Comparing certificates Experimental feature

You are comparing two certificates. By default, only differing attributes are shown. Use the button below to show/hide all attributes.

Showing only differing attributes.
WorkCentre® 6655/6655i 2016 Xerox® ConnectKey® Technology
383-4-354
Juniper Networks Junos Pulse Secure Access Service 7.2 R4
ISCB-5-RPT-C040-CR-v1a
name WorkCentre® 6655/6655i 2016 Xerox® ConnectKey® Technology Juniper Networks Junos Pulse Secure Access Service 7.2 R4
category Multi-Function Devices Network and Network-Related Devices and Systems
scheme CA MY
not_valid_after 17.08.2021 15.07.2018
not_valid_before 17.08.2016 15.07.2013
cert_link https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/383-4-354%20Certificate%20original%20signed%20v1.0e.docx
report_link https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/383-4-354%20CR%20v1.0e.pdf https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/ISCB-5-RPT-C040-CR-v1a.pdf
st_link https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/Xerox%20CK2.0%20WorkCentre%206655_ST_1.2.pdf https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/JNPR%20SA%207.2R4%20EAL3%20ST%20v1.4.pdf
manufacturer Xerox Corporation HPE Juniper Networking
manufacturer_web https://www.xerox.com https://www.juniper.net/
security_level ALC_FLR.3, EAL2+ ALC_FLR.2, EAL3+
dgst ca8e54b9b85a764e 7116d2046dcede84
heuristics/cert_id 383-4-354 ISCB-5-RPT-C040-CR-v1a
heuristics/cpe_matches cpe:2.3:h:xerox:workcentre_6655:-:*:*:*:*:*:*:*, cpe:2.3:h:xerox:workcentre_6655i:-:*:*:*:*:*:*:* {}
heuristics/extracted_sars ALC_FLR.3, ASE_CCL.1, ATE_FUN.1, ASE_OBJ.2, ALC_CMS.2, ASE_INT.1, ASE_REQ.2, AGD_PRE.1, ATE_IND.2, ASE_ECD.1, AVA_VAN.2, ADV_TDS.1, ASE_SPD.1, ALC_CMC.2, ADV_FSP.2, ATE_COV.1, AGD_OPE.1, ALC_DEL.1, ASE_TSS.1, ADV_ARC.1 ASE_CCL.1, ATE_FUN.1, ASE_OBJ.2, ASE_INT.1, ASE_REQ.2, AGD_PRE.1, ATE_IND.2, ATE_DPT.1, ASE_ECD.1, AVA_VAN.2, ADV_FSP.3, ALC_LCD.1, ALC_FLR.2, ASE_SPD.1, ATE_COV.2, ALC_CMC.3, ADV_TDS.2, ALC_DVS.1, ALC_CMS.3, AGD_OPE.1, ALC_DEL.1, ASE_TSS.1, ADV_ARC.1
heuristics/extracted_versions 6655, 2016 7.2
heuristics/scheme_data
  • cert_no: 2013-004-C040
  • certification_date: 15.07.2013
  • developer: Juniper Networks, Inc.
