Comparing certificates Experimental feature

You are comparing two certificates. By default, only differing attributes are shown. Use the button below to show/hide all attributes.

Showing only differing attributes.
IBM Tivoli Access Manager for e-business version 6.1.1 FP4 with IBM Tivoli Federated Identity Manager version 6.2.1 FP2
BSI-DSZ-CC-0636-2012
Cisco Catalyst Switches (3560C, 3560X, and 3750X) Running IOS 15.0(2)SE4
CCEVS-VR-VID-10515-2014
name IBM Tivoli Access Manager for e-business version 6.1.1 FP4 with IBM Tivoli Federated Identity Manager version 6.2.1 FP2 Cisco Catalyst Switches (3560C, 3560X, and 3750X) Running IOS 15.0(2)SE4
category Access Control Devices and Systems Network and Network-Related Devices and Systems
scheme DE US
not_valid_after 01.09.2019 31.01.2016
not_valid_before 22.06.2012 31.01.2014
report_link https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/0636a_pdf.pdf https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/st_vid10515-vr.pdf
st_link https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/0636b_pdf.pdf https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/st_vid10515-st.pdf
manufacturer IBM Corporation Cisco Systems, Inc.
manufacturer_web https://www.ibm.com https://www.cisco.com
security_level EAL4+, ALC_FLR.3 {}
dgst ab61ad860c8f4c38 d0112a5b780d4413
heuristics/cert_id BSI-DSZ-CC-0636-2012 CCEVS-VR-VID-10515-2014
heuristics/cert_lab BSI US
heuristics/cpe_matches cpe:2.3:a:ibm:tivoli_access_manager_for_e-business:6.1.1.7:*:*:*:*:*:*:*, cpe:2.3:a:ibm:tivoli_access_manager_for_e-business:6.1.1.16:*:*:*:*:*:*:*, cpe:2.3:a:ibm:tivoli_access_manager_for_e-business:6.1.1.25:*:*:*:*:*:*:*, cpe:2.3:a:ibm:tivoli_access_manager_for_e-business:6.1.1.22:*:*:*:*:*:*:*, cpe:2.3:a:ibm:tivoli_access_manager_for_e-business:6.1.1.21:*:*:*:*:*:*:*, cpe:2.3:a:ibm:tivoli_access_manager_for_e-business:6.1.1.28:*:*:*:*:*:*:*, cpe:2.3:a:ibm:tivoli_access_manager_for_e-business:6.1.1.13:*:*:*:*:*:*:*, cpe:2.3:a:ibm:tivoli_access_manager_for_e-business:6.1.1.27:*:*:*:*:*:*:*, cpe:2.3:a:ibm:tivoli_access_manager_for_e-business:6.1.1.23:*:*:*:*:*:*:*, cpe:2.3:a:ibm:tivoli_access_manager_for_e-business:6.1.1.5:*:*:*:*:*:*:*, cpe:2.3:a:ibm:tivoli_access_manager_for_e-business:6.1.1.3:*:*:*:*:*:*:*, cpe:2.3:a:ibm:tivoli_access_manager_for_e-business:6.1.1.6:*:*:*:*:*:*:*, cpe:2.3:a:ibm:tivoli_access_manager_for_e-business:6.1.1.29:*:*:*