Comparing certificates Experimental feature

You are comparing two certificates. By default, only differing attributes are shown. Use the button below to show/hide all attributes.

Showing only differing attributes.
IBM Tivoli Access Manager for e-business version 6.1.1 FP4 with IBM Tivoli Federated Identity Manager version 6.2.1 FP2
BSI-DSZ-CC-0636-2012
CA Directory r8.1 0608 (build 942)
CCEVS-VR-0040-2007
name IBM Tivoli Access Manager for e-business version 6.1.1 FP4 with IBM Tivoli Federated Identity Manager version 6.2.1 FP2 CA Directory r8.1 0608 (build 942)
category Access Control Devices and Systems Network and Network-Related Devices and Systems
scheme DE US
not_valid_after 01.09.2019 06.09.2012
not_valid_before 22.06.2012 30.04.2007
report_link https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/0636a_pdf.pdf https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/st_vid3022-vr.pdf
st_link https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/0636b_pdf.pdf https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/st_vid3022-st.pdf
manufacturer IBM Corporation CA Technologies
manufacturer_web https://www.ibm.com https://www.ca.com
security_level EAL4+, ALC_FLR.3 EAL3
dgst ab61ad860c8f4c38 2be2ede185c90a0b
heuristics/cert_id BSI-DSZ-CC-0636-2012 CCEVS-VR-0040-2007
heuristics/cert_lab BSI US
heuristics/cpe_matches cpe:2.3:a:ibm:tivoli_access_manager_for_e-business:6.1.1.7:*:*:*:*:*:*:*, cpe:2.3:a:ibm:tivoli_access_manager_for_e-business:6.1.1.16:*:*:*:*:*:*:*, cpe:2.3:a:ibm:tivoli_access_manager_for_e-business:6.1.1.25:*:*:*:*:*:*:*, cpe:2.3:a:ibm:tivoli_access_manager_for_e-business:6.1.1.22:*:*:*:*:*:*:*, cpe:2.3:a:ibm:tivoli_access_manager_for_e-business:6.1.1.21:*:*:*:*:*:*:*, cpe:2.3:a:ibm:tivoli_access_manager_for_e-business:6.1.1.28:*:*:*:*:*:*:*, cpe:2.3:a:ibm:tivoli_access_manager_for_e-business:6.1.1.13:*:*:*:*:*:*:*, cpe:2.3:a:ibm:tivoli_access_manager_for_e-business:6.1.1.27:*:*:*:*:*:*:*, cpe:2.3:a:ibm:tivoli_access_manager_for_e-business:6.1.1.23:*:*:*:*:*:*:*, cpe:2.3:a:ibm:tivoli_access_manager_for_e-business:6.1.1.5:*:*:*:*:*:*:*, cpe:2.3:a:ibm:tivoli_access_manager_for_e-business:6.1.1.3:*:*:*:*:*:*:*, cpe:2.3:a:ibm:tivoli_access_manager_for_e-business:6.1.1.6:*:*:*:*:*:*:*, cpe:2.3:a:ibm:tivoli_access_manager_for_e-business:6.1.1.29:*:*:*:*:*:*:*, cpe:2.3:a:ibm:tivoli_access_manager_for_e-business:6.1.1:*:*:*:*:*:*:*, cpe:2.3:a:ibm:tivoli_access_manager_for_e-business:6.1.1.18:*:*:*:*:*:*:*, cpe:2.3:a:ibm:tivoli_access_manager_for_e-business:6.1.1.4:*:*:*:*:*:*:*, cpe:2.3:a:ibm:tivoli_access_manager_for_e-business:6.1.1.20:*:*:*:*:*:*:*, cpe:2.3:a:ibm:tivoli_access_manager_for_e-business:6.1.1.19:*:*:*:*:*:*:*, cpe:2.3:a:ibm:tivoli_access_manager_for_e-business:6.1.1.12:*:*:*:*:*:*:*, cpe:2.3:a:ibm:tivoli_access_manager_for_e-business:6.1.1.2:*:*:*:*:*:*:*, cpe:2.3:a:ibm:tivoli_access_manager_for_e-business:6.1.1.24:*:*:*:*:*:*:*, cpe:2.3:a:ibm:tivoli_access_manager_for_e-business:6.1.1.17:*:*:*:*:*:*:*, cpe:2.3:a:ibm:tivoli_access_manager_for_e-business:6.1.1.9:*:*:*:*:*:*:*, cpe:2.3:a:ibm:tivoli_access_manager_for_e-business:6.1.1.8:*:*:*:*:*:*:*, cpe:2.3:a:ibm:tivoli_access_manager_for_e-business:6.1.1.1:*:*:*:*:*:*:*, cpe:2.3:a:ibm:tivoli_access_manager_for_e-business:6.1.1.26:*:*:*:*:*:*:*, cpe:2.3:a:ibm:tivoli_access_manager_for_e-business:6.1.1.11:*:*:*:*:*:*:*, cpe:2.3:a:ibm:tivoli_access_manager_for_e-business:6.1.1.10:*:*:*:*:*:*:*, cpe:2.3:a:ibm:tivoli_access_manager_for_e-business:6.1.1.15:*:*:*:*:*:*:*, cpe:2.3:a:ibm:tivoli_access_manager_for_e-business:6.1.1.30:*:*:*:*:*:*:*, cpe:2.3:a:ibm:tivoli_access_manager_for_e-business:6.1.1.14:*:*:*:*:*:*:* {}
heuristics/related_cves CVE-2010-4623, CVE-2017-1489, CVE-2010-4120, CVE-2011-0494 {}
heuristics/extracted_sars ASE_INT.1, ALC_CMC.4, ASE_ECD.1, APE_ECD.1, ADV_IMP.1, ATE_COV.2, ASE_TSS.1, ALC_TAT.1, ASE_SPD.1, ALC_DEL.1, ALC_LCD.1, ALC_FLR.3, AGD_OPE.1, AVA_VAN.3, AGD_PRE.1, ALC_CMS.4, ATE_FUN.1, APE_REQ.2, ADV_ARC.1, ASE_OBJ.2, APE_CCL.1, ADV_TDS.3, ATE_DPT.1, ASE_REQ.2, ALC_DVS.1, ADV_INT.3, APE_INT.1, APE_SPD.1, ADV_FSP.4, ATE_IND.2, APE_OBJ.2, ASE_CCL.1, ADV_SPM.1 ALC_DVS.1, ATE_COV.2, ADV_RCR.1, ADV_FSP.1, ADV_HLD.2, ATE_FUN.1, AGD_USR.1, AVA_VLA.1, AVA_MSU.1, AGD_ADM.1, ATE_IND.2, ATE_DPT.1, AVA_SOF.1
heuristics/extracted_versions 6.1.1, 6.2.1 8.1
heuristics/scheme_data
  • category: Network Access Control
  • certification_date: 30.04.2007
  • evaluation_facility: CygnaCom Solutions, Inc
  • expiration_date:
  • id: CCEVS-VR-VID3022
  • product: CA Directory r8.1 0608 (build 942)
  • scheme: US
  • url: https://www.niap-ccevs.org/product/3022
  • vendor: CA Technologies
pdf_data/report_filename 0636a_pdf.pdf st_vid3022-vr.pdf
pdf_data/report_frontpage
  • DE:
    • cert_id: BSI-DSZ-CC-0636-2012
    • cert_item: IBM Tivoli Access Manager for e-Business version 6.1.1 FP4 with IBM Tivoli Federated Identity Manager version 6.2.1 FP2
