Comparing certificates Experimental feature

You are comparing two certificates. By default, only differing attributes are shown. Use the button below to show/hide all attributes.

Showing only differing attributes.
IBM Tivoli Access Manager for e-business version 6.1.1 FP4 with IBM Tivoli Federated Identity Manager version 6.2.1 FP2
BSI-DSZ-CC-0636-2012
IDmove v4 on Infineon in EAC configuration with AA in option
ANSSI-CC-2019/56
name IBM Tivoli Access Manager for e-business version 6.1.1 FP4 with IBM Tivoli Federated Identity Manager version 6.2.1 FP2 IDmove v4 on Infineon in EAC configuration with AA in option
category Access Control Devices and Systems ICs, Smart Cards and Smart Card-Related Devices and Systems
scheme DE FR
not_valid_after 01.09.2019 20.12.2024
not_valid_before 22.06.2012 20.12.2019
report_link https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/0636a_pdf.pdf https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/anssi-cc-2019_56fr.pdf
st_link https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/0636b_pdf.pdf https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/anssi-cible-cc-2019_56en.pdf
manufacturer IBM Corporation Idemia
manufacturer_web https://www.ibm.com https://www.idemia.com
security_level EAL4+, ALC_FLR.3 EAL5+, AVA_VAN.4, AVA_VAN.5
dgst ab61ad860c8f4c38 695cf8e1edcda832
heuristics/cert_id BSI-DSZ-CC-0636-2012 ANSSI-CC-2019/56
heuristics/cert_lab BSI SERMA
heuristics/cpe_matches cpe:2.3:a:ibm:tivoli_access_manager_for_e-business:6.1.1.7:*:*:*:*:*:*:*, cpe:2.3:a:ibm:tivoli_access_manager_for_e-business:6.1.1.16:*:*:*:*:*:*:*, cpe:2.3:a:ibm:tivoli_access_manager_for_e-business:6.1.1.25:*:*:*:*:*:*:*, cpe:2.3:a:ibm:tivoli_access_manager_for_e-business:6.1.1.22:*:*:*:*:*:*:*, cpe:2.3:a:ibm:tivoli_access_manager_for_e-business:6.1.1.21:*:*:*:*:*:*:*, cpe:2.3:a:ibm:tivoli_access_manager_for_e-business:6.1.1.28:*:*:*:*:*:*:*, cpe:2.3:a:ibm:tivoli_access_manager_for_e-business:6.1.1.13:*:*:*:*:*:*:*, cpe:2.3:a:ibm:tivoli_access_manager_for_e-business:6.1.1.27:*:*:*:*:*:*:*, cpe:2.3:a:ibm:tivoli_access_manager_for_e-business:6.1.1.23:*:*:*:*:*:*:*, cpe:2.3:a:ibm:tivoli_access_manager_for_e-business:6.1.1.5:*:*:*:*:*:*:*, cpe:2.3:a:ibm:tivoli_access_manager_for_e-business:6.1.1.3:*:*:*:*:*:*:*, cpe:2.3:a:ibm:tivoli_access_manager_for_e-business:6.1.1.6:*:*:*:*:*:*:*, cpe:2.3:a:ibm:tivoli_access_manager_for_e-business:6.1.1.29:*:*:*:*:*:*:*, cpe:2.3:a:ibm:tivoli_access_manager_for_e-business:6.1.1:*:*:*:*:*:*:*, cpe:2.3:a:ibm:tivoli_access_manager_for_e-business:6.1.1.18:*:*:*:*:*:*:*, cpe:2.3:a:ibm:tivoli_access_manager_for_e-business:6.1.1.4:*:*:*:*:*:*:*, cpe:2.3:a:ibm:tivoli_access_manager_for_e-business:6.1.1.20:*:*:*:*:*:*:*, cpe:2.3:a:ibm:tivoli_access_manager_for_e-business:6.1.1.19:*:*:*:*:*:*:*, cpe:2.3:a:ibm:tivoli_access_manager_for_e-business:6.1.1.12:*:*:*:*:*:*:*, cpe:2.3:a:ibm:tivoli_access_manager_for_e-business:6.1.1.2:*:*:*:*:*:*:*, cpe:2.3:a:ibm:tivoli_access_manager_for_e-business:6.1.1.24:*:*:*:*:*:*:*, cpe:2.3:a:ibm:tivoli_access_manager_for_e-business:6.1.1.17:*:*:*:*:*:*:*, cpe:2.3:a:ibm:tivoli_access_manager_for_e-business:6.1.1.9:*:*:*:*:*:*:*, cpe:2.3:a:ibm:tivoli_access_manager_for_e-business:6.1.1.8:*:*:*:*:*:*:*, cpe:2.3:a:ibm:tivoli_access_manager_for_e-business:6.1.1.1:*:*:*:*:*:*:*, cpe:2.3:a:ibm:tivoli_access_manager_for_e-business:6.1.1.26:*:*:*:*:*:*:*, cpe:2.3:a:ibm:tivoli_access_manager_for_e-business:6.1.1.11:*:*:*:*:*:*:*, cpe:2.3:a:ibm:tivoli_access_manager_for_e-business:6.1.1.10:*:*:*:*:*:*:*, cpe:2.3:a:ibm:tivoli_access_manager_for_e-business:6.1.1.15:*:*:*:*:*:*:*, cpe:2.3:a:ibm:tivoli_access_manager_for_e-business:6.1.1.30:*:*:*:*:*:*:*, cpe:2.3:a:ibm:tivoli_access_manager_for_e-business:6.1.1.14:*:*:*:*:*:*:* {}
heuristics/related_cves CVE-2010-4623, CVE-2017-1489, CVE-2010-4120, CVE-2011-0494 {}
heuristics/extracted_sars ASE_INT.1, ALC_CMC.4, ASE_ECD.1, APE_ECD.1, ADV_IMP.1, ATE_COV.2, ASE_TSS.1, ALC_TAT.1, ASE_SPD.1, ALC_DEL.1, ALC_LCD.1, ALC_FLR.3, AGD_OPE.1, AVA_VAN.3, AGD_PRE.1, ALC_CMS.4, ATE_FUN.1, APE_REQ.2, ADV_ARC.1, ASE_OBJ.2, APE_CCL.1, ADV_TDS.3, ATE_DPT.1, ASE_REQ.2, ALC_DVS.1, ADV_INT.3, APE_INT.1, APE_SPD.1, ADV_FSP.4, ATE_IND.2, APE_OBJ.2, ASE_CCL.1, ADV_SPM.1 ASE_INT.1, ALC_DVS.2, ALC_CMC.4, ASE_ECD.1, ADV_IMP.1, ATE_COV.2, ASE_TSS.1, ASE_SPD.1, ALC_CMS.5, ALC_DEL.1, ALC_LCD.1, ALC_FLR.3, ADV_FSP.5, AGD_OPE.1, ADV_INT.2, AGD_PRE.1, ATE_FUN.1, ATE_DPT.3, ADV_ARC.1, ASE_OBJ.2, ADV_TDS.4, ALC_TAT.2, ASE_REQ.2, ATE_IND.2, AVA_VAN.4, ASE_CCL.1
heuristics/extracted_versions 6.1.1, 6.2.1 -
heuristics/report_references/directly_referencing {} BSI-DSZ-CC-1110-V2-2019
heuristics/report_references/indirectly_referencing {} BSI-DSZ-CC-0891-2015, BSI-DSZ-CC-0782-2012, BSI-DSZ-CC-0945-V3-2018, BSI-DSZ-CC-1110-2019, BSI-DSZ-CC-0945-V2-2018, BSI-DSZ-CC-0945-2017, BSI-DSZ-CC-1110-V2-2019, BSI-DSZ-CC-0891-V2-2016
heuristics/st_references/directly_referencing {} BSI-DSZ-CC-1110-V2-2019
heuristics/st_references/indirectly_referencing {} BSI-DSZ-CC-1110-V2-2019
heuristics/protection_profiles {} a33327d40f253f46
maintenance_updates
protection_profile_links {} https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/pp0056_V2b_pdf.pdf
pdf_data/report_filename 0636a_pdf.pdf anssi-cc-2019_56fr.pdf
pdf_data/report_frontpage
  • FR:
  • DE:
    • cert_id: BSI-DSZ-CC-0636-2012
    • cert_item: IBM Tivoli Access Manager for e-Business version 6.1.1 FP4 with IBM Tivoli Federated Identity Manager version 6.2.1 FP2
    • cert_lab: BSI
    • developer: IBM Corporation