  • enhanced:
    • assurance_level: EAL3+ALC_FLR.2
    • category: Access Control Devices and System
    • cert_id: C040
    • certification_date: 15.07.2013
    • developer: Juniper Networks, Inc1194 North Matilda Avenue,Sunnyvale, California 94089-1206UNITED STATES URL:http://www.juniper.netEmail: [email protected]: 978 589 8822
    • expiration_date: 15.07.2018
    • mutual_recognition: CCRA
    • product: Juniper Networks Junos Pulse Secure Access Service 7.2 R4
    • report_link: https://iscb.cybersecurity.my/resources/document/mycc/mycpr/C040/ISCB-5-RPT-C040-CR-v1a.pdf
    • scope: The Target of Evaluation (TOE) is Juniper Networks Junos Pulse Secure Access Service 7.2 R4 (hereafter referred as Secure Access) is the appliance and software client running on a remote IT system. The TOE provides secure remote access to internal network resources. The TOE acts as a secure application-layer gateway that intermediates all request between remote computers and internal corporate resources. All requests from remote computers to a Secure Access appliance and from a Secure Access appliance to remote computers are encrypted using SSL/HTTPS 168-bit encryption. All unencrypted requests (e.g. HTTP) are redirected to HTTPS, which ensures the connection is encrypted. Each request is subject to administratively defined access control and authorisation policies, such as dual-factor or client-side digital certificate authentication, before the request is forwarded to an internal resource. Users gain authenticated access to authorised resources via an extranet session hosted by the appliance. From any Internet-connected Web browser, users can access Web-based enterprise applications, Java applications, file shares and terminal hosts. Secure Access generates audit records for security events. The administrator and read-only administrator are the only roles with access to the audit trail and have the ability to view the audit trail. In the context of the evaluation, the TOE provides the following major security features: Generates audit records for security events. Cryptographic support for secure communications between users and the TOE and between TOE components. Provides information flow security policy that limits traffic to URLs and resource types, such as file servers, to specific user roles. Identification and authentication before any information flows are permitted and user must be authenticated before performing any administrative functions. Security management functions for administrator to configure the TOE, manage users, information flow policy and auditing activities. Protection of the TOE security function (TSF) by enforcing session timeouts.
    • status: Archive
    • target_link: https://iscb.cybersecurity.my/resources/document/mycc/mycpr/C040/JNPR%20SA%207.2R4%20EAL3%20ST%20v1.4.pdf
    • type: Set of appliance and software client running on a remote IT system that provides secure remote access to internal network resources.
  • expiration_date: 15.07.2018
  • level: EAL3+ALC_FLR.2
  • product: Juniper Networks Junos Pulse Secure Access Service 7.2 R4
  • recognition: CCRA
  • url: https://iscb.cybersecurity.my/index.php/certification/product-certification/mycc/archived-certified-products-and-systems/submission-view/123
maintenance_updates
pdf_data/cert_filename 383-4-354 Certificate original signed v1.0e.docx
pdf_data/report_filename 383-4-354 CR v1.0e.pdf ISCB-5-RPT-C040-CR-v1a.pdf
pdf_data/report_frontpage
  • CA:
  • CA:
pdf_data/report_keywords/cc_cert_id
  • CA:
    • 383-4-354: 1
  • MY:
    • ISCB-5-RPT-C040-CR-v1a: 28
pdf_data/report_keywords/cc_security_level
  • EAL:
    • EAL3: 6
    • EAL3 augmented: 1
    • EAL3+: 6
pdf_data/report_keywords/cc_sar
  • ALC:
    • ALC_FLR.3: 1
  • ALC:
    • ALC_FLR.2: 12
pdf_data/report_keywords/cc_sfr
  • FAU:
    • FAU_GEN.1: 1
    • FAU_SAR.1: 1
    • FAU_STG.1: 1
    • FAU_STG.3: 1
  • FCS:
    • FCS_CKM.1: 1
    • FCS_CKM.2: 1
    • FCS_CKM.4: 1
    • FCS_COP.1: 1
  • FDP:
    • FDP_IFC.1: 1
    • FDP_IFF.1: 1
    • FDP_RIP.1: 1
  • FIA:
    • FIA_ATD.1: 1
    • FIA_SOS.1: 1
    • FIA_UAU.2: 1
    • FIA_UID.2: 1
  • FMT:
    • FMT_MOF.1: 1
    • FMT_MSA.1: 1
    • FMT_MSA.2: 1
    • FMT_MSA.3: 1
    • FMT_MTD.1: 1
    • FMT_SAE.1: 1
    • FMT_SMF.1: 1
    • FMT_SMR.1: 1
  • FPT:
    • FPT_ITT.1: 1
    • FPT_STM.1: 1
  • FTA:
    • FTA_SSL.3: 1
  • FTP:
    • FTP_TRP.1: 1
pdf_data/report_keywords/crypto_scheme
  • MAC:
    • MAC: 1
pdf_data/report_keywords/crypto_protocol
  • TLS:
    • SSL:
      • SSL: 2
  • SSH:
    • SSH: 1
  • TLS:
    • SSL:
      • SSL: 1
pdf_data/report_keywords/crypto_library
  • OpenSSL:
    • OpenSSL: 1
pdf_data/report_keywords/side_channel_analysis
  • other:
    • Reverse engineering: 1
pdf_data/report_keywords/standard_id
  • FIPS:
    • FIPS 140-2: 1
  • ISO:
    • ISO/IEC 17025:2005: 1
  • ISO:
    • ISO/IEC 18045: 2
    • ISO/IEC15408: 2
pdf_data/report_metadata
  • /Author: Shannon, Keith R.