    • cert_lab: BSI
    • developer: IBM Corporation
    • match_rules: ['(BSI-DSZ-CC-.+?) (?:for|For) (.+?) from (.*)']
  • US:
  • DE:
  • US:
    • cert_id: CCEVS-VR-07-0040
    • cert_item: CA Directory, r8.1 0608 (build 942) for the Sun Solaris Platform
    • cert_lab: US NIAP
pdf_data/report_keywords/cc_cert_id
  • DE:
    • BSI-DSZ-CC-0636-2012: 21
  • US:
    • CCEVS-VR-06-3022: 23
    • CCEVS-VR-07-0040: 1
pdf_data/report_keywords/cc_security_level
  • EAL:
    • EAL 4: 6
    • EAL 4 augmented: 3
    • EAL1: 7
    • EAL2: 3
    • EAL3: 4
    • EAL4: 6
    • EAL5: 6
    • EAL6: 3
    • EAL7: 4
  • ITSEC:
    • ITSEC Evaluation: 1
  • EAL:
    • EAL 3: 2
    • EAL3: 8
pdf_data/report_keywords/cc_sar
  • ADV:
    • ADV_ARC: 1
    • ADV_ARC.1: 1
    • ADV_FSP: 1
    • ADV_FSP.1: 1
    • ADV_FSP.2: 1
    • ADV_FSP.3: 1
    • ADV_FSP.4: 1
    • ADV_FSP.5: 1
    • ADV_FSP.6: 1
    • ADV_IMP: 1
    • ADV_IMP.1: 1
    • ADV_IMP.2: 1
    • ADV_INT: 1
    • ADV_INT.1: 1
    • ADV_INT.2: 1
    • ADV_INT.3: 1
    • ADV_SPM: 1
    • ADV_SPM.1: 1
    • ADV_TDS: 1
    • ADV_TDS.1: 1
    • ADV_TDS.2: 1
    • ADV_TDS.3: 1
    • ADV_TDS.4: 1
    • ADV_TDS.5: 1
    • ADV_TDS.6: 1
  • AGD:
    • AGD_OPE: 1
    • AGD_OPE.1: 1
    • AGD_PRE: 1
    • AGD_PRE.1: 1
  • ALC:
    • ALC_CMC: 1
    • ALC_CMC.1: 1
    • ALC_CMC.2: 1
    • ALC_CMC.3: 1
    • ALC_CMC.4: 2
    • ALC_CMC.5: 1
    • ALC_CMS: 1
    • ALC_CMS.1: 1
    • ALC_CMS.2: 1
    • ALC_CMS.3: 1
    • ALC_CMS.4: 2
    • ALC_CMS.5: 1
    • ALC_DEL: 1
    • ALC_DEL.1: 2
    • ALC_DVS: 1
    • ALC_DVS.1: 2
    • ALC_DVS.2: 1
    • ALC_FLR: 1
    • ALC_FLR.1: 1
    • ALC_FLR.2: 1
    • ALC_FLR.3: 6
    • ALC_LCD.1: 2
    • ALC_LCD.2: 1
    • ALC_TAT: 1
    • ALC_TAT.1: 2
    • ALC_TAT.2: 1
    • ALC_TAT.3: 1
  • APE:
    • APE_CCL.1: 1
    • APE_ECD.1: 1
    • APE_INT.1: 1
    • APE_OBJ.1: 1
    • APE_OBJ.2: 1
    • APE_REQ.1: 1
    • APE_REQ.2: 1
    • APE_SPD.1: 1
  • ASE:
    • ASE_CCL: 1
    • ASE_CCL.1: 1
    • ASE_ECD: 1
    • ASE_ECD.1: 1
    • ASE_INT: 1
    • ASE_INT.1: 1
    • ASE_OBJ: 1
    • ASE_OBJ.1: 1
    • ASE_OBJ.2: 1
    • ASE_REQ.1: 1
    • ASE_REQ.2: 1
    • ASE_SPD: 1
    • ASE_SPD.1: 1
    • ASE_TSS: 1
    • ASE_TSS.1: 1
    • ASE_TSS.2: 1
  • ATE:
    • ATE_COV: 1
    • ATE_COV.1: 1
    • ATE_COV.2: 1
    • ATE_COV.3: 1
    • ATE_DPT: 1
    • ATE_DPT.1: 1
    • ATE_DPT.2: 1
    • ATE_DPT.3: 1
    • ATE_DPT.4: 1
    • ATE_FUN: 1
    • ATE_FUN.1: 1