:*:*:*:*, cpe:2.3:a:ibm:tivoli_access_manager_for_e-business:6.1.1:*:*:*:*:*:*:*, cpe:2.3:a:ibm:tivoli_access_manager_for_e-business:6.1.1.18:*:*:*:*:*:*:*, cpe:2.3:a:ibm:tivoli_access_manager_for_e-business:6.1.1.4:*:*:*:*:*:*:*, cpe:2.3:a:ibm:tivoli_access_manager_for_e-business:6.1.1.20:*:*:*:*:*:*:*, cpe:2.3:a:ibm:tivoli_access_manager_for_e-business:6.1.1.19:*:*:*:*:*:*:*, cpe:2.3:a:ibm:tivoli_access_manager_for_e-business:6.1.1.12:*:*:*:*:*:*:*, cpe:2.3:a:ibm:tivoli_access_manager_for_e-business:6.1.1.2:*:*:*:*:*:*:*, cpe:2.3:a:ibm:tivoli_access_manager_for_e-business:6.1.1.24:*:*:*:*:*:*:*, cpe:2.3:a:ibm:tivoli_access_manager_for_e-business:6.1.1.17:*:*:*:*:*:*:*, cpe:2.3:a:ibm:tivoli_access_manager_for_e-business:6.1.1.9:*:*:*:*:*:*:*, cpe:2.3:a:ibm:tivoli_access_manager_for_e-business:6.1.1.8:*:*:*:*:*:*:*, cpe:2.3:a:ibm:tivoli_access_manager_for_e-business:6.1.1.1:*:*:*:*:*:*:*, cpe:2.3:a:ibm:tivoli_access_manager_for_e-business:6.1.1.26:*:*:*:*:*:*:*, cpe:2.3:a:ibm:tivoli_access_manager_for_e-business:6.1.1.11:*:*:*:*:*:*:*, cpe:2.3:a:ibm:tivoli_access_manager_for_e-business:6.1.1.10:*:*:*:*:*:*:*, cpe:2.3:a:ibm:tivoli_access_manager_for_e-business:6.1.1.15:*:*:*:*:*:*:*, cpe:2.3:a:ibm:tivoli_access_manager_for_e-business:6.1.1.30:*:*:*:*:*:*:*, cpe:2.3:a:ibm:tivoli_access_manager_for_e-business:6.1.1.14:*:*:*:*:*:*:* {}
heuristics/related_cves CVE-2010-4623, CVE-2017-1489, CVE-2010-4120, CVE-2011-0494 {}
heuristics/extracted_sars ASE_INT.1, ALC_CMC.4, ASE_ECD.1, APE_ECD.1, ADV_IMP.1, ATE_COV.2, ASE_TSS.1, ALC_TAT.1, ASE_SPD.1, ALC_DEL.1, ALC_LCD.1, ALC_FLR.3, AGD_OPE.1, AVA_VAN.3, AGD_PRE.1, ALC_CMS.4, ATE_FUN.1, APE_REQ.2, ADV_ARC.1, ASE_OBJ.2, APE_CCL.1, ADV_TDS.3, ATE_DPT.1, ASE_REQ.2, ALC_DVS.1, ADV_INT.3, APE_INT.1, APE_SPD.1, ADV_FSP.4, ATE_IND.2, APE_OBJ.2, ASE_CCL.1, ADV_SPM.1 ASE_TSS.1, ADV_FSP.1, ALC_CMC.1, ASE_INT.1, ASE_OBJ.1, AVA_VAN.1, ATE_IND.1, ALC_CMS.1, AGD_OPE.1, ASE_REQ.1, ASE_CCL.1, ASE_ECD.1, AGD_PRE.1
heuristics/extracted_versions 6.1.1, 6.2.1 15.0
heuristics/scheme_data
  • category: Network Device
  • certification_date: 31.01.2014
  • evaluation_facility: Leidos Common Criteria Testing Laboratory
  • expiration_date: 31.01.2016
  • id: CCEVS-VR-VID10515
  • product: Cisco Catalyst Switches (3560C, 3560X, and 3750X) Running IOS 15.0(2)SE4
  • scheme: US
  • url: https://www.niap-ccevs.org/product/10515
  • vendor: Cisco Systems, Inc.