  • /Company: CSEC
  • /CreationDate: D:20160916094815-04'00'
  • /Creator: Acrobat PDFMaker 11 for Word
  • /ModDate: D:20160916094843-04'00'
  • /Producer: Adobe PDF Library 11.0
  • /SourceModified: D:20160915174745
  • /Title: 383-4-XXX CR v0.1
  • pdf_file_size_bytes: 213653
  • pdf_hyperlinks: mailto:[email protected]
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 18
  • /Author: ISCB Department
  • /Category: PUBLIC
  • /Caveat: FINAL
  • /Classification: PUBLIC
  • /Company: CyberSecurity Malaysia
  • /CreationDate: D:20130806135033+08'00'
  • /Creator: Acrobat PDFMaker 10.1 for Word
  • /Developer: Juniper Networks
  • /Document Type: REPORT
  • /Identifier: ISCB-5-RPT-C040-CR-v1a
  • /Index: MyCB_TMP_011
  • /Keywords: Secure Access
  • /ModDate: D:20130806135039+08'00'
  • /Phase: External
  • /Producer: Adobe PDF Library 10.0
  • /Project Code: C040
  • /Released: 15 July 2013
  • /ST Title: Security Target: Juniper Networks Junos Pulse Secure Access Service 7.2 R4
  • /ST Version: v1.4
  • /SourceModified: D:20130806055016
  • /Sponsor: Juniper Networks
  • /Subject: Juniper Networks Junos Pulse Secure Access Service 7.2 R4
  • /TOE Name: Juniper Networks Junos Pulse Secure Access Service
  • /TOE Version: 7.2 R4
  • /Title: C040 Certification Report
  • /Version: v1a
  • pdf_file_size_bytes: 317229
  • pdf_hyperlinks: mailto:[email protected], http://www.cybersecurity.my/mycc
  • pdf_is_encrypted: True
  • pdf_number_of_pages: 29
pdf_data/st_filename Xerox CK2.0 WorkCentre 6655_ST_1.2.pdf JNPR SA 7.2R4 EAL3 ST v1.4.pdf
pdf_data/st_keywords/cc_security_level
  • EAL:
    • EAL2: 4
    • EAL2+: 4
  • EAL:
    • EAL3: 6
pdf_data/st_keywords/cc_sar
  • ADV:
    • ADV_ARC.1: 3
    • ADV_FSP.1: 2
    • ADV_FSP.2: 4
    • ADV_TDS.1: 4
  • AGD:
    • AGD_OPE.1: 4
    • AGD_PRE.1: 2
  • ALC:
    • ALC_CMC.2: 2
    • ALC_CMS.2: 2
    • ALC_DEL.1: 2
    • ALC_FLR.3: 11
  • ASE:
    • ASE_CCL.1: 2
    • ASE_ECD.1: 2
    • ASE_INT.1: 4
    • ASE_OBJ.2: 3
    • ASE_REQ.2: 2
    • ASE_SPD.1: 2
    • ASE_TSS.1: 2
  • ATE:
    • ATE_COV.1: 3
    • ATE_FUN.1: 3
    • ATE_IND.2: 2
  • AVA:
    • AVA_VAN.2: 2
  • ADV:
    • ADV_ARC.1: 2
    • ADV_FSP.3: 2
    • ADV_TDS.2: 2
  • AGD:
    • AGD_OPE.1: 2
    • AGD_PRE.1: 2
  • ALC:
    • ALC_CMC.3: 2
    • ALC_CMS.3: 2
    • ALC_DEL.1: 2
    • ALC_DVS.1: 2
    • ALC_FLR.2: 5
    • ALC_LCD.1: 2
  • ASE:
    • ASE_CCL.1: 1
    • ASE_ECD.1: 1