    • ATE_FUN.2: 1
    • ATE_IND: 1
    • ATE_IND.1: 1
    • ATE_IND.2: 1
    • ATE_IND.3: 1
  • AVA:
    • AVA_VAN: 2
    • AVA_VAN.1: 1
    • AVA_VAN.2: 1
    • AVA_VAN.3: 1
    • AVA_VAN.4: 1
    • AVA_VAN.5: 1
  • ACM:
    • ACM_CAP.3: 1
    • ACM_SCP.1: 1
  • ADO:
    • ADO_DEL.1: 2
    • ADO_IGS.1: 3
  • ADV:
    • ADV_FSP.1: 1
    • ADV_HLD.2: 1
    • ADV_RCR.1: 1
  • AGD:
    • AGD_ADM.1: 2
    • AGD_USR.1: 2
  • ALC:
    • ALC_DVS.1: 1
  • ATE:
    • ATE_COV: 1
    • ATE_COV.2: 2
    • ATE_DPT: 1
    • ATE_DPT.1: 1
    • ATE_FUN: 1
    • ATE_FUN.1: 1
    • ATE_IND.2: 3
  • AVA:
    • AVA_MSU.1: 1
    • AVA_SOF.1: 1
    • AVA_VLA.1: 2
pdf_data/report_keywords/cc_sfr
  • FAU:
    • FAU_SAR.1: 1
    • FAU_SEL.1: 1
  • FDP:
    • FDP_ACC.1: 1
    • FDP_ACF.1: 1
  • FIA:
    • FIA_AFL.1: 3
    • FIA_ATD.1: 1
    • FIA_SOS.1: 2
    • FIA_UAU: 3
    • FIA_UAU.1: 1
    • FIA_UAU.2: 1
    • FIA_UID.1: 1
    • FIA_UID.2: 1
  • FMT:
    • FMT_MSA: 2
    • FMT_MTD: 2
    • FMT_SMF.1: 1
    • FMT_SMR.1: 1
  • FPT:
    • FPT_STM.1: 1
pdf_data/report_keywords/eval_facility
  • atsec:
    • atsec: 3
pdf_data/report_keywords/asymmetric_crypto
  • FF:
    • DSA:
      • DSA: 23
pdf_data/report_keywords/crypto_protocol
  • TLS:
    • TLS:
      • TLS: 5
  • TLS:
    • SSL:
      • SSL: 18
pdf_data/report_keywords/crypto_library
  • OpenSSL:
    • OpenSSL: 3
pdf_data/report_keywords/vulnerability
  • CVE:
    • CVE-2004-0079: 1
    • CVE-2005-3653: 1
pdf_data/report_keywords/technical_report_id
  • BSI:
    • BSI 7125: 2
    • BSI 7148: 1
pdf_data/report_keywords/standard_id
  • BSI:
    • AIS 32: 1
  • X509:
    • X.509: 3
pdf_data/report_keywords/certification_process
  • ConfidentialDocument:
    • Version 3, 25th May 2012, Final Evaluation Technical Report, atsec information security GmbH (confidential document) [8] Configuration lists for the TOE (confidential documents) [CIL-FLR] Lists the security flaw: 1
  • OutOfScope:
    • Only - Out of Scope DXconsole DUA/LDUA The system configuration consists of two Sun SPARC Solaris 9 machines. On one: 1
    • Out of Scope: 3
    • and Software is Out of Scope DXconsole SSLD Ingres db DUA/LDUA Figure 3. TOE’s physical scope by product components used 16 CA: 1
    • before use. RPC DSA RPB DSA RPA DSA DXserver DUA/LDUA TOE machine Remote Machine and Software is Out of Scope DXconsole SSLD Ingres db DUA/LDUA RPC DSA RPB DSA RPA DSA DXserver DUA/LDUA TOE machine Remote: 1