heuristics/protection_profiles {} 573e14e647e056f2
protection_profile_links {} https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/pp_nd_v1.0.pdf
pdf_data/report_filename 0636a_pdf.pdf st_vid10515-vr.pdf
pdf_data/report_frontpage
  • DE:
    • cert_id: BSI-DSZ-CC-0636-2012
    • cert_item: IBM Tivoli Access Manager for e-Business version 6.1.1 FP4 with IBM Tivoli Federated Identity Manager version 6.2.1 FP2
    • cert_lab: BSI
    • developer: IBM Corporation
    • match_rules: ['(BSI-DSZ-CC-.+?) (?:for|For) (.+?) from (.*)']
  • US:
  • DE:
  • US:
    • cert_id: CCEVS-VR-VID10515-2014
    • cert_item:
    • cert_lab: US NIAP
pdf_data/report_keywords/cc_cert_id
  • DE:
    • BSI-DSZ-CC-0636-2012: 21
  • US:
    • CCEVS-VR-VID10515-2014: 2
pdf_data/report_keywords/cc_security_level
  • EAL:
    • EAL 4: 6
    • EAL 4 augmented: 3
    • EAL1: 7
    • EAL2: 3
    • EAL3: 4
    • EAL4: 6
    • EAL5: 6
    • EAL6: 3
    • EAL7: 4
  • ITSEC:
    • ITSEC Evaluation: 1
  • EAL:
    • EAL 1: 1
    • EAL 4: 2
    • EAL1: 1
pdf_data/report_keywords/cc_sar
  • ADV:
    • ADV_ARC: 1
    • ADV_ARC.1: 1
    • ADV_FSP: 1
    • ADV_FSP.1: 1
    • ADV_FSP.2: 1
    • ADV_FSP.3: 1
    • ADV_FSP.4: 1
    • ADV_FSP.5: 1
    • ADV_FSP.6: 1
    • ADV_IMP: 1
    • ADV_IMP.1: 1
    • ADV_IMP.2: 1
    • ADV_INT: 1
    • ADV_INT.1: 1
    • ADV_INT.2: 1
    • ADV_INT.3: 1
    • ADV_SPM: 1
    • ADV_SPM.1: 1
    • ADV_TDS: 1
    • ADV_TDS.1: 1
    • ADV_TDS.2: 1
    • ADV_TDS.3: 1
    • ADV_TDS.4: 1
    • ADV_TDS.5: 1
    • ADV_TDS.6: 1
  • AGD:
    • AGD_OPE: 1
    • AGD_OPE.1: 1
    • AGD_PRE: 1
    • AGD_PRE.1: 1
  • ALC:
    • ALC_CMC: 1
    • ALC_CMC.1: 1
    • ALC_CMC.2: 1
    • ALC_CMC.3: 1
    • ALC_CMC.4: 2
    • ALC_CMC.5: 1
    • ALC_CMS: 1
    • ALC_CMS.1: 1
    • ALC_CMS.2: 1
    • ALC_CMS.3: 1
    • ALC_CMS.4: 2
    • ALC_CMS.5: 1
    • ALC_DEL: 1
    • ALC_DEL.1: 2
    • ALC_DVS: 1
    • ALC_DVS.1: 2
    • ALC_DVS.2: 1
    • ALC_FLR: 1
    • ALC_FLR.1: 1
    • ALC_FLR.2: 1
    • ALC_FLR.3: 6
    • ALC_LCD.1: 2
    • ALC_LCD.2: 1
    • ALC_TAT: 1
    • ALC_TAT.1: 2
    • ALC_TAT.2: 1
    • ALC_TAT.3: 1
  • APE:
    • APE_CCL.1: 1
    • APE_ECD.1: 1
    • APE_INT.1: 1
    • APE_OBJ.1: 1
    • APE_OBJ.2: 1
    • APE_REQ.1: 1
    • APE_REQ.2: 1
    • APE_SPD.1: 1
  • ASE:
    • ASE_CCL: 1
    • ASE_CCL.1: 1
    • ASE_ECD: 1
    • ASE_ECD.1: 1
    • ASE_INT: 1
    • ASE_INT.1: 1
    • ASE_OBJ: 1
    • ASE_OBJ.1: 1
    • ASE_OBJ.2: 1
    • ASE_REQ.1: 1
    • ASE_REQ.2: 1
    • ASE_SPD: 1
    • ASE_SPD.1: 1
    • ASE_TSS: 1
    • ASE_TSS.1: 1
    • ASE_TSS.2: 1