    • ASE_INT.1: 1
    • ASE_OBJ.2: 1
    • ASE_REQ.2: 1
    • ASE_SPD.1: 1
    • ASE_TSS.1: 1
  • ATE:
    • ATE_COV.2: 2
    • ATE_DPT.1: 2
    • ATE_FUN.1: 2
    • ATE_IND.2: 1
  • AVA:
    • AVA_VAN.2: 1
pdf_data/st_keywords/cc_sfr
  • FAU:
    • FAU_GEN: 1
    • FAU_GEN.1: 9
    • FAU_GEN.1.1: 1
    • FAU_GEN.1.2: 1
    • FAU_GEN.2: 7
    • FAU_GEN.2.1: 1
    • FAU_STG.1: 9
    • FAU_STG.3: 1
    • FAU_STG.4: 7
  • FCS:
    • FCS_CKM.1: 12
    • FCS_CKM.1.1: 1
    • FCS_CKM.2: 7
    • FCS_CKM.2.1: 1
    • FCS_CKM.4: 12
    • FCS_CKM.4.1: 1
    • FCS_COP.1: 9
    • FCS_COP.1.1: 1
  • FDP:
    • FDP_ACC.1: 21
    • FDP_ACC.1.1: 2
    • FDP_ACF.1: 18
    • FDP_ACF.1.1: 2
    • FDP_ACF.1.2: 2
    • FDP_ACF.1.3: 2
    • FDP_ACF.1.4: 2
    • FDP_IFC: 1
    • FDP_IFC.1: 14
    • FDP_IFC.1.1: 1
    • FDP_IFF: 1
    • FDP_IFF.1: 10
    • FDP_IFF.1.1: 1
    • FDP_IFF.1.2: 1
    • FDP_IFF.1.3: 1
    • FDP_IFF.1.4: 1
    • FDP_IFF.1.5: 1
    • FDP_ITC.1: 6
    • FDP_ITC.2: 6
    • FDP_RIP.1: 11
    • FDP_RIP.1.1: 2
  • FIA:
    • FIA_ATD.1: 8
    • FIA_ATD.1.1: 1
    • FIA_UAU.1: 9
    • FIA_UAU.1.1: 1
    • FIA_UAU.1.2: 1
    • FIA_UAU.7: 7
    • FIA_UAU.7.1: 1
    • FIA_UID.1: 18
    • FIA_UID.1.1: 1
    • FIA_UID.1.2: 1
    • FIA_USB.1: 7
    • FIA_USB.1.1: 1
    • FIA_USB.1.2: 1
    • FIA_USB.1.3: 1
  • FMT:
    • FMT_MSA.1: 17
    • FMT_MSA.1.1: 2
    • FMT_MSA.3: 21
    • FMT_MSA.3.1: 2
    • FMT_MSA.3.2: 2
    • FMT_MTD.1: 22
    • FMT_MTD.1.1: 4
    • FMT_SMF.1: 28
    • FMT_SMF.1.1: 2
    • FMT_SMR: 1
    • FMT_SMR.1: 29
    • FMT_SMR.1.1: 2
    • FMT_SMR.1.2: 1
  • FPT:
    • FPT_FDI_EXP: 3
    • FPT_FDI_EXP.1: 12
    • FPT_FDI_EXP.1.1: 2
    • FPT_STM.1: 10
    • FPT_STM.1.1: 1
  • FTA:
    • FTA_SSL.3: 8
    • FTA_SSL.3.1: 1
  • FTP:
    • FTP_ITC.1: 7
    • FTP_ITC.1.1: 1
    • FTP_ITC.1.2: 1
    • FTP_ITC.1.3: 1
  • FAU:
    • FAU_GEN: 1
    • FAU_GEN.1: 7
    • FAU_GEN.1.1: 1
    • FAU_GEN.1.2: 1
    • FAU_SAR: 1
    • FAU_SAR.1: 5
    • FAU_SAR.1.1: 1
    • FAU_SAR.1.2: 1
    • FAU_STG: 2
    • FAU_STG.1: 6
    • FAU_STG.1.1: 1
    • FAU_STG.1.2: 1
    • FAU_STG.3: 6
    • FAU_STG.3.1: 1
  • FCS:
    • FCS_CKM: 3
    • FCS_CKM.1: 5
    • FCS_CKM.1.1: 1
    • FCS_CKM.2: 5
    • FCS_CKM.2.1: 1
    • FCS_CKM.4: 5
    • FCS_CKM.4.1: 1
    • FCS_COP: 1
    • FCS_COP.1: 10
    • FCS_COP.1.1: 1
  • FDP:
    • FDP_IFC: 1
    • FDP_IFC.1: 5
    • FDP_IFC.1.1: 1
    • FDP_IFF: 1
    • FDP_IFF.1: 6