    • match_rules: ['(BSI-DSZ-CC-.+?) (?:for|For) (.+?) from (.*)']
  • FR:
    • cc_security_level: EAL 5 augmenté ALC_DVS.2, AVA_VAN.5
    • cc_version: Critères Communs version 3.1 révision 5
    • cert_id: ANSSI-CC-2019/56
    • cert_item: IDmove V4 on Infineon in EAC configuration with AA in option
    • cert_item_version: OS Commercial Version : 0x 09 08 04 OS Unique Identifier : 0x 3C 1D Conformité a un profil de protection Machine Readable Travel Document with ICAO application Extended Access Control, version 1.10 certifie BSI-CC-PP-0056-2009 le 25 mars 2009
    • cert_lab: Serma Safety & Security 14 rue Galilée, CS 10071, 33608 Pessac Cedex, France
    • developer: IDEMIA Infineon Technologies AG 2 place Samuel de Champlain, AIM CC SM PS - Am Campeon 1-12, 92400 Courbevoie, France 85579 Neubiberg, Allemagne Commanditaire IDEMIA 2 place Samuel de Champlain, 92400 Courbevoie, France
    • match_rules: ["Référence du rapport de certification(.+)Nom du produit(.+)Référence/version du produit(.+)Critères d'évaluation et version(.+)Niveau d'évaluation(.+)Développeurs(.+)Centre d'évaluation(.+)Accords de reconnaissance applicables"]
    • ref_protection_profiles:
  • DE:
pdf_data/report_keywords/cc_cert_id
  • DE:
    • BSI-DSZ-CC-0636-2012: 21
  • DE:
    • BSI-DSZ-CC-1110-V2-2019: 1
  • FR:
    • ANSSI-CC-2019/56: 18
pdf_data/report_keywords/cc_protection_profile_id
  • BSI:
    • BSI-CC-PP-0056-2009: 1
    • BSI-PP-0056: 1
    • BSI-PP-0084-2014: 1
pdf_data/report_keywords/cc_security_level
  • EAL:
    • EAL 4: 6
    • EAL 4 augmented: 3
    • EAL1: 7
    • EAL2: 3
    • EAL3: 4
    • EAL4: 6
    • EAL5: 6
    • EAL6: 3
    • EAL7: 4
  • ITSEC:
    • ITSEC Evaluation: 1
  • EAL:
    • EAL 5: 2
    • EAL2: 2
    • EAL6: 1
    • EAL7: 1
  • ITSEC:
    • ITSEC E6 Elevé: 1
pdf_data/report_keywords/cc_sar
  • ADV:
    • ADV_ARC: 1
    • ADV_ARC.1: 1
    • ADV_FSP: 1
    • ADV_FSP.1: 1
    • ADV_FSP.2: 1
    • ADV_FSP.3: 1
    • ADV_FSP.4: 1
    • ADV_FSP.5: 1
    • ADV_FSP.6: 1
    • ADV_IMP: 1
    • ADV_IMP.1: 1
    • ADV_IMP.2: 1
    • ADV_INT: 1
    • ADV_INT.1: 1
    • ADV_INT.2: 1
    • ADV_INT.3: 1
    • ADV_SPM: 1
    • ADV_SPM.1: 1
    • ADV_TDS: 1
    • ADV_TDS.1: 1
    • ADV_TDS.2: 1
    • ADV_TDS.3: 1
    • ADV_TDS.4: 1
    • ADV_TDS.5: 1
    • ADV_TDS.6: 1
  • AGD:
    • AGD_OPE: 1
    • AGD_OPE.1: 1
    • AGD_PRE: 1
    • AGD_PRE.1: 1
  • ALC:
    • ALC_CMC: 1
    • ALC_CMC.1: 1
    • ALC_CMC.2: 1
    • ALC_CMC.3: 1
    • ALC_CMC.4: 2
    • ALC_CMC.5: 1
    • ALC_CMS: 1
    • ALC_CMS.1: 1
    • ALC_CMS.2: 1
    • ALC_CMS.3: 1
    • ALC_CMS.4: 2
    • ALC_CMS.5: 1
    • ALC_DEL: 1
    • ALC_DEL.1: 2
    • ALC_DVS: 1
    • ALC_DVS.1: 2
    • ALC_DVS.2: 1
    • ALC_FLR: 1
    • ALC_FLR.1: 1
    • ALC_FLR.2: 1
    • ALC_FLR.3: 6
    • ALC_LCD.1: 2
    • ALC_LCD.2: 1
