Comparing certificates Experimental feature

You are comparing two certificates. By default, only differing attributes are shown. Use the button below to show/hide all attributes.

Showing only differing attributes.
FIN.X RTOS SE V5
OCSI/CERT/LEO/08/2021/RC
Juniper Networks Junos Pulse Access Control Service 4.2 R4
ISCB-5-RPT-C039-CR-v1a
name FIN.X RTOS SE V5 Juniper Networks Junos Pulse Access Control Service 4.2 R4
category Operating Systems Network and Network-Related Devices and Systems
scheme IT MY
status active archived
not_valid_after 21.06.2027 05.08.2018
not_valid_before 21.06.2022 05.08.2013
report_link https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/rc_finx_rtos_se_v5_v1.0.pdf https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/ISCB-5-RPT-C039-CR-v1a.pdf
st_link https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/st_finx_rtos_se_v5_rev02_lite.pdf https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/JNPR%20UAC%204.2R4%20EAL3%20ST%20v1.3.pdf
manufacturer MBDA Italia S.p.A. Juniper Networks, Inc.
manufacturer_web https://www.mbda-systems.com/ https://www.juniper.net/
security_level {} EAL3+, ALC_FLR.2
dgst e1338a1b4a36e01a 1c02d4a2e04d2b29
heuristics/cert_id OCSI/CERT/LEO/08/2021/RC ISCB-5-RPT-C039-CR-v1a
heuristics/cpe_matches {} cpe:2.3:a:juniper:junos_pulse_access_control_service:4.2:*:*:*:*:*:*:*, cpe:2.3:o:juniper:junos:4.2:*:*:*:*:*:*:*
heuristics/related_cves {} CVE-2004-0468, CVE-2023-36840, CVE-2022-22245, CVE-2022-22242, CVE-2023-28962, CVE-2023-22407, CVE-2024-39549, CVE-2023-44185, CVE-2023-44176, CVE-2024-39514, CVE-2023-22406, CVE-2024-30397, CVE-2024-21591, CVE-2023-22391, CVE-2023-28975, CVE-2023-36841, CVE-2019-0036, CVE-2024-39528, CVE-2022-22244, CVE-2022-22215, CVE-2022-22224, CVE-2022-22214, CVE-2023-44182, CVE-2024-30380, CVE-2022-22220, CVE-2022-22197, CVE-2023-44178, CVE-2022-22243, CVE-2023-36839, CVE-2022-22208, CVE-2023-36842, CVE-2023-28963, CVE-2024-39556, CVE-2023-4481, CVE-2013-4689, CVE-2022-22156, CVE-2024-39511, CVE-2022-22163, CVE-2023-44184, CVE-2023-44201, CVE-2023-22395, CVE-2013-6618, CVE-2024-39558, CVE-2023-28964, CVE-2022-22181, CVE-2023-44197, CVE-2023-36843, CVE-2013-5650, CVE-2024-21594, CVE-2024-39517, CVE-2024-39555, CVE-2022-22246, CVE-2023-44186, CVE-2021-31362, CVE-2004-0230, CVE-2022-22241, CVE-2023-44194, CVE-2022-22162, CVE-2023-44177, CVE-2021-31372, CVE-2023-28979, CVE-2022-22238, CVE-2013-7313, CVE-2022-22173, CVE-2023-44175
heuristics/extracted_sars ASE_OBJ.2, AGD_OPE.1, ALC_TSU_EXT.1, AGD_PRE.1, ASE_ECD.1, ATE_IND.1, AVA_VAN.1, ASE_CCL.1, ASE_REQ.2, ALC_CMC.1, ADV_FSP.1, ALC_CMS.1, ASE_SPD.1, ASE_INT.1, ASE_TSS.1 AGD_OPE.1, ASE_ECD.1, ADV_TDS.2, ATE_DPT.1, ADV_FSP.3, ALC_DEL.1, ALC_DVS.1, ALC_LCD.1, ADV_ARC.1, AVA_VAN.2, ASE_SPD.1, ALC_CMC.3, ASE_INT.1, ASE_OBJ.2, ASE_CCL.1, ASE_REQ.2, ATE_IND.2, ASE_TSS.1, ATE_COV.2, ATE_FUN.1, AGD_PRE.1, ALC_CMS.3, ALC_FLR.2