    • FDP_IFF.1.1: 1
    • FDP_IFF.1.2: 1
    • FDP_IFF.1.3: 1
    • FDP_IFF.1.4: 1
    • FDP_IFF.1.5: 1
    • FDP_RIP: 1
    • FDP_RIP.1: 5
    • FDP_RIP.1.1: 1
  • FIA:
    • FIA_ATD: 1
    • FIA_ATD.1: 9
    • FIA_ATD.1.1: 1
    • FIA_SOS: 1
    • FIA_SOS.1: 6
    • FIA_SOS.1.1: 1
    • FIA_UAU: 1
    • FIA_UAU.2: 6
    • FIA_UAU.2.1: 1
    • FIA_UID: 1
    • FIA_UID.2: 7
    • FIA_UID.2.1: 1
  • FMT:
    • FMT_MOF: 1
    • FMT_MOF.1: 10
    • FMT_MOF.1.1: 1
    • FMT_MSA: 3
    • FMT_MSA.1: 8
    • FMT_MSA.1.1: 1
    • FMT_MSA.2: 8
    • FMT_MSA.2.1: 1
    • FMT_MSA.3: 8
    • FMT_MSA.3.1: 1
    • FMT_MSA.3.2: 1
    • FMT_MTD: 1
    • FMT_MTD.1: 10
    • FMT_MTD.1.1: 3
    • FMT_SAE: 1
    • FMT_SAE.1: 5
    • FMT_SAE.1.1: 1
    • FMT_SAE.1.2: 1
    • FMT_SMF: 1
    • FMT_SMF.1: 5
    • FMT_SMF.1.1: 1
    • FMT_SMR: 1
    • FMT_SMR.1: 7
    • FMT_SMR.1.1: 1
    • FMT_SMR.1.2: 1
  • FPT:
    • FPT_ITT: 1
    • FPT_ITT.1: 5
    • FPT_ITT.1.1: 1
    • FPT_STM: 1
    • FPT_STM.1: 6
    • FPT_STM.1.1: 1
  • FTA:
    • FTA_SSL: 1
    • FTA_SSL.3: 5
    • FTA_SSL.3.1: 1
  • FTP:
    • FTP_TRP: 1
    • FTP_TRP.1: 5
    • FTP_TRP.1.1: 1
    • FTP_TRP.1.2: 1
    • FTP_TRP.1.3: 1
pdf_data/st_keywords/cc_claims
  • A:
    • A.ACCESS: 3
    • A.ADMIN: 6
    • A.USER: 3
  • D:
    • D.CONF: 7
    • D.DOC: 18
    • D.FUNC: 12
    • D.PROT: 5
  • O:
    • O.AUDIT: 14
    • O.CONF: 16
    • O.DOC: 17
    • O.FUNC: 8
    • O.INTERFACE: 7
    • O.PROT: 8
    • O.PURGE: 7
    • O.USER: 13
  • OE:
    • OE.ADMIN: 6
    • OE.AUDIT: 9
    • OE.INTERFACE: 3
    • OE.PHYSICAL: 3
    • OE.USER: 21
  • T:
    • T.CONF: 6
    • T.DOC: 7
    • T.FUNC: 2
    • T.PROT: 3
  • A:
    • A.GENPUR: 2
    • A.NOEVIL: 2
    • A.PHYSEC: 3
    • A.PUBLIC: 1
    • A.SINGEN: 2
  • O:
    • O.ACCOUN: 7
    • O.AUDREC: 9
    • O.ENCRYP: 12
    • O.ENCRYPT: 1
    • O.IDAUTH: 11
    • O.MEDIAT: 17
    • O.SECFUN: 20
    • O.SECKEY: 9
    • O.SECSTA: 15
    • O.SELPRO: 9
    • O.SINUSE: 7
    • O.TOECOM: 6
  • OE:
    • OE.ADMTRA: 4
    • OE.GENPUR: 3
    • OE.GUIDAN: 4
    • OE.PHYSEC: 3
    • OE.PUBLIC: 3
    • OE.SINGEN: 3
  • T:
    • T.AUDACC: 5
    • T.AUDFUL: 4
    • T.MEDIAT: 4
    • T.NOAUTH: 3
    • T.OLDINF: 4
    • T.PROCOM: 4
    • T.REPLAY: 4
    • T.SELPRO: 4
    • T.TOECOM: 5
    • T.TUSAGE: 5
pdf_data/st_keywords/symmetric_crypto
  • AES_competition:
    • AES:
      • AES: 8
  • DES:
    • 3DES:
      • TDES: 2