    • ALC_TAT: 1
    • ALC_TAT.1: 2
    • ALC_TAT.2: 1
    • ALC_TAT.3: 1
  • APE:
    • APE_CCL.1: 1
    • APE_ECD.1: 1
    • APE_INT.1: 1
    • APE_OBJ.1: 1
    • APE_OBJ.2: 1
    • APE_REQ.1: 1
    • APE_REQ.2: 1
    • APE_SPD.1: 1
  • ASE:
    • ASE_CCL: 1
    • ASE_CCL.1: 1
    • ASE_ECD: 1
    • ASE_ECD.1: 1
    • ASE_INT: 1
    • ASE_INT.1: 1
    • ASE_OBJ: 1
    • ASE_OBJ.1: 1
    • ASE_OBJ.2: 1
    • ASE_REQ.1: 1
    • ASE_REQ.2: 1
    • ASE_SPD: 1
    • ASE_SPD.1: 1
    • ASE_TSS: 1
    • ASE_TSS.1: 1
    • ASE_TSS.2: 1
  • ATE:
    • ATE_COV: 1
    • ATE_COV.1: 1
    • ATE_COV.2: 1
    • ATE_COV.3: 1
    • ATE_DPT: 1
    • ATE_DPT.1: 1
    • ATE_DPT.2: 1
    • ATE_DPT.3: 1
    • ATE_DPT.4: 1
    • ATE_FUN: 1
    • ATE_FUN.1: 1
    • ATE_FUN.2: 1
    • ATE_IND: 1
    • ATE_IND.1: 1
    • ATE_IND.2: 1
    • ATE_IND.3: 1
  • AVA:
    • AVA_VAN: 2
    • AVA_VAN.1: 1
    • AVA_VAN.2: 1
    • AVA_VAN.3: 1
    • AVA_VAN.4: 1
    • AVA_VAN.5: 1
  • ADV:
    • ADV_ARC: 1
    • ADV_FSP: 1
    • ADV_IMP: 1
    • ADV_SPM: 1
    • ADV_TDS: 1
  • AGD:
    • AGD_OPE: 2
    • AGD_PRE: 4
  • ALC:
    • ALC_CMS: 1
    • ALC_DEL: 1
    • ALC_DVS: 1
    • ALC_DVS.2: 2
    • ALC_FLR: 1
    • ALC_FLR.1: 1
    • ALC_LCD: 1
  • ASE:
    • ASE_CCL: 1
    • ASE_ECD: 1
    • ASE_INT: 1
    • ASE_OBJ: 1
    • ASE_SPD: 1
    • ASE_TSS: 1
  • ATE:
    • ATE_COV: 1
    • ATE_DPT: 1
    • ATE_FUN: 1
    • ATE_IND: 1
  • AVA:
    • AVA_VAN: 2
    • AVA_VAN.5: 3
pdf_data/report_keywords/vendor
  • Idemia:
    • IDEMIA: 23
  • Infineon:
    • Infineon: 25
    • Infineon Technologies: 1
    • Infineon Technologies AG: 2
  • Oberthur:
    • Oberthur Technologies: 1
pdf_data/report_keywords/eval_facility
  • atsec:
    • atsec: 3
  • CESTI:
    • CESTI: 1
  • Serma:
    • SERMA: 11
    • Serma Safety & Security: 1
pdf_data/report_keywords/symmetric_crypto
  • AES_competition:
    • AES:
      • AES-128: 1
      • AES-192: 1
      • AES-256: 1
  • DES:
    • DES:
      • DES: 2
pdf_data/report_keywords/crypto_protocol
  • TLS:
    • TLS:
      • TLS: 5
  • PACE:
    • PACE: 1
pdf_data/report_keywords/technical_report_id
  • BSI:
    • BSI 7125: 2
    • BSI 7148: 1
pdf_data/report_keywords/standard_id
  • BSI:
    • AIS 32: 1
  • CC:
    • CCMB-2017-04-001: 1
    • CCMB-2017-04-002: 1
    • CCMB-2017-04-003: 1
    • CCMB-2017-04-004: 1
  • ICAO:
    • ICAO: 2
pdf_data/report_keywords/certification_process
  • ConfidentialDocument:
    • Version 3, 25th May 2012, Final Evaluation Technical Report, atsec information security GmbH (confidential document) [8] Configuration lists for the TOE (confidential documents) [CIL-FLR] Lists the security flaw: 1
pdf_data/report_metadata
  • /Author: Bundesamt für Sicherheit in der Informationstechnik
  • /CreationDate: D:20120731090521+02'00'