  • ATE:
    • ATE_COV: 1
    • ATE_COV.1: 1
    • ATE_COV.2: 1
    • ATE_COV.3: 1
    • ATE_DPT: 1
    • ATE_DPT.1: 1
    • ATE_DPT.2: 1
    • ATE_DPT.3: 1
    • ATE_DPT.4: 1
    • ATE_FUN: 1
    • ATE_FUN.1: 1
    • ATE_FUN.2: 1
    • ATE_IND: 1
    • ATE_IND.1: 1
    • ATE_IND.2: 1
    • ATE_IND.3: 1
  • AVA:
    • AVA_VAN: 2
    • AVA_VAN.1: 1
    • AVA_VAN.2: 1
    • AVA_VAN.3: 1
    • AVA_VAN.4: 1
    • AVA_VAN.5: 1
  • ADV:
    • ADV_FSP.1: 1
  • AGD:
    • AGD_OPE.1: 1
    • AGD_PRE.1: 1
  • ALC:
    • ALC_CMC.1: 1
    • ALC_CMS.1: 1
  • ASE:
    • ASE_CCL.1: 1
    • ASE_ECD.1: 1
    • ASE_INT.1: 1
    • ASE_OBJ.1: 1
    • ASE_REQ.1: 1
    • ASE_TSS.1: 1
  • ATE:
    • ATE_IND.1: 1
  • AVA:
    • AVA_VAN.1: 1
pdf_data/report_keywords/cc_sfr
  • FPT:
    • FPT_TUD_EXT.1.3: 1
pdf_data/report_keywords/vendor
  • Cisco:
    • Cisco: 70
    • Cisco Systems, Inc: 2
pdf_data/report_keywords/eval_facility
  • atsec:
    • atsec: 3
  • Leidos:
    • Leidos: 5
pdf_data/report_keywords/symmetric_crypto
  • AES_competition:
    • AES:
      • AES: 1
pdf_data/report_keywords/hash_function
  • MD:
    • MD5:
      • MD5: 3
  • SHA:
    • SHA1:
      • SHA1: 1
pdf_data/report_keywords/crypto_protocol
  • TLS:
    • TLS:
      • TLS: 5
  • IPsec:
    • IPsec: 7
pdf_data/report_keywords/technical_report_id
  • BSI:
    • BSI 7125: 2
    • BSI 7148: 1
pdf_data/report_keywords/standard_id
  • BSI:
    • AIS 32: 1
  • FIPS:
    • FIPS 140-2: 1
pdf_data/report_keywords/certification_process
  • ConfidentialDocument:
    • Version 3, 25th May 2012, Final Evaluation Technical Report, atsec information security GmbH (confidential document) [8] Configuration lists for the TOE (confidential documents) [CIL-FLR] Lists the security flaw: 1
pdf_data/report_metadata
  • /Author: Bundesamt für Sicherheit in der Informationstechnik
  • /CreationDate: D:20120731090521+02'00'
  • /Creator: Writer
  • /Keywords: "Common Criteria, Certification, Zertifizierung, Access Control, TAMeb, TFIM, ISO 10181-3, aznAPI, Tivoli Access Manager for e-business Version 6.1.1 FP4 with Tivoli FederatedIdentity Manager 6.2.1 FP2"
  • /ModDate: D:20120731090934+02'00'
  • /Producer: OpenOffice.org 3.2
  • /Subject: Common Criteria Certification
  • /Title: Certification Report BSI-DSZ-CC-0636-2012
  • pdf_file_size_bytes: 1396851
  • pdf_hyperlinks: https://www.bsi.bund.dea/, https://www.bsi.bund.de/zertifizierung
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 38
  • /CreationDate: D:20140131162850-05'00'
  • /ModDate: D:20140131163619-05'00'
  • /Producer: iText 2.1.0 (by lowagie.com)