    • DES:
      • DES: 3
  • constructions:
    • MAC:
      • HMAC: 3
  • AES_competition:
    • AES:
      • AES: 5
  • DES:
    • 3DES:
      • 3DES: 1
      • TDES: 5
pdf_data/st_keywords/asymmetric_crypto
  • FF:
    • DH:
      • Diffie-Hellman: 2
  • RSA:
    • RSA 2048: 1
pdf_data/st_keywords/hash_function
  • SHA:
    • SHA1:
      • SHA-1: 2
    • SHA2:
      • SHA-256: 1
  • MD:
    • MD5:
      • MD5: 2
  • SHA:
    • SHA1:
      • SHA-1: 1
pdf_data/st_keywords/crypto_protocol
  • IPsec:
    • IPsec: 9
  • SSH:
    • SSH: 2
  • TLS:
    • TLS:
      • TLS: 20
  • SSH:
    • SSH: 2
  • TLS:
    • SSL:
      • SSL: 1
    • TLS:
      • TLS: 2
  • VPN:
    • VPN: 2
pdf_data/st_keywords/randomness
  • PRNG:
    • DRBG: 3
pdf_data/st_keywords/crypto_library
  • OpenSSL:
    • OpenSSL: 6
pdf_data/st_keywords/side_channel_analysis
  • FI:
    • malfunction: 1
pdf_data/st_keywords/standard_id
  • FIPS:
    • FIPS 140-2: 1
    • FIPS 180-3: 2
    • FIPS 186-3: 1
    • FIPS 197: 1
    • FIPS 198: 1
  • ISO:
    • ISO/IEC 15408: 2
  • NIST:
    • SP 800-67: 1
  • RFC:
    • RFC 2631: 2
    • RFC 4366: 1
    • RFC 5280: 1
  • X509:
    • X.509: 3
  • FIPS:
    • FIPS 140-2: 1
    • FIPS 180-2: 1
    • FIPS 197: 2
    • FIPS 46-3: 2
  • PKCS:
    • PKCS7: 1
  • RFC:
    • RFC 1321: 1
    • RFC 2246: 1
pdf_data/st_metadata
  • /Author: CSC
  • /CreationDate: D:20160817150047-04'00'
  • /Creator: Microsoft® Word 2016
  • /ModDate: D:20160817150047-04'00'
  • /Producer: Microsoft® Word 2016
  • /Subject: Security Target
  • /Title: Xerox Multi-Function Device Security Target
  • pdf_file_size_bytes: 1489339
  • pdf_hyperlinks: http://www.xerox.com/information-security/product/enus.html
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 76
  • /Author: Apex Assurance Group
  • /CreationDate: D:20130515170648-07'00'
  • /Creator: Microsoft® Word 2010
  • /ModDate: D:20130515170648-07'00'
  • /Producer: Microsoft® Word 2010
  • /Subject: Secure Access Family Version 7.2R4
  • /Title: Security Target
  • pdf_file_size_bytes: 1078324
  • pdf_hyperlinks: http://www.apexassurance.com/, http://www.juniper.net/
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 46
state/cert/download_ok True False
state/cert/pdf_hash Different Different
state/report/pdf_hash Different Different
state/report/txt_hash Different Different
state/st/pdf_hash Different Different
state/st/txt_hash Different Different