  • /Creator: Writer
  • /Keywords: "Common Criteria, Certification, Zertifizierung, Access Control, TAMeb, TFIM, ISO 10181-3, aznAPI, Tivoli Access Manager for e-business Version 6.1.1 FP4 with Tivoli FederatedIdentity Manager 6.2.1 FP2"
  • /ModDate: D:20120731090934+02'00'
  • /Producer: OpenOffice.org 3.2
  • /Subject: Common Criteria Certification
  • /Title: Certification Report BSI-DSZ-CC-0636-2012
  • pdf_file_size_bytes: 1396851
  • pdf_hyperlinks: https://www.bsi.bund.dea/, https://www.bsi.bund.de/zertifizierung
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 38
  • /CreationDate: D:20200106135502+01'00'
  • /Creator: PScript5.dll Version 5.2.2
  • /ModDate: D:20200106135617+01'00'
  • /Producer: Acrobat Distiller 11.0 (Windows)
  • /Title:
  • pdf_file_size_bytes: 282050
  • pdf_hyperlinks: {}
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 18
pdf_data/st_filename 0636b_pdf.pdf anssi-cible-cc-2019_56en.pdf
pdf_data/st_keywords/cc_cert_id
  • DE:
    • BSI-DSZ-CC-0636: 1
  • DE:
    • BSI-DSZ-CC-1110-V2-2019: 1
pdf_data/st_keywords/cc_protection_profile_id
  • BSI:
    • BSI-CC-PP-0056: 1
    • BSI-CC-PP-0056-V2-: 1
    • BSI-PP-0002-2001: 1
    • BSI-PP-0055: 1
    • BSI-PP-0056: 1
    • BSI-PP-0084-2014: 1
pdf_data/st_keywords/cc_security_level
  • EAL:
    • EAL4: 2
  • EAL:
    • EAL4: 1
    • EAL4 augmented: 1
    • EAL5: 7
    • EAL5 augmented: 2
    • EAL6: 1
    • EAL6 augmented: 1
    • EAL6+: 1
pdf_data/st_keywords/cc_sar
  • ADV:
    • ADV_ARC.1: 1
    • ADV_FSP.4: 1
    • ADV_IMP.1: 1
    • ADV_TDS.3: 1
  • AGD:
    • AGD_OPE.1: 1
    • AGD_PRE.1: 1
  • ALC:
    • ALC_CMC.4: 1
    • ALC_CMS.4: 1
    • ALC_DEL.1: 1
    • ALC_DVS.1: 1
    • ALC_FLR.3: 4
    • ALC_LCD.1: 1
    • ALC_TAT.1: 1
  • ASE:
    • ASE_CCL.1: 1
    • ASE_ECD.1: 1
    • ASE_INT.1: 1
    • ASE_OBJ.2: 1
    • ASE_REQ.2: 1
    • ASE_SPD.1: 1
    • ASE_TSS.1: 1
  • ATE:
    • ATE_COV.2: 1
    • ATE_DPT.1: 1
    • ATE_FUN.1: 1
    • ATE_IND.2: 1
  • AVA:
    • AVA_VAN.3: 1
  • ADV:
    • ADV_ARC.1: 6
    • ADV_FSP.1: 2
    • ADV_FSP.2: 2
    • ADV_FSP.4: 1
    • ADV_FSP.5: 4
    • ADV_IMP.1: 4
    • ADV_INT.2: 1
    • ADV_TDS.1: 2
    • ADV_TDS.3: 3
    • ADV_TDS.4: 5
  • AGD:
    • AGD_OPE: 3
    • AGD_OPE.1: 6
    • AGD_PRE: 7
    • AGD_PRE.1: 2
  • ALC:
    • ALC_CMC.4: 1
    • ALC_CMS.5: 1
    • ALC_DEL.1: 1
    • ALC_DVS.1: 1
    • ALC_DVS.2: 8
    • ALC_FLR.3: 1
    • ALC_LCD.1: 2
    • ALC_SCT: 2
    • ALC_STM: 2
    • ALC_TAT.1: 2
    • ALC_TAT.2: 3
  • ASE:
    • ASE_CCL.1: 1
    • ASE_ECD.1: 1
    • ASE_INT.1: 3
    • ASE_OBJ.2: 3
    • ASE_REQ.1: 1
    • ASE_REQ.2: 1
    • ASE_SPD.1: 2
    • ASE_TSS.1: 1
  • ATE:
    • ATE_COV.1: 2
    • ATE_COV.2: 2
    • ATE_DPT.1: 2
    • ATE_DPT.3: 1
    • ATE_FUN.1: 4
