
  • /Producer: Microsoft® Word 2010
  • pdf_file_size_bytes: 415350
  • pdf_hyperlinks: {}
  • pdf_is_encrypted: True
  • pdf_number_of_pages: 1
pdf_data/report_filename st_vid10811-vr.pdf c0567_erpt.pdf
pdf_data/report_frontpage
  • US:
    • cert_id: CCEVS-VR-VID10811-2017
    • cert_item: CAACF2 r16
    • cert_lab: US NIAP
  • US:
pdf_data/report_keywords/cc_cert_id
  • US:
    • CCEVS-VR-VID10811-2017: 1
  • JP:
    • CRP-C0567-01: 1
    • Certification No. C0567: 1
pdf_data/report_keywords/cc_security_level
  • EAL:
    • EAL2: 4
    • EAL2 augmented: 2
pdf_data/report_keywords/cc_sar
  • ALC:
    • ALC_CMC.1: 1
    • ALC_CMS.1: 1
  • ALC:
    • ALC_FLR.1: 4
pdf_data/report_keywords/cc_claims
  • O:
    • O.ACCESSID: 1
    • O.AUDIT: 1
    • O.AUTH: 1
    • O.CONSISTENT: 1
    • O.DATAPROT: 1
    • O.DISTRIB: 1
    • O.INTEGRITY: 2
    • O.MAINTAIN: 1
    • O.MANAGE: 1
    • O.MNGRID: 1
    • O.MONITOR: 1
    • O.OFLOWS: 1
    • O.POLICY: 1
    • O.PROTCOMMS: 1
    • O.ROBUST: 1
    • O.SELFID: 2
  • T:
    • T.ADMIN_ERROR: 1
    • T.CONTRADICT: 1
    • T.DISABLE: 1
    • T.EAVES: 1
    • T.FALSIFY: 1
    • T.FORGE: 2
    • T.MASK: 1
    • T.NOROUTE: 1
    • T.OFLOWS: 1
    • T.UNAUTH: 2
    • T.WEAKIA: 1
    • T.WEAKPOL: 1
  • A:
    • A.ADMINISTRATORS: 1
    • A.CLIENTS: 1
    • A.NETWORKS: 1
    • A.PASSWORD: 1
    • A.PHYSICAL: 2
    • A.SECURE_CHANNEL: 1
    • A.SRV_MGMT: 1
  • T:
    • T.ILLEGAL_ACCESS: 1
    • T.UNAUTHORISED_ACCESS: 1
pdf_data/report_keywords/vendor
  • Microsoft:
    • Microsoft: 1
pdf_data/report_keywords/eval_facility
  • BoozAllenHamilton:
    • Booz Allen Hamilton: 4
pdf_data/report_keywords/symmetric_crypto
  • AES_competition:
    • AES:
      • AES: 1
pdf_data/report_keywords/crypto_protocol
  • SSH:
    • SSH: 3
  • TLS:
    • SSL:
      • SSL: 2
    • TLS:
      • TLS: 2
  • SSH:
    • SSH: 1
pdf_data/report_keywords/tee_name
  • IBM:
    • SE: 3
pdf_data/report_keywords/standard_id
  • CC:
    • CCMB-2012-09-001: 2
    • CCMB-2012-09-002: 2
    • CCMB-2012-09-003: 2
    • CCMB-2012-09-004: 2
pdf_data/report_metadata
  • /CreationDate: D:20171128134651+09'00'
  • /Creator: Microsoft® Word 2010
  • /ModDate: D:20171128134827+09'00'
  • /Producer: Microsoft® Word 2010
  • pdf_file_size_bytes: 207909
  • pdf_hyperlinks: {}