heuristics/extracted_versions - 4.2
heuristics/report_references/directly_referencing OCSI/CERT/RES/06/2014/RC {}
heuristics/report_references/indirectly_referencing OCSI/CERT/RES/06/2014/RC, OCSI/CERT/RES/03/2012/RC {}
heuristics/scheme_data
heuristics/protection_profiles c40ae795865a0dba, e34797b67a3163c5 {}
protection_profile_links https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/PP_OS_V4.2.1.pdf, https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/PKG_TLS_V1.1.pdf {}
pdf_data/report_filename rc_finx_rtos_se_v5_v1.0.pdf ISCB-5-RPT-C039-CR-v1a.pdf
pdf_data/report_keywords/cc_cert_id
  • IT:
    • OCSI/CERT/LEO/08/2021/RC: 26
    • OCSI/CERT/RES/06/2014/RC: 1
  • MY:
    • ISCB-5-RPT-C039-CR-v1a: 31
pdf_data/report_keywords/cc_security_level
  • EAL:
    • EAL2: 1
    • EAL4: 3
    • EAL4+: 1
  • EAL:
    • EAL3: 6
    • EAL3 augmented: 1
    • EAL3+: 5
pdf_data/report_keywords/cc_sar
  • ADV:
    • ADV_FSP.1: 3
  • AGD:
    • AGD_OPE.1: 3
    • AGD_PRE.1: 3
  • ALC:
    • ALC_CMC.1: 3
    • ALC_CMS.1: 3
    • ALC_FLR: 1
    • ALC_TSU_EXT.1: 3
  • ASE:
    • ASE_CCL.1: 3
    • ASE_ECD.1: 3
    • ASE_INT.1: 3
    • ASE_OBJ.2: 3
    • ASE_REQ.2: 3
    • ASE_SPD.1: 3
    • ASE_TSS.1: 3
  • ATE:
    • ATE_IND.1: 4
  • AVA:
    • AVA_VAN.1: 3
  • ALC:
    • ALC_FLR.2: 10
pdf_data/report_keywords/cc_sfr
  • FAU:
    • FAU_GEN.1: 1
    • FAU_SAR.1: 1
    • FAU_UAU.2: 1
  • FCS:
    • FCS_CKM.1: 1
    • FCS_CKM.2: 1
    • FCS_COP.1: 1
  • FDP:
    • FDP_IFF.1: 2
  • FIA:
    • FIA_ATD.1: 2
    • FIA_UAU.2: 1
    • FIA_UID.2: 1
  • FMT:
    • FMT_MOF.1: 2
    • FMT_MSA.2: 1
    • FMT_MSA.3: 1
    • FMT_SMF.1.1: 1
    • FMT_SMR.1: 1
    • FMT_SMT.1: 1
  • FPT:
    • FPT_ITT.1.1: 1
    • FPT_STM.1: 1
pdf_data/report_keywords/eval_facility
  • LVSLeonardo:
    • LVS Leonardo: 1
pdf_data/report_keywords/symmetric_crypto
  • AES_competition:
    • AES:
      • AES: 5
  • DES:
    • 3DES:
      • TDES: 5
pdf_data/report_keywords/hash_function
  • SHA:
    • SHA2:
      • SHA-256: 1
pdf_data/report_keywords/crypto_scheme
  • MAC:
    • MAC: 4
pdf_data/report_keywords/crypto_protocol
  • SSH:
    • SSH: 10
  • TLS:
    • TLS:
      • TLS: 7
      • TLS v1.2: 1
  • SSH:
    • SSH: 1
  • TLS:
    • TLS:
      • TLS: 3
pdf_data/report_keywords/tee_name
  • IBM:
    • SE: 21
pdf_data/report_keywords/standard_id
  • CC:
    • CCMB-2012-09-001: 1
    • CCMB-2012-09-002: 1
    • CCMB-2012-09-003: 1
    • CCMB-2012-09-004: 1
  • ISO:
    • ISO/IEC 15408: 6
  • FIPS:
    • FIPS 197: 1
    • FIPS 46-3: 1
  • ISO:
    • ISO/IEC 18045: 2
    • ISO/IEC15408: 2
pdf_data/report_metadata
  • /Author: OCSI
  • /CreationDate: D:20220621125759+02'00'
  • /Creator: Microsoft® Word 2016
  • /ModDate: D:20220621130817+02'00'
  • /Producer: Microsoft® Word 2016
  • /Title: Rapporto di Certificazione del prodotto "FIN.X RTOS SE V5"
  • pdf_file_size_bytes: 903328
  • pdf_hyperlinks: {}