    • ATE_IND.2: 1
  • AVA:
    • AVA_VAN.3: 1
    • AVA_VAN.5: 8
pdf_data/st_keywords/cc_sfr
  • FAU:
    • FAU_GEN.1: 11
    • FAU_GEN.1.1: 1
    • FAU_GEN.1.2: 1
    • FAU_GEN.2: 5
    • FAU_GEN.2.1: 1
    • FAU_SAR.1: 7
    • FAU_SAR.1.1: 1
    • FAU_SAR.1.2: 1
    • FAU_SEL.1: 6
    • FAU_SEL.1.1: 1
    • FAU_STG.1: 6
    • FAU_STG.1.1: 1
    • FAU_STG.1.2: 1
    • FAU_STG.3: 4
    • FAU_STG.3.1: 1
  • FDP:
    • FDP_ACC.1: 4
    • FDP_ACC.2: 16
    • FDP_ACC.2.1: 2
    • FDP_ACC.2.2: 2
    • FDP_ACF.1: 13
    • FDP_ACF.1.1: 2
    • FDP_ACF.1.2: 2
    • FDP_ACF.1.3: 2
    • FDP_ACF.1.4: 2
    • FDP_IFC.1: 2
  • FIA:
    • FIA_AFL.1: 5
    • FIA_AFL.1.1: 1
    • FIA_AFL.1.2: 2
    • FIA_ATD.1: 11
    • FIA_ATD.1.1: 1
    • FIA_SOS.1: 7
    • FIA_SOS.1.1: 1
    • FIA_UAU: 1
    • FIA_UAU.1: 8
    • FIA_UAU.1.1: 1
    • FIA_UAU.1.2: 1
    • FIA_UAU.2: 25
    • FIA_UAU.2.1: 4
    • FIA_UAU.5: 5
    • FIA_UAU.5.1: 1
    • FIA_UAU.5.2: 1
    • FIA_UAU.6: 5
    • FIA_UAU.6.1: 1
    • FIA_UID.1: 15
    • FIA_UID.1.1: 1
    • FIA_UID.1.2: 1
    • FIA_UID.2: 25
    • FIA_UID.2.1: 4
    • FIA_USB.1: 10
    • FIA_USB.1.1: 1
    • FIA_USB.1.2: 1
    • FIA_USB.1.3: 1
  • FMT:
    • FMT_MOF.1: 12
    • FMT_MOF.1.1: 1
    • FMT_MSA.1: 14
    • FMT_MSA.1.1: 2
    • FMT_MSA.3: 12
    • FMT_MSA.3.1: 1
    • FMT_MSA.3.2: 1
    • FMT_MTD.1: 11
    • FMT_MTD.1.1: 2
    • FMT_SMF.1: 19
    • FMT_SMF.1.1: 1
    • FMT_SMR.1: 10
    • FMT_SMR.1.1: 1
    • FMT_SMR.1.2: 1
  • FPT:
    • FPT_STM.1: 6
    • FPT_STM.1.1: 1
  • FAU:
    • FAU_GEN: 1
    • FAU_SAS: 5
    • FAU_SAS.1: 12
    • FAU_SAS.1.1: 3
  • FCS:
    • FCS_CKM: 36
    • FCS_CKM.1: 21
    • FCS_CKM.1.1: 1
    • FCS_CKM.2: 2
    • FCS_CKM.4: 43
    • FCS_CKM.4.1: 2
    • FCS_COP: 79
    • FCS_COP.1: 36
    • FCS_RND: 6
    • FCS_RND.1: 16
    • FCS_RND.1.1: 3
  • FDP:
    • FDP_ACC: 38
    • FDP_ACC.1: 16
    • FDP_ACC.1.1: 1
    • FDP_ACF: 39
    • FDP_ACF.1: 38
    • FDP_ACF.1.1: 1
    • FDP_ACF.1.2: 1
    • FDP_ACF.1.3: 1
    • FDP_ACF.1.4: 1
    • FDP_IFC.1: 4
    • FDP_ITC: 9
    • FDP_ITC.1: 12
    • FDP_ITC.2: 4
    • FDP_UCT: 21
    • FDP_UCT.1: 8
    • FDP_UCT.1.1: 1
    • FDP_UIT: 21
    • FDP_UIT.1: 14
    • FDP_UIT.1.1: 1
    • FDP_UIT.1.2: 1
  • FIA:
    • FIA_AFL: 7
    • FIA_AFL.1: 6
    • FIA_API: 11
    • FIA_API.1: 10
    • FIA_API.1.1: 2
    • FIA_SOS.2: 1
    • FIA_UAU: 38
    • FIA_UAU.1: 10
    • FIA_UAU.1.1: 2
    • FIA_UAU.1.2: 2
    • FIA_UAU.4: 11
    • FIA_UAU.4.1: 2
    • FIA_UAU.5: 11
    • FIA_UAU.5.1: 1
    • FIA_UAU.5.2: 1
    • FIA_UAU.6: 8
    • FIA_UAU.6.1: 1
    • FIA_UID.1: 12
    • FIA_UID.1.1: 2
    • FIA_UID.1.2: 2
  • FMT:
    • FMT_LIM: 6
    • FMT_LIM.1: 17
    • FMT_LIM.1.1: 3
    • FMT_LIM.2: 16
    • FMT_LIM.2.1: 3
    • FMT_MOF: 16
    • FMT_MOF.1: 10
