This page was not yet optimized for use on mobile devices.
Comparing certificates Experimental feature
You are comparing two certificates. By default, only differing attributes are shown. Use the button below to show/hide all attributes.
NetIQ Identity Governance 3.5 CSEC2018005 |
Application eTravel EAC 1.4 avec AA, configuration BAC avec AMD 113v3, masquée sur composants IFX M7820 A11 ANSSI-CC-2012/31 |
|
---|---|---|
name | NetIQ Identity Governance 3.5 | Application eTravel EAC 1.4 avec AA, configuration BAC avec AMD 113v3, masquée sur composants IFX M7820 A11 |
category | Other Devices and Systems | ICs, Smart Cards and Smart Card-Related Devices and Systems |
scheme | SE | FR |
status | active | archived |
not_valid_after | 23.09.2025 | 01.09.2019 |
not_valid_before | 23.09.2020 | 06.07.2012 |
cert_link | https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/Certifikat%20CCRA%20NetIQ%20IG%203.5.pdf | |
report_link | https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/certification-report---netiq-ig-3.5.pdf | https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/ANSSI_2012-31fr.pdf |
st_link | https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/security-target---netiq-ig-3.5.pdf | https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/ANSSI-cible_2012-31en.pdf |
manufacturer | NetIQ Corporation | Gemalto - Infineon Technologies AG |
manufacturer_web | https://www.netiq.com/ | https://www.gemalto.com/ |
security_level | EAL2, ALC_FLR.1 | EAL4+, ALC_DVS.2 |
dgst | da255eb5dbb4f521 | 6f25f0730f592012 |
heuristics/cert_id | CSEC2018005 | ANSSI-CC-2012/31 |
heuristics/cert_lab | [] | THALES |
heuristics/extracted_sars | ATE_IND.2, ASE_CCL.1, ALC_CMS.2, AGD_OPE.1, ASE_SPD.1, AVA_VAN.2, ALC_FLR.1, ASE_OBJ.2, ADV_ARC.1, ALC_CMC.2, ATE_FUN.1, ASE_INT.1, ASE_TSS.1, ADV_FSP.2, ASE_REQ.2, ALC_DEL.1, AGD_PRE.1, ATE_COV.1, ADV_TDS.1, ASE_ECD.1 | AVA_VAN.5, ALC_DVS.2, ADV_ARC.1 |
heuristics/extracted_versions | 3.5 | 1.4 |
heuristics/report_references/directly_referencing | {} | BSI-DSZ-CC-0813-2012 |
heuristics/report_references/indirectly_referencing | {} | BSI-DSZ-CC-0728-2011, BSI-DSZ-CC-0813-2012, BSI-DSZ-CC-0640-2010 |
heuristics/st_references/directly_referencing | {} | BSI-DSZ-CC-0640-2010, BSI-DSZ-CC-0813-2012 |
heuristics/st_references/indirectly_referencing | {} | BSI-DSZ-CC-0728-2011, BSI-DSZ-CC-0813-2012, BSI-DSZ-CC-0640-2010 |
heuristics/protection_profiles | {} | 60455fc9564e2545 |
protection_profile_links | {} | https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/pp0055b.pdf |
pdf_data/cert_filename | Certifikat CCRA NetIQ IG 3.5.pdf | |
pdf_data/cert_keywords/cc_cert_id |
|
|
pdf_data/cert_keywords/cc_protection_profile_id | ||
pdf_data/cert_keywords/cc_security_level |
|
|
pdf_data/cert_keywords/cc_sar |
|
|
pdf_data/cert_keywords/cc_sfr | ||
pdf_data/cert_keywords/cc_claims | ||
pdf_data/cert_keywords/vendor | ||
pdf_data/cert_keywords/eval_facility |
|
|
pdf_data/cert_keywords/symmetric_crypto | ||
pdf_data/cert_keywords/asymmetric_crypto | ||