  • pdf_file_size_bytes: 398590
  • pdf_hyperlinks: {}
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 18
pdf_data/st_filename 0636b_pdf.pdf st_vid10515-st.pdf
pdf_data/st_keywords/cc_cert_id
  • DE:
    • BSI-DSZ-CC-0636: 1
pdf_data/st_keywords/cc_security_level
  • EAL:
    • EAL4: 2
  • EAL:
    • EAL1: 1
pdf_data/st_keywords/cc_sar
  • ADV:
    • ADV_ARC.1: 1
    • ADV_FSP.4: 1
    • ADV_IMP.1: 1
    • ADV_TDS.3: 1
  • AGD:
    • AGD_OPE.1: 1
    • AGD_PRE.1: 1
  • ALC:
    • ALC_CMC.4: 1
    • ALC_CMS.4: 1
    • ALC_DEL.1: 1
    • ALC_DVS.1: 1
    • ALC_FLR.3: 4
    • ALC_LCD.1: 1
    • ALC_TAT.1: 1
  • ASE:
    • ASE_CCL.1: 1
    • ASE_ECD.1: 1
    • ASE_INT.1: 1
    • ASE_OBJ.2: 1
    • ASE_REQ.2: 1
    • ASE_SPD.1: 1
    • ASE_TSS.1: 1
  • ATE:
    • ATE_COV.2: 1
    • ATE_DPT.1: 1
    • ATE_FUN.1: 1
    • ATE_IND.2: 1
  • AVA:
    • AVA_VAN.3: 1
  • ADV:
    • ADV_FSP.1: 2
  • AGD:
    • AGD_OPE.1: 2
    • AGD_PRE.1: 2
  • ALC:
    • ALC_CMC.1: 2
    • ALC_CMS.1: 2
  • ATE:
    • ATE_IND.1: 2
  • AVA:
    • AVA_VAN.1: 2
pdf_data/st_keywords/cc_sfr
  • FAU:
    • FAU_GEN.1: 11
    • FAU_GEN.1.1: 1
    • FAU_GEN.1.2: 1
    • FAU_GEN.2: 5
    • FAU_GEN.2.1: 1
    • FAU_SAR.1: 7
    • FAU_SAR.1.1: 1
    • FAU_SAR.1.2: 1
    • FAU_SEL.1: 6
    • FAU_SEL.1.1: 1
    • FAU_STG.1: 6
    • FAU_STG.1.1: 1
    • FAU_STG.1.2: 1
    • FAU_STG.3: 4
    • FAU_STG.3.1: 1
  • FDP:
    • FDP_ACC.1: 4
    • FDP_ACC.2: 16
    • FDP_ACC.2.1: 2
    • FDP_ACC.2.2: 2
    • FDP_ACF.1: 13
    • FDP_ACF.1.1: 2
    • FDP_ACF.1.2: 2
    • FDP_ACF.1.3: 2
    • FDP_ACF.1.4: 2
    • FDP_IFC.1: 2
  • FIA:
    • FIA_AFL.1: 5
    • FIA_AFL.1.1: 1
    • FIA_AFL.1.2: 2
    • FIA_ATD.1: 11
    • FIA_ATD.1.1: 1
    • FIA_SOS.1: 7
    • FIA_SOS.1.1: 1
    • FIA_UAU: 1
    • FIA_UAU.1: 8
    • FIA_UAU.1.1: 1
    • FIA_UAU.1.2: 1
    • FIA_UAU.2: 25
    • FIA_UAU.2.1: 4
    • FIA_UAU.5: 5
    • FIA_UAU.5.1: 1
    • FIA_UAU.5.2: 1
    • FIA_UAU.6: 5
    • FIA_UAU.6.1: 1
    • FIA_UID.1: 15
    • FIA_UID.1.1: 1
    • FIA_UID.1.2: 1
    • FIA_UID.2: 25
    • FIA_UID.2.1: 4
    • FIA_USB.1: 10
    • FIA_USB.1.1: 1
    • FIA_USB.1.2: 1
    • FIA_USB.1.3: 1
  • FMT:
    • FMT_MOF.1: 12
    • FMT_MOF.1.1: 1
    • FMT_MSA.1: 14
    • FMT_MSA.1.1: 2
    • FMT_MSA.3: 12
    • FMT_MSA.3.1: 1
    • FMT_MSA.3.2: 1
    • FMT_MTD.1: 11
    • FMT_MTD.1.1: 2
    • FMT_SMF.1: 19
    • FMT_SMF.1.1: 1
    • FMT_SMR.1: 10
    • FMT_SMR.1.1: 1
    • FMT_SMR.1.2: 1
  • FPT:
    • FPT_STM.1: 6
    • FPT_STM.1.1: 1
  • FAU:
    • FAU_GEN: 5
    • FAU_GEN.1: 7
    • FAU_GEN.1.1: 1
    • FAU_GEN.1.2: 2