    • FMT_MSA.1: 2
    • FMT_MSA.3: 7
    • FMT_MTD: 106
    • FMT_MTD.1: 74
    • FMT_MTD.3: 6
    • FMT_MTD.3.1: 2
    • FMT_SMF.1: 13
    • FMT_SMF.1.1: 2
    • FMT_SMR.1: 12
    • FMT_SMR.1.1: 2
    • FMT_SMR.1.2: 2
  • FPT:
    • FPT_EMS: 4
    • FPT_EMS.1: 16
    • FPT_EMS.1.1: 4
    • FPT_EMS.1.2: 4
    • FPT_FLS.1: 10
    • FPT_FLS.1.1: 2
    • FPT_PHP.3: 10
    • FPT_PHP.3.1: 2
    • FPT_TST.1: 8
    • FPT_TST.1.1: 2
    • FPT_TST.1.2: 2
    • FPT_TST.1.3: 2
  • FTP:
    • FTP_ITC: 6
    • FTP_ITC.1: 14
    • FTP_TRP.1: 3
pdf_data/st_keywords/cc_claims
  • A:
    • A.ADMIN: 3
    • A.ADM_PWMAN: 2
    • A.AUDIT_CONFIG: 3
    • A.CLIENT_KEYMAN: 2
    • A.CLIENT_PWMAN: 3
    • A.CRED_PROT: 5
    • A.DIR_PROT: 2
    • A.NOBYPASS: 6
    • A.OS_CONF_MGMT: 2
    • A.PHYS_PROT: 2
    • A.PROTECTED_NET: 3
    • A.PROTOCOL_SEC: 3
    • A.SEC_COM: 3
    • A.SINGLE_APP: 3
  • O:
    • O.ACCESS_DECISION: 16
    • O.ACC_ADM: 8
    • O.AUDITING: 13
    • O.AUTHENT_ADMIN: 11
    • O.AUTHENT_SERVER: 12
    • O.AUTHENT_USER: 8
    • O.AUTHENT_USERS: 1
    • O.AUTHORIZATION: 7
    • O.MANAGE: 11
    • O.PWD_STRENGH: 1
    • O.PWD_STRENGTH: 4
    • O.TIME: 4
  • OE:
    • OE.AUDIT_CONFIG: 3
    • OE.CREDEN: 5
    • OE.DS_ACCESS_CNTRL: 6
    • OE.DS_AUTHENT: 6
    • OE.INSTALL: 8
    • OE.OS_CONFFILE_PROT: 3
    • OE.OS_OPERATE: 6
    • OE.PHYSICAL: 4
    • OE.PROTOCOL_SEC: 3
    • OE.PWD_STRENGTH: 3
    • OE.SEC_COM: 3
    • OE.SEC_INTEGRATE: 3
  • T:
    • T.UAACTION: 2
    • T.UAUSER: 6
  • OE:
    • OE.BAC-PP: 1
    • OE.BAC_PP: 4
pdf_data/st_keywords/vendor
  • Microsoft:
    • Microsoft Corporation: 1
  • Idemia:
    • IDEMIA: 20
  • Infineon:
    • Infineon: 17
    • Infineon Technologies AG: 1
  • Morpho:
    • Morpho: 1
  • Oberthur:
    • Oberthur Technologies: 1
pdf_data/st_keywords/eval_facility
  • atsec:
    • atsec: 85
pdf_data/st_keywords/symmetric_crypto
  • AES_competition:
    • AES:
      • AES: 6
      • AES-: 1
  • DES:
    • 3DES:
      • TDEA: 4
    • DES:
      • DES: 3
  • constructions:
    • MAC:
      • HMAC: 1
  • AES_competition:
    • AES:
      • AES: 23
  • DES:
    • 3DES:
      • 3DES: 1
      • Triple-DES: 11
    • DES:
      • DES: 21
  • constructions:
    • MAC:
      • CMAC: 4
      • KMAC: 1
pdf_data/st_keywords/asymmetric_crypto
  • ECC:
    • ECC:
      • ECC: 2
    • ECDH:
      • ECDH: 1
    • ECDSA:
      • ECDSA: 2
  • FF:
    • DH:
      • DH: 1
      • Diffie-Hellman: 1
pdf_data/st_keywords/hash_function
  • SHA:
    • SHA1:
      • SHA-1: 2
    • SHA2:
      • SHA-224: 1
  • SHA:
    • SHA1:
      • SHA-1: 4
    • SHA2:
      • SHA-224: 4
      • SHA-256: 7
      • SHA-384: 2
      • SHA-512: 3
pdf_data/st_keywords/crypto_scheme
  • MAC:
    • MAC: 2
pdf_data/st_keywords/crypto_protocol
  • TLS:
    • SSL:
      • SSL: 2
    • TLS:
      • TLS: 45
      • TLS v1.0: 16
  • PACE:
    • PACE: 15
pdf_data/st_keywords/randomness
  • RNG:
    • RNG: 1
pdf_data/st_keywords/cipher_mode
  • CBC:
    • CBC: 9
  • ECB:
    • ECB: 1
pdf_data/st_keywords/tls_cipher_suite
  • TLS:
    • TLS_RSA_WITH_AES_128_CBC_SHA: 1
pdf_data/st_keywords/side_channel_analysis
  • FI:
    • Malfunction: 7
    • Physical Tampering: 6
    • Physical tampering: 1
    • fault injection: 1
    • malfunction: 5
    • physical tampering: 2
  • SCA:
    • DPA: 2
    • SPA: 1
    • physical probing: 3
    • timing attacks: 1
  • other:
    • reverse engineering: 2
pdf_data/st_keywords/technical_report_id
  • BSI:
    • BSI TR-03110: 1
pdf_data/st_keywords/ic_data_group
  • EF:
    • EF.COM: 23
    • EF.DG1: 25
    • EF.DG13: 1
    • EF.DG14: 5
    • EF.DG15: 3
    • EF.DG16: 25
    • EF.DG2: 7
    • EF.DG3: 19
    • EF.DG4: 19
    • EF.DG5: 6
    • EF.SOD: 19
pdf_data/st_keywords/standard_id
  • BSI:
    • AIS 20: 1
    • BSI-AIS20: 1
  • FIPS:
    • FIPS140-2: 1
    • FIPS180-2: 1
    • FIPS186-2: 1
    • FIPS197: 1
    • FIPS46-3: 1
    • FIPS81: 1
  • ISO:
    • ISO/IEC 15408: 2
  • RFC:
    • RFC 2246: 1
    • RFC 2313: 1
    • RFC 3268: 1
    • RFC2246: 1
    • RFC2313: 1
    • RFC3268: 1
  • X509:
    • X.509: 2
  • CC:
    • CCMB-2012-09-001: 1
    • CCMB-2012-09-002: 1
    • CCMB-2012-09-003: 1
    • CCMB-2012-09-004: 1
  • FIPS:
    • FIPS 180-2: 1
    • FIPS 186-3: 1
    • FIPS 197: 1
    • FIPS 46-3: 1
    • FIPS PUB 197: 1
  • ICAO:
    • ICAO: 13
  • ISO:
    • ISO/IEC 14443: 2
    • ISO/IEC 18013: 10
    • ISO/IEC 7816-4: 1
    • ISO/IEC 9797-1: 1
  • PKCS:
    • PKCS#3: 1
  • RFC:
    • RFC3369: 1
  • SCP:
    • SCP02: 1
pdf_data/st_metadata
  • /Author: Scott Chapman
  • /CreationDate: D:20120516114444-05'00'
  • /Creator: Microsoft® Office Word 2007
  • /Keywords: TAMeb, TFIM
  • /ModDate: D:20120731152053+02'00'
  • /Producer: Microsoft® Office Word 2007
  • /Title: Tivoli Access Manager for e-business Version 6.1.1 FP4 with Tivoli Federated Identity Manager 6.2.1 FP2 Security Target
  • pdf_file_size_bytes: 996333
  • pdf_hyperlinks: http://www.oasis-open.org/committees/download.php/6837/sstc-saml-tech-overview-1.1-cd.pdf
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 83
  • /Author: CHOPIN Irina
  • /CreationDate: D:20190718230026+02'00'
  • /Creator: Microsoft® Word 2016
  • /ModDate: D:20190718230026+02'00'
  • /Producer: Microsoft® Word 2016
  • pdf_file_size_bytes: 3299063
  • pdf_hyperlinks: {}
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 119
state/report/convert_garbage False True
state/report/pdf_hash Different Different
state/report/txt_hash Different Different
state/st/pdf_hash Different Different
state/st/txt_hash Different Different