    • iGateway affects the DXmanager module of eTrust Directory 8.1. DXmanager is not installed and out of scope for the evaluation. Also applies to the HTTP interface which is not an interface to the TOE. •: 1
    • in scope) and the SSLD (out of scope) though not depicted: 1
    • of the evaluation. Therefore, the cryptographic algorithms performed within the SSLD component are out of scope and not verified by this evaluation. Aspects of the following security functions are controlled : 1
    • out of scope: 3
    • used for the Developers Testing. The TOE DSA box includes the Ingres db (in scope) and the SSLD (out of scope) though not depicted. RPC DSA RPB DSA RPA DSA TOE DSA DUA/LDUA TOE machine Remote Machine For Test: 1
pdf_data/report_metadata
  • /Author: Bundesamt für Sicherheit in der Informationstechnik
  • /CreationDate: D:20120731090521+02'00'
  • /Creator: Writer
  • /Keywords: "Common Criteria, Certification, Zertifizierung, Access Control, TAMeb, TFIM, ISO 10181-3, aznAPI, Tivoli Access Manager for e-business Version 6.1.1 FP4 with Tivoli FederatedIdentity Manager 6.2.1 FP2"
  • /ModDate: D:20120731090934+02'00'
  • /Producer: OpenOffice.org 3.2
  • /Subject: Common Criteria Certification
  • /Title: Certification Report BSI-DSZ-CC-0636-2012
  • pdf_file_size_bytes: 1396851
  • pdf_hyperlinks: https://www.bsi.bund.dea/, https://www.bsi.bund.de/zertifizierung
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 38
  • /Author: wshanahan
  • /CreationDate: D:20070717085537-04'00'
  • /Creator: Acrobat PDFMaker 7.0 for Word
  • /ModDate: D:20070717085839-04'00'
  • /Producer: Acrobat Distiller 7.0 (Windows)
  • /SourceModified: D:20070717125458
  • /Title: National Information Assurance Partnership
  • pdf_file_size_bytes: 184938
  • pdf_hyperlinks: http://www.cygnacom.com/
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 23
pdf_data/st_filename 0636b_pdf.pdf st_vid3022-st.pdf
pdf_data/st_keywords/cc_cert_id
  • DE:
    • BSI-DSZ-CC-0636: 1
pdf_data/st_keywords/cc_security_level
  • EAL:
    • EAL4: 2
  • EAL:
    • EAL3: 10
pdf_data/st_keywords/cc_sar
  • ADV:
    • ADV_ARC.1: 1
    • ADV_FSP.4: 1
    • ADV_IMP.1: 1
    • ADV_TDS.3: 1
  • AGD:
    • AGD_OPE.1: 1
    • AGD_PRE.1: 1
  • ALC:
    • ALC_CMC.4: 1
    • ALC_CMS.4: 1
    • ALC_DEL.1: 1
    • ALC_DVS.1: 1
    • ALC_FLR.3: 4
    • ALC_LCD.1: 1
    • ALC_TAT.1: 1
  • ASE:
    • ASE_CCL.1: 1
    • ASE_ECD.1: 1
    • ASE_INT.1: 1
    • ASE_OBJ.2: 1
    • ASE_REQ.2: 1