  • pdf_is_encrypted: True
  • pdf_number_of_pages: 33
pdf_data/st_filename st_vid10811-st.pdf c0567_est.pdf
pdf_data/st_keywords/cc_security_level
  • EAL:
    • EAL2: 8
    • EAL2 augmented: 3
pdf_data/st_keywords/cc_sar
  • ADV:
    • ADV_FSP.1: 8
  • AGD:
    • AGD_OPE.1: 11
    • AGD_PRE.1: 3
  • ALC:
    • ALC_CMC.1: 5
    • ALC_CMS.1: 6
  • ATE:
    • ATE_IND.1: 6
  • AVA:
    • AVA_VAN.1: 7
  • ADV:
    • ADV_ARC.1: 1
    • ADV_FSP.2: 1
    • ADV_TDS.1: 1
  • AGD:
    • AGD_OPE.1: 1
    • AGD_PRE.1: 1
  • ALC:
    • ALC_CMC.2: 1
    • ALC_CMS.2: 1
    • ALC_DEL.1: 1
    • ALC_FLR.1: 7
  • ASE:
    • ASE_CCL.1: 1
    • ASE_ECD.1: 1
    • ASE_INT.1: 1
    • ASE_OBJ.2: 1
    • ASE_REQ.2: 1
    • ASE_SPD.1: 1
    • ASE_TSS.1: 1
  • ATE:
    • ATE_COV.1: 1
    • ATE_FUN.1: 1
    • ATE_IND.2: 1
  • AVA:
    • AVA_VAN.2: 1
pdf_data/st_keywords/cc_sfr
  • FAU:
    • FAU_GEN: 2
    • FAU_GEN.1: 2
    • FAU_GEN.1.1: 3
    • FAU_GEN.1.2: 1
    • FAU_SEL: 2
    • FAU_SEL.1: 4
    • FAU_SEL.1.1: 1
    • FAU_SEL_EXT: 2
    • FAU_SEL_EXT.1: 6
    • FAU_SEL_EXT.1.1: 1
    • FAU_STG: 2
    • FAU_STG.1: 2
    • FAU_STG.1.1: 1
    • FAU_STG.1.2: 1
    • FAU_STG_EXT: 2
    • FAU_STG_EXT.1: 7
    • FAU_STG_EXT.1.1: 1
    • FAU_STG_EXT.1.2: 1
    • FAU_STG_EXT.1.3: 1
  • FCO:
    • FCO_NRR: 2
    • FCO_NRR.2: 3
    • FCO_NRR.2.1: 2
    • FCO_NRR.2.2: 1
    • FCO_NRR.2.3: 1
  • FDP:
    • FDP_ACC.1: 10
    • FDP_ACC.1.1: 2
    • FDP_ACF.1: 11
    • FDP_ACF.1.1: 2
    • FDP_ACF.1.2: 2
    • FDP_ACF.1.3: 2
    • FDP_ACF.1.4: 3
  • FIA:
    • FIA_AFL: 2
    • FIA_AFL.1: 6
    • FIA_AFL.1.1: 1
    • FIA_AFL.1.2: 1
    • FIA_USB: 2
    • FIA_USB.1: 6
    • FIA_USB.1.1: 1
    • FIA_USB.1.2: 1
    • FIA_USB.1.3: 1
  • FMT:
    • FMT_MOF: 2
    • FMT_MOF.1: 12
    • FMT_MOF.1.1: 4
    • FMT_MOF_EXT: 2
    • FMT_MOF_EXT.1: 5
    • FMT_MOF_EXT.1.1: 1
    • FMT_MSA: 4
    • FMT_MSA.1: 2
    • FMT_MSA.1.1: 1
    • FMT_MSA.3: 3
    • FMT_MSA.3.1: 1
    • FMT_MSA.3.2: 1
    • FMT_MSA_EXT: 2
    • FMT_MSA_EXT.5: 5
    • FMT_MSA_EXT.5.1: 1
    • FMT_MSA_EXT.5.2: 1
    • FMT_SMF: 2
    • FMT_SMF.1: 3
    • FMT_SMF.1.1: 1
    • FMT_SMR: 2
    • FMT_SMR.1: 8
    • FMT_SMR.1.1: 1
    • FMT_SMR.1.2: 1
  • FPT:
    • FPT_APW_EXT: 2
    • FPT_APW_EXT.1: 4
    • FPT_FLS_EXT: 2