    • FAU_GEN.2: 5
    • FAU_GEN.2.1: 1
    • FAU_STG_EXT: 8
    • FAU_STG_EXT.1: 6
    • FAU_STG_EXT.1.1: 1
    • FAU_STG_EXT.3: 4
    • FAU_STG_EXT.3.1: 1
  • FCS:
    • FCS_CKM: 2
    • FCS_CKM.1: 15
    • FCS_CKM.1.1: 1
    • FCS_CKM.4: 1
    • FCS_CKM_EXT: 4
    • FCS_CKM_EXT.4: 7
    • FCS_CKM_EXT.4.1: 1
    • FCS_COP.1: 32
    • FCS_COP.1.1: 4
    • FCS_RBG_EXT: 3
    • FCS_RBG_EXT.1: 4
    • FCS_RBG_EXT.1.1: 1
    • FCS_RBG_EXT.1.2: 1
    • FCS_SSH_EXT.1: 1
    • FCS_TLS_EXT.1: 2
  • FDP:
    • FDP_IFF.1: 3
    • FDP_ITC.1: 5
    • FDP_ITC.2: 1
    • FDP_RIP: 2
    • FDP_RIP.2: 5
    • FDP_RIP.2.1: 1
  • FIA:
    • FIA_PMG_EXT: 3
    • FIA_PMG_EXT.1: 4
    • FIA_PMG_EXT.1.1: 1
    • FIA_UAU: 4
    • FIA_UAU.1: 1
    • FIA_UAU.6: 5
    • FIA_UAU.6.1: 1
    • FIA_UAU.7: 5
    • FIA_UAU.7.1: 1
    • FIA_UAU_EXT: 3
    • FIA_UAU_EXT.5: 5
    • FIA_UAU_EXT.5.1: 1
    • FIA_UAU_EXT.5.2: 1
    • FIA_UIA_EXT: 3
    • FIA_UIA_EXT.1: 8
    • FIA_UIA_EXT.1.1: 1
    • FIA_UIA_EXT.1.2: 1
    • FIA_UID.1: 2
  • FMT:
    • FMT_MTD: 2
    • FMT_MTD.1: 5
    • FMT_MTD.1.1: 1
    • FMT_SFR.1: 1
    • FMT_SMF: 2
    • FMT_SMF.1: 5
    • FMT_SMF.1.1: 1
    • FMT_SMR: 2
    • FMT_SMR.1: 6
    • FMT_SMR.1.1: 1
    • FMT_SMR.1.2: 1
  • FPT:
    • FPT_ITT.1: 14
    • FPT_ITT.1.1: 2
    • FPT_PTD.1: 7
    • FPT_PTD_EXT: 2
    • FPT_PTD_EXT.1: 9
    • FPT_PTD_EXT.1.1: 2
    • FPT_PTD_EXT.2: 1
    • FPT_RPL: 2
    • FPT_RPL.1: 5
    • FPT_RPL.1.1: 1
    • FPT_RPL.1.2: 1
    • FPT_STM: 2
    • FPT_STM.1: 7
    • FPT_STM.1.1: 1
    • FPT_TST_EXT: 3
    • FPT_TST_EXT.1: 5
    • FPT_TST_EXT.1.1: 1
    • FPT_TUD_EXT: 3
    • FPT_TUD_EXT.1: 5
    • FPT_TUD_EXT.1.1: 1
    • FPT_TUD_EXT.1.2: 1
    • FPT_TUD_EXT.1.3: 1
  • FRU:
    • FRU_RSA: 2
    • FRU_RSA.1: 5
    • FRU_RSA.1.1: 1
  • FTA:
    • FTA_SSL: 3
    • FTA_SSL.3: 6
    • FTA_SSL.3.1: 1
    • FTA_SSL_EXT: 3
    • FTA_SSL_EXT.1: 6
    • FTA_SSL_EXT.1.1: 1
    • FTA_TAB: 2
    • FTA_TAB.1: 5
    • FTA_TAB.1.1: 1
  • FTP:
    • FTP_ITC: 1
    • FTP_ITC.1: 14
    • FTP_ITC.1.1: 2
    • FTP_ITC.1.2: 2
    • FTP_ITC.1.3: 2
    • FTP_TRP.1: 14
    • FTP_TRP.1.1: 2
    • FTP_TRP.1.2: 2
    • FTP_TRP.1.3: 2
pdf_data/st_keywords/cc_claims
  • A:
    • A.ADMIN: 3
    • A.ADM_PWMAN: 2
    • A.AUDIT_CONFIG: 3
    • A.CLIENT_KEYMAN: 2
    • A.CLIENT_PWMAN: 3
    • A.CRED_PROT: 5
    • A.DIR_PROT: 2
    • A.NOBYPASS: 6
    • A.OS_CONF_MGMT: 2
    • A.PHYS_PROT: 2
    • A.PROTECTED_NET: 3
    • A.PROTOCOL_SEC: 3
    • A.SEC_COM: 3
    • A.SINGLE_APP: 3
  • O:
    • O.ACCESS_DECISION: 16
    • O.ACC_ADM: 8
    • O.AUDITING: 13