    • ASE_SPD.1: 1
    • ASE_TSS.1: 1
  • ATE:
    • ATE_COV.2: 1
    • ATE_DPT.1: 1
    • ATE_FUN.1: 1
    • ATE_IND.2: 1
  • AVA:
    • AVA_VAN.3: 1
  • ACM:
    • ACM_CAP.3: 3
    • ACM_SCP.1: 3
  • ADO:
    • ADO_DEL.1: 3
    • ADO_IGS.1: 3
  • ADV:
    • ADV_FSP.1: 3
    • ADV_HLD.2: 3
    • ADV_RCR.1: 3
  • AGD:
    • AGD_ADM.1: 3
    • AGD_USR.1: 3
  • ALC:
    • ALC_DVS.1: 3
  • ATE:
    • ATE_COV.2: 3
    • ATE_DPT.1: 3
    • ATE_FUN.1: 3
    • ATE_IND.2: 3
  • AVA:
    • AVA_MSU.1: 3
    • AVA_SOF.1: 3
    • AVA_VLA.1: 4
pdf_data/st_keywords/cc_sfr
  • FAU:
    • FAU_GEN.1: 11
    • FAU_GEN.1.1: 1
    • FAU_GEN.1.2: 1
    • FAU_GEN.2: 5
    • FAU_GEN.2.1: 1
    • FAU_SAR.1: 7
    • FAU_SAR.1.1: 1
    • FAU_SAR.1.2: 1
    • FAU_SEL.1: 6
    • FAU_SEL.1.1: 1
    • FAU_STG.1: 6
    • FAU_STG.1.1: 1
    • FAU_STG.1.2: 1
    • FAU_STG.3: 4
    • FAU_STG.3.1: 1
  • FDP:
    • FDP_ACC.1: 4
    • FDP_ACC.2: 16
    • FDP_ACC.2.1: 2
    • FDP_ACC.2.2: 2
    • FDP_ACF.1: 13
    • FDP_ACF.1.1: 2
    • FDP_ACF.1.2: 2
    • FDP_ACF.1.3: 2
    • FDP_ACF.1.4: 2
    • FDP_IFC.1: 2
  • FIA:
    • FIA_AFL.1: 5
    • FIA_AFL.1.1: 1
    • FIA_AFL.1.2: 2
    • FIA_ATD.1: 11
    • FIA_ATD.1.1: 1
    • FIA_SOS.1: 7
    • FIA_SOS.1.1: 1
    • FIA_UAU: 1
    • FIA_UAU.1: 8
    • FIA_UAU.1.1: 1
    • FIA_UAU.1.2: 1
    • FIA_UAU.2: 25
    • FIA_UAU.2.1: 4
    • FIA_UAU.5: 5
    • FIA_UAU.5.1: 1
    • FIA_UAU.5.2: 1
    • FIA_UAU.6: 5
    • FIA_UAU.6.1: 1
    • FIA_UID.1: 15
    • FIA_UID.1.1: 1
    • FIA_UID.1.2: 1
    • FIA_UID.2: 25
    • FIA_UID.2.1: 4
    • FIA_USB.1: 10
    • FIA_USB.1.1: 1
    • FIA_USB.1.2: 1
    • FIA_USB.1.3: 1
  • FMT:
    • FMT_MOF.1: 12
    • FMT_MOF.1.1: 1
    • FMT_MSA.1: 14
    • FMT_MSA.1.1: 2
    • FMT_MSA.3: 12
    • FMT_MSA.3.1: 1
    • FMT_MSA.3.2: 1
    • FMT_MTD.1: 11
    • FMT_MTD.1.1: 2
    • FMT_SMF.1: 19
    • FMT_SMF.1.1: 1
    • FMT_SMR.1: 10
    • FMT_SMR.1.1: 1
    • FMT_SMR.1.2: 1
  • FPT:
    • FPT_STM.1: 6
    • FPT_STM.1.1: 1
  • FAU:
    • FAU_GEN.1: 17
    • FAU_GEN.1.1: 1
    • FAU_GEN.1.2: 1
    • FAU_SAR.1: 11
    • FAU_SAR.1.1: 1
    • FAU_SAR.1.2: 1
    • FAU_SEL.1: 17
    • FAU_SEL.1.1: 1
  • FDP:
    • FDP_ACC.1: 16
    • FDP_ACC.1.1: 1
    • FDP_ACF.1: 15
    • FDP_ACF.1.1: 4
    • FDP_ACF.1.2: 7
    • FDP_ACF.1.3: 1
    • FDP_ACF.1.4: 1
  • FIA:
    • FIA_AFL.1: 16
    • FIA_AFL.1.1: 1
    • FIA_AFL.1.2: 1
    • FIA_ATD.1: 13
    • FIA_ATD.1.1: 1
    • FIA_SOS.1: 16
    • FIA_SOS.1.1: 1