    • FPT_FLS_EXT.1: 4
    • FPT_FLS_EXT.1.1: 1
    • FPT_RPL: 2
    • FPT_RPL.1: 3
    • FPT_RPL.1.1: 1
    • FPT_RPL.1.2: 1
    • FPT_SKP_EXT: 2
    • FPT_SKP_EXT.1: 2
    • FPT_SKP_EXT.1.1: 1
  • FRU:
    • FRU_FLT: 2
    • FRU_FLT.1: 2
    • FRU_FLT.1.1: 1
  • FTA:
    • FTA_TAB.1: 4
    • FTA_TSE: 2
    • FTA_TSE.1: 4
    • FTA_TSE.1.1: 1
  • FTP:
    • FTP_ITC: 2
    • FTP_ITC.1: 7
    • FTP_ITC.1.1: 1
    • FTP_ITC.1.2: 1
    • FTP_ITC.1.3: 1
    • FTP_TRP: 2
    • FTP_TRP.1: 6
    • FTP_TRP.1.1: 1
    • FTP_TRP.1.2: 1
    • FTP_TRP.1.3: 1
  • FDP:
    • FDP_ACC: 1
    • FDP_ACC.1: 13
    • FDP_ACC.1.1: 1
    • FDP_ACF: 1
    • FDP_ACF.1: 10
    • FDP_ACF.1.1: 1
    • FDP_ACF.1.2: 1
    • FDP_ACF.1.3: 1
    • FDP_ACF.1.4: 1
    • FDP_IFC.1: 2
  • FIA:
    • FIA_AFL: 1
    • FIA_AFL.1: 6
    • FIA_AFL.1.1: 1
    • FIA_AFL.1.2: 1
    • FIA_ATD: 1
    • FIA_ATD.1: 7
    • FIA_ATD.1.1: 1
    • FIA_SOS: 1
    • FIA_SOS.1: 7
    • FIA_SOS.1.1: 1
    • FIA_UAU: 2
    • FIA_UAU.1: 8
    • FIA_UAU.1.1: 1
    • FIA_UAU.1.2: 1
    • FIA_UID.1: 9
    • FIA_UID.1.1: 1
    • FIA_UID.1.2: 1
    • FIA_USB.1: 6
    • FIA_USB.1.1: 1
    • FIA_USB.1.2: 1
    • FIA_USB.1.3: 1
  • FMT:
    • FMT_MSA: 2
    • FMT_MSA.1: 9
    • FMT_MSA.1.1: 1
    • FMT_MSA.3: 8
    • FMT_MSA.3.1: 1
    • FMT_MSA.3.2: 1
    • FMT_MTD: 1
    • FMT_MTD.1: 9
    • FMT_MTD.1.1: 1
    • FMT_SMF: 1
    • FMT_SMF.1: 11
    • FMT_SMF.1.1: 1
    • FMT_SMR: 1
    • FMT_SMR.1: 12
    • FMT_SMR.1.1: 1
    • FMT_SMR.1.2: 1
  • FTA:
    • FTA_TAB: 1
    • FTA_TAB.1: 7
    • FTA_TAB.1.1: 1
pdf_data/st_keywords/cc_claims
  • A:
    • A.CRYPTO: 1
    • A.ESM: 1
    • A.INSTALL: 1
    • A.MANAGE: 1
    • A.POLICY: 1
    • A.SYSTIME: 1
    • A.USERID: 1
  • O:
    • O.ACCESSID: 1
    • O.AUDIT: 1
    • O.AUTH: 1
    • O.BANNER: 1
    • O.CONSISTENT: 1
    • O.DATAPROT: 1
    • O.DISTRIB: 1
    • O.INTEGRITY: 1
    • O.MAINTAIN: 1
    • O.MANAGE: 1
    • O.MNGRID: 1
    • O.MONITOR: 1
    • O.OFLOWS: 1
    • O.POLICY: 1
    • O.PROTCOMMS: 1
    • O.ROBUST: 1
    • O.SELFID: 2
  • OE:
    • OE.ADMIN: 2
    • OE.BANNER: 2
    • OE.CRYPTO: 3
    • OE.INSTALL: 2
    • OE.PERSON: 2
    • OE.POLICY: 2
    • OE.PROTECT: 2
    • OE.ROBUST: 1
    • OE.SYSTIME: 2
    • OE.USERID: 3
  • T:
    • T.ADMIN_ERROR: 1