    • O.AUTHENT_ADMIN: 11
    • O.AUTHENT_SERVER: 12
    • O.AUTHENT_USER: 8
    • O.AUTHENT_USERS: 1
    • O.AUTHORIZATION: 7
    • O.MANAGE: 11
    • O.PWD_STRENGH: 1
    • O.PWD_STRENGTH: 4
    • O.TIME: 4
  • OE:
    • OE.AUDIT_CONFIG: 3
    • OE.CREDEN: 5
    • OE.DS_ACCESS_CNTRL: 6
    • OE.DS_AUTHENT: 6
    • OE.INSTALL: 8
    • OE.OS_CONFFILE_PROT: 3
    • OE.OS_OPERATE: 6
    • OE.PHYSICAL: 4
    • OE.PROTOCOL_SEC: 3
    • OE.PWD_STRENGTH: 3
    • OE.SEC_COM: 3
    • OE.SEC_INTEGRATE: 3
  • T:
    • T.UAACTION: 2
    • T.UAUSER: 6
  • A:
    • A.NO_GENERAL_PURPOSE: 3
    • A.PHYSICAL: 3
    • A.TRUSTED_ADMIN: 3
  • O:
    • O.DISPLAY_BANNER: 4
    • O.PROTECTED_COMMUNIC: 1
    • O.PROTECTED_COMMUNICATIO: 1
    • O.PROTECTED_COMMUNICATIONS: 4
    • O.RESIDUAL_INFORMATIO: 1
    • O.RESIDUAL_INFORMATION_CL: 1
    • O.RESIDUAL_INFORMATION_CLEARI: 1
    • O.RESIDUAL_INFORMATION_CLEARING: 1
    • O.RESOURCE_AVAILABILI: 1
    • O.RESOURCE_AVAILABILITY: 5
    • O.SESSION_LOCK: 4
    • O.SYSTEM_MONITORING: 6
    • O.TOE_ADMINISTRATION: 6
    • O.TSF_SELF_TEST: 6
    • O.VERIFIABLE_UPDATES: 4
  • OE:
    • OE.NO_GENERAL_PURPO: 1
    • OE.NO_GENERAL_PURPOSE: 2
    • OE.PHYSICAL: 3
    • OE.TRUSTED_ADMIN: 2
  • T:
    • T.ADMIN_ERROR: 3
    • T.RESOURCE_EXHAUSTION: 3
    • T.TSF_FAILURE: 3
    • T.UNAUTHORIZED_ACCESS: 3
    • T.UNAUTHORIZED_UPDATE: 2
    • T.UNDETECTED_ACTIONS: 2
    • T.USER_DATA_REUSE: 2
pdf_data/st_keywords/vendor
  • Microsoft:
    • Microsoft Corporation: 1
  • Cisco:
    • Cisco: 57
    • Cisco Systems: 1
    • Cisco Systems, Inc: 3
pdf_data/st_keywords/eval_facility
  • atsec:
    • atsec: 85
pdf_data/st_keywords/symmetric_crypto
  • AES_competition:
    • AES:
      • AES: 6
      • AES-: 1
  • DES:
    • 3DES:
      • TDEA: 4
    • DES:
      • DES: 3
  • constructions:
    • MAC:
      • HMAC: 1
  • AES_competition:
    • AES:
      • AES: 9
      • AES-: 1
  • DES:
    • 3DES:
      • 3DES: 1
      • TDES: 1
    • DES:
      • DES: 1
  • constructions:
    • MAC:
      • HMAC: 1
pdf_data/st_keywords/asymmetric_crypto
  • FF:
    • DH:
      • DH: 6
      • Diffie-Hellman: 2
pdf_data/st_keywords/hash_function
  • SHA:
    • SHA1:
      • SHA-1: 2
    • SHA2:
      • SHA-224: 1
  • MD:
    • MD5:
      • MD5: 1
  • SHA:
    • SHA1:
      • SHA-1: 2
      • SHA1: 1
    • SHA2:
      • SHA-256: 1
      • SHA-512: 2
      • SHA256: 1
      • SHA512: 1
pdf_data/st_keywords/crypto_scheme
  • KEX:
    • Key Exchange: 1
  • MAC:
    • MAC: 3
pdf_data/st_keywords/crypto_protocol
  • TLS:
    • SSL:
      • SSL: 2
    • TLS:
      • TLS: 45
      • TLS v1.0: 16
  • IKE:
    • IKE: 22
    • IKEv1: 6
  • IPsec:
    • IPsec: 66
  • SSH:
    • SSH: 2
    • SSHv2: 4
  • TLS:
    • TLS:
      • TLS: 1
  • VPN:
    • VPN: 1
pdf_data/st_keywords/randomness
  • RNG:
    • RNG: 1
  • PRNG:
    • DRBG: 3
    • PRNG: 1
  • RNG:
    • RBG: 2
    • RNG: 2
pdf_data/st_keywords/cipher_mode
  • CBC:
    • CBC: 2
pdf_data/st_keywords/ecc_curve
  • NIST:
    • P-256: 2
    • P-384: 2
    • P-521: 2
pdf_data/st_keywords/tls_cipher_suite
  • TLS:
    • TLS_RSA_WITH_AES_128_CBC_SHA: 1
pdf_data/st_keywords/tee_name
  • IBM:
    • SE: 1
pdf_data/st_keywords/standard_id
  • BSI:
    • AIS 20: 1
    • BSI-AIS20: 1
  • FIPS:
    • FIPS140-2: 1
    • FIPS180-2: 1
    • FIPS186-2: 1
    • FIPS197: 1
    • FIPS46-3: 1
    • FIPS81: 1
  • ISO:
    • ISO/IEC 15408: 2
  • RFC:
    • RFC 2246: 1
    • RFC 2313: 1
    • RFC 3268: 1
    • RFC2246: 1
    • RFC2313: 1
    • RFC3268: 1
  • X509:
    • X.509: 2
  • FIPS:
    • FIPS 140-2: 4
    • FIPS PUB 180-3: 2
    • FIPS PUB 186-3: 3
    • FIPS PUB 197: 2
  • NIST:
    • NIST SP 800-38A: 2
    • NIST SP 800-38D: 2
    • NIST SP 800-56B: 1
    • SP 800-90: 1
    • SP 900-90A: 1
  • RFC:
    • RFC 0791: 1
    • RFC 0894: 1
    • RFC 1059: 1
    • RFC 1119: 1
    • RFC 1305: 1
    • RFC 1492: 1
    • RFC 2460: 1
    • RFC 2865: 1
    • RFC 3162: 1
    • RFC 3602: 1
    • RFC 4109: 1
    • RFC 4303: 1
pdf_data/st_metadata
  • /Author: Scott Chapman
  • /CreationDate: D:20120516114444-05'00'
  • /Creator: Microsoft® Office Word 2007
  • /Keywords: TAMeb, TFIM
  • /ModDate: D:20120731152053+02'00'
  • /Producer: Microsoft® Office Word 2007
  • /Title: Tivoli Access Manager for e-business Version 6.1.1 FP4 with Tivoli Federated Identity Manager 6.2.1 FP2 Security Target
  • pdf_file_size_bytes: 996333
  • pdf_hyperlinks: http://www.oasis-open.org/committees/download.php/6837/sstc-saml-tech-overview-1.1-cd.pdf
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 83
  • /Author: Cisco TME
  • /Company: Cisco Systems, Inc.
  • /CreationDate: D:20140131154418-05'00'
  • /Creator: Acrobat PDFMaker 10.1 for Word
  • /Keywords:
  • /ModDate: D:20140131154426-05'00'
  • /Producer: Adobe PDF Library 10.0
  • /SourceModified: D:20140131163737
  • /Subject:
  • /Title: Security Target
  • /_NewReviewCycle:
  • pdf_file_size_bytes: 527695
  • pdf_hyperlinks: {}
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 68
state/report/pdf_hash Different Different
state/report/txt_hash Different Different
state/st/pdf_hash Different Different
state/st/txt_hash Different Different