    • FIA_UAU: 25
    • FIA_UAU.1: 17
    • FIA_UAU.1.1: 1
    • FIA_UAU.1.2: 1
    • FIA_UAU.2: 9
    • FIA_UAU.2.1: 1
    • FIA_UAU.5: 3
    • FIA_UAU.5.1: 1
    • FIA_UID.1: 19
    • FIA_UID.1.1: 1
    • FIA_UID.1.2: 1
    • FIA_UID.2: 8
    • FIA_UID.2.1: 1
  • FMT:
    • FMT_MSA: 34
    • FMT_MSA.1: 2
    • FMT_MSA.3: 2
    • FMT_MTD: 45
    • FMT_MTD.1: 2
    • FMT_SMF.1: 16
    • FMT_SMF.1.1: 1
    • FMT_SMR.1: 19
    • FMT_SMR.1.1: 1
    • FMT_SMR.1.2: 1
  • FPT:
    • FPT_RVM: 1
    • FPT_RVM.1: 5
    • FPT_RVM_EXP: 1
    • FPT_SEP: 1
    • FPT_SEP.1: 5
    • FPT_STM.1: 11
    • FPT_STM.1.1: 1
  • FTP:
    • FTP_ITC: 1
    • FTP_ITC.1: 3
    • FTP_ITC_EXP.1: 2
pdf_data/st_keywords/cc_claims
  • A:
    • A.ADMIN: 3
    • A.ADM_PWMAN: 2
    • A.AUDIT_CONFIG: 3
    • A.CLIENT_KEYMAN: 2
    • A.CLIENT_PWMAN: 3
    • A.CRED_PROT: 5
    • A.DIR_PROT: 2
    • A.NOBYPASS: 6
    • A.OS_CONF_MGMT: 2
    • A.PHYS_PROT: 2
    • A.PROTECTED_NET: 3
    • A.PROTOCOL_SEC: 3
    • A.SEC_COM: 3
    • A.SINGLE_APP: 3
  • O:
    • O.ACCESS_DECISION: 16
    • O.ACC_ADM: 8
    • O.AUDITING: 13
    • O.AUTHENT_ADMIN: 11
    • O.AUTHENT_SERVER: 12
    • O.AUTHENT_USER: 8
    • O.AUTHENT_USERS: 1
    • O.AUTHORIZATION: 7
    • O.MANAGE: 11
    • O.PWD_STRENGH: 1
    • O.PWD_STRENGTH: 4
    • O.TIME: 4
  • OE:
    • OE.AUDIT_CONFIG: 3
    • OE.CREDEN: 5
    • OE.DS_ACCESS_CNTRL: 6
    • OE.DS_AUTHENT: 6
    • OE.INSTALL: 8
    • OE.OS_CONFFILE_PROT: 3
    • OE.OS_OPERATE: 6
    • OE.PHYSICAL: 4
    • OE.PROTOCOL_SEC: 3
    • OE.PWD_STRENGTH: 3
    • OE.SEC_COM: 3
    • OE.SEC_INTEGRATE: 3
  • T:
    • T.UAACTION: 2
    • T.UAUSER: 6
  • A:
    • A.DIRECTORY_SYSTEM: 1
    • A.DIRECTORY_SYSTEM_SECURITY_: 1
    • A.DIRECTORY_SYSTEM_SECURITY_POLI: 1
    • A.DIRECTORY_SYSTEM_SECURITY_POLICY_: 1
    • A.INTEROP: 2
    • A.NO_EVIL: 2
    • A.NO_GENERAL_PURPOSE: 2
    • A.PHYSICAL: 3
    • A.REMOTE_ADMIN_DUA_: 1
    • A.REMOTE_ADMIN_DUA_ENVIRONMENT: 2
    • A.USERS: 2
  • D:
    • D.W: 2
  • O:
    • O.AUDIT: 6
    • O.MANAGE: 9
    • O.MEDIATE: 7
    • O.PARTIAL_SELF_: 1
    • O.PARTIAL_SELF_PROTECTION: 3
    • O.PARTIAL_TRUSTEDCOMM: 6
    • O.TOE_ACCESS: 4
  • OE:
    • OE.AUDIT_ACCESS: 7
    • OE.DISTRIBUTED_AUTHENTICA: 1
    • OE.DISTRIBUTED_AUTHENTICATION: 4
    • OE.PARTIAL_SELF_: 1
    • OE.PARTIAL_SELF_PROTECTION: 2
    • OE.PARTIAL_TRUSTEDCOMM: 7
    • OE.TIME: 6
  • T:
    • T.MASQUERADE: 4
    • T.TSF_COMPROMISE: 6