pdf_data/cert_keywords/pq_crypto | ||
pdf_data/cert_keywords/hash_function | ||
pdf_data/cert_keywords/crypto_scheme | ||
pdf_data/cert_keywords/crypto_protocol | ||
pdf_data/cert_keywords/randomness | ||
pdf_data/cert_keywords/cipher_mode | ||
pdf_data/cert_keywords/ecc_curve | ||
pdf_data/cert_keywords/crypto_engine | ||
pdf_data/cert_keywords/tls_cipher_suite | ||
pdf_data/cert_keywords/crypto_library | ||
pdf_data/cert_keywords/vulnerability | ||
pdf_data/cert_keywords/side_channel_analysis | ||
pdf_data/cert_keywords/technical_report_id | ||
pdf_data/cert_keywords/device_model | ||
pdf_data/cert_keywords/tee_name | ||
pdf_data/cert_keywords/os_name | ||
pdf_data/cert_keywords/cplc_data | ||
pdf_data/cert_keywords/ic_data_group | ||
pdf_data/cert_keywords/standard_id | ||
pdf_data/cert_keywords/javacard_version | ||
pdf_data/cert_keywords/javacard_api_const | ||
pdf_data/cert_keywords/javacard_packages | ||
pdf_data/cert_keywords/certification_process | ||
pdf_data/cert_metadata |
|
|
pdf_data/report_filename | certification-report---netiq-ig-3.5.pdf | ANSSI_2012-31fr.pdf |
pdf_data/report_frontpage |
|
|
pdf_data/report_keywords/cc_cert_id |
|
|
pdf_data/report_keywords/cc_protection_profile_id |
|
|
pdf_data/report_keywords/cc_security_level |
|
|
pdf_data/report_keywords/cc_sar |
|
|
pdf_data/report_keywords/cc_claims |
|
|
pdf_data/report_keywords/vendor |
|
|
pdf_data/report_keywords/eval_facility |
|
|
pdf_data/report_keywords/symmetric_crypto |
|
|
pdf_data/report_keywords/asymmetric_crypto |
|
|
pdf_data/report_keywords/hash_function |
|
|
pdf_data/report_keywords/crypto_protocol |
|
|
pdf_data/report_keywords/cplc_data |
|
|
pdf_data/report_keywords/standard_id |
|
|
pdf_data/report_metadata |
|
|
pdf_data/st_filename | security-target---netiq-ig-3.5.pdf | ANSSI-cible_2012-31en.pdf |
pdf_data/st_keywords/cc_cert_id |
|
|
pdf_data/st_keywords/cc_protection_profile_id |
|
|
pdf_data/st_keywords/cc_security_level |
|
|
pdf_data/st_keywords/cc_sar |
|
|
pdf_data/st_keywords/cc_sfr |
|
|
pdf_data/st_keywords/cc_claims |
|
|
pdf_data/st_keywords/vendor |
|
|
pdf_data/st_keywords/symmetric_crypto |
|
|
pdf_data/st_keywords/asymmetric_crypto |
|
|
pdf_data/st_keywords/hash_function |
|
|
pdf_data/st_keywords/crypto_scheme |
|
|
pdf_data/st_keywords/crypto_protocol |
|
|
pdf_data/st_keywords/randomness |
|
|
pdf_data/st_keywords/cipher_mode |
|
|
pdf_data/st_keywords/side_channel_analysis |
|
|
pdf_data/st_keywords/cplc_data |
|
|
pdf_data/st_keywords/ic_data_group |
|
|
pdf_data/st_keywords/standard_id |
|
|
pdf_data/st_metadata |
|
|
state/cert/convert_garbage | True | False |
state/cert/convert_ok | True | False |
state/cert/download_ok | True | False |
state/cert/extract_ok | True | False |
state/cert/pdf_hash | Different | Different |
state/cert/txt_hash | Different | Different |
state/report/pdf_hash | Different | Different |
state/report/txt_hash | Different | Different |
state/st/pdf_hash | Different | Different |
state/st/txt_hash | Different | Different |