    • T.CONTRADICT: 1
    • T.DISABLE: 1
    • T.EAVES: 1
    • T.FALSIFY: 1
    • T.FORGE: 1
    • T.MASK: 1
    • T.NOROUTE: 1
    • T.OFLOWS: 1
    • T.UNAUTH: 3
    • T.WEAKIA: 1
    • T.WEAKPOL: 1
  • A:
    • A.ADMINISTRATORS: 4
    • A.CLIENTS: 3
    • A.NETWORKS: 3
    • A.PASSWORD: 4
    • A.PHYSICAL: 4
    • A.SECURE_CHANNEL: 3
    • A.SRV_MGMT: 4
  • O:
    • O.BANNER: 6
    • O.MGMT: 9
    • O.PASSWORD: 7
  • T:
    • T.ILLEGAL_ACCESS: 4
    • T.UNAUTHORISED_ACCESS: 3
pdf_data/st_keywords/vendor
  • Microsoft:
    • Microsoft: 3
    • Microsoft Corporation: 4
pdf_data/st_keywords/eval_facility
  • BoozAllenHamilton:
    • Booz Allen Hamilton: 1
pdf_data/st_keywords/symmetric_crypto
  • AES_competition:
    • AES:
      • AES: 4
  • DES:
    • DES:
      • DES: 1
  • constructions:
    • MAC:
      • HMAC: 2
pdf_data/st_keywords/asymmetric_crypto
  • FF:
    • DH:
      • Diffie-Hellman: 1
pdf_data/st_keywords/crypto_protocol
  • SSH:
    • SSH: 7
  • TLS:
    • SSL:
      • SSL: 6
    • TLS:
      • TLS: 13
pdf_data/st_keywords/randomness
  • PRNG:
    • DRBG: 5
pdf_data/st_keywords/tee_name
  • IBM:
    • SE: 1
pdf_data/st_keywords/standard_id
  • CC:
    • CCMB-2012-009-001: 1
    • CCMB-2012-009-003: 1
    • CCMB-2012-009-004: 1
  • FIPS:
    • FIPS 140-2: 1
    • FIPS PUB 197: 2
  • PKCS:
    • PKCS#11: 2
  • CC:
    • CCMB-2012-09-001: 1
    • CCMB-2012-09-002: 1
    • CCMB-2012-09-003: 1
pdf_data/st_keywords/certification_process
  • OutOfScope:
    • boundary. It does not matter if they are installed on the Operational Environment because they are out of scope for the requirements in this evaluation as explained below. EUA – Extended User Authentication: 1
    • out of scope: 1
pdf_data/st_metadata
  • /CreationDate: D:20171114183341+09'00'
  • /Creator: Microsoft® Word 2016
  • /ModDate: D:20171114183341+09'00'
  • /Producer: Microsoft® Word 2016
  • pdf_file_size_bytes: 1312003
  • pdf_hyperlinks: {}
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 64
state/cert/convert_garbage True False
state/cert/pdf_hash Different Different
state/cert/txt_hash Different Different
state/report/pdf_hash Different Different
state/report/txt_hash Different Different
state/st/pdf_hash Different Different
state/st/txt_hash Different Different