    • T.UNAUTHORIZED_ACCESS: 3
    • T.UNIDENTIFIED_ACTIONS: 3
pdf_data/st_keywords/vendor
  • Microsoft:
    • Microsoft Corporation: 1
pdf_data/st_keywords/eval_facility
  • atsec:
    • atsec: 85
pdf_data/st_keywords/symmetric_crypto
  • AES_competition:
    • AES:
      • AES: 6
      • AES-: 1
  • DES:
    • 3DES:
      • TDEA: 4
    • DES:
      • DES: 3
  • constructions:
    • MAC:
      • HMAC: 1
  • DES:
    • DES:
      • DES: 1
pdf_data/st_keywords/asymmetric_crypto
  • FF:
    • DSA:
      • DSA: 71
pdf_data/st_keywords/hash_function
  • SHA:
    • SHA1:
      • SHA-1: 2
    • SHA2:
      • SHA-224: 1
pdf_data/st_keywords/crypto_protocol
  • TLS:
    • SSL:
      • SSL: 2
    • TLS:
      • TLS: 45
      • TLS v1.0: 16
  • TLS:
    • SSL:
      • SSL: 34
    • TLS:
      • TLS: 1
pdf_data/st_keywords/randomness
  • RNG:
    • RNG: 1
pdf_data/st_keywords/tls_cipher_suite
  • TLS:
    • TLS_RSA_WITH_AES_128_CBC_SHA: 1
pdf_data/st_keywords/standard_id
  • BSI:
    • AIS 20: 1
    • BSI-AIS20: 1
  • FIPS:
    • FIPS140-2: 1
    • FIPS180-2: 1
    • FIPS186-2: 1
    • FIPS197: 1
    • FIPS46-3: 1
    • FIPS81: 1
  • ISO:
    • ISO/IEC 15408: 2
  • RFC:
    • RFC 2246: 1
    • RFC 2313: 1
    • RFC 3268: 1
    • RFC2246: 1
    • RFC2313: 1
    • RFC3268: 1
  • X509:
    • X.509: 2
pdf_data/st_metadata
  • /Author: Scott Chapman
  • /CreationDate: D:20120516114444-05'00'
  • /Creator: Microsoft® Office Word 2007
  • /Keywords: TAMeb, TFIM
  • /ModDate: D:20120731152053+02'00'
  • /Producer: Microsoft® Office Word 2007
  • /Title: Tivoli Access Manager for e-business Version 6.1.1 FP4 with Tivoli Federated Identity Manager 6.2.1 FP2 Security Target
  • pdf_file_size_bytes: 996333
  • pdf_hyperlinks: http://www.oasis-open.org/committees/download.php/6837/sstc-saml-tech-overview-1.1-cd.pdf
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 83
  • /Author: krogers
  • /Company: CygnaCom Solutions, Inc.
  • /CreationDate: D:20070717085137-04'00'
  • /Creator: Acrobat PDFMaker 7.0 for Word
  • /ModDate: D:20070717085341-04'00'
  • /Producer: Acrobat Distiller 7.0 (Windows)
  • /SourceModified: D:20070711135902
  • /Title: APPENDIX E (CERTIFICATE POLICY TAXONOMY)
  • pdf_file_size_bytes: 620673
  • pdf_hyperlinks: {}
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 86
state/report/pdf_hash Different Different
state/report/txt_hash Different Different
state/st/pdf_hash Different Different
state/st/txt_hash Different Different