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 26
  • /Author: ISCB Department
  • /Category: PUBLIC
  • /Caveat: FINAL
  • /Classification: PUBLIC
  • /Company: CyberSecurity Malaysia
  • /CreationDate: D:20130806134853+08'00'
  • /Creator: Acrobat PDFMaker 10.1 for Word
  • /Developer: Juniper Networks
  • /Document Type: REPORT
  • /Identifier: ISCB-5-RPT-C039-CR-v1a
  • /Index: MyCB_TMP_011
  • /Keywords: UAC
  • /ModDate: D:20130806134906+08'00'
  • /Phase: External
  • /Producer: Adobe PDF Library 10.0
  • /Project Code: C039
  • /Released: 5 August 2013
  • /ST Title: Security Target: Juniper Networks Junos Pulse Access Control Service 4.2 R4
  • /ST Version: v1.3
  • /SourceModified: D:20130806054834
  • /Sponsor: Juniper Networks
  • /Subject: Juniper Networks Junos Pulse Access Control Service 4.2 R4
  • /TOE Name: Juniper Networks Junos Pulse Access Control Service
  • /TOE Version: 4.2 R4
  • /Title: C039 Certification Report
  • /Version: v1a
  • pdf_file_size_bytes: 341341
  • pdf_hyperlinks: mailto:[email protected], http://www.cybersecurity.my/mycc
  • pdf_is_encrypted: True
  • pdf_number_of_pages: 32
pdf_data/st_filename st_finx_rtos_se_v5_rev02_lite.pdf JNPR UAC 4.2R4 EAL3 ST v1.3.pdf
pdf_data/st_keywords/cc_security_level
  • EAL:
    • EAL1: 1
  • EAL:
    • EAL3: 6
pdf_data/st_keywords/cc_sar
  • ADV:
    • ADV_FSP.1: 1
  • AGD:
    • AGD_OPE.1: 1
    • AGD_PRE.1: 1
  • ALC:
    • ALC_CMC.1: 1
    • ALC_CMS.1: 1
    • ALC_TSU_EXT.1: 1
  • ATE:
    • ATE_IND.1: 1
  • AVA:
    • AVA_VAN.1: 1
  • ADV:
    • ADV_ARC.1: 2
    • ADV_FSP.3: 2
    • ADV_TDS.2: 2
  • AGD:
    • AGD_OPE.1: 2
    • AGD_PRE.1: 2
  • ALC:
    • ALC_CMC.3: 2
    • ALC_CMS.3: 2
    • ALC_DEL.1: 2
    • ALC_DVS.1: 2
    • ALC_FLR.2: 5
    • ALC_LCD.1: 2
  • ASE:
    • ASE_CCL.1: 2
    • ASE_ECD.1: 2
    • ASE_INT.1: 2
    • ASE_OBJ.2: 2
    • ASE_REQ.2: 2
    • ASE_SPD.1: 2
    • ASE_TSS.1: 2
  • ATE:
    • ATE_COV.2: 2
    • ATE_DPT.1: 2
    • ATE_FUN.1: 2
    • ATE_IND.2: 1
  • AVA:
    • AVA_VAN.2: 1
pdf_data/st_keywords/cc_sfr
  • FAU:
    • FAU_GEN: 1
    • FAU_GEN.1: 4
    • FAU_GEN.1.1: 2
    • FAU_GEN.1.2: 1
  • FCS:
    • FCS_CKM.1: 6
    • FCS_CKM.1.1: 2
    • FCS_CKM.2: 6
    • FCS_CKM.2.1: 2
    • FCS_CKM_EXT: 1
    • FCS_CKM_EXT.4: 8
    • FCS_CKM_EXT.4.1: 2
    • FCS_CKM_EXT.4.2: 1
    • FCS_COP.1: 26
    • FCS_COP.1.1: 25
    • FCS_RBG_EXT: 1
    • FCS_RBG_EXT.1: 6
    • FCS_RBG_EXT.1.1: 1
    • FCS_RBG_EXT.1.2: 1
    • FCS_SSHC_EXT: 1
    • FCS_SSHC_EXT.1: 3
    • FCS_SSHC_EXT.1.1: 1
    • FCS_SSHS_EXT: 2
    • FCS_SSHS_EXT.1: 2
    • FCS_SSHS_EXT.1.1: 1
    • FCS_SSH_EXT: 2
    • FCS_SSH_EXT.1: 8
    • FCS_SSH_EXT.1.1: 1
    • FCS_SSH_EXT.1.2: 1
    • FCS_SSH_EXT.1.3: 1
    • FCS_SSH_EXT.1.4: 1
    • FCS_SSH_EXT.1.5: 1
    • FCS_SSH_EXT.1.6: 1
    • FCS_SSH_EXT.1.7: 1
    • FCS_SSH_EXT.1.8: 1
    • FCS_STO_EXT: 1
    • FCS_STO_EXT.1: 4
    • FCS_STO_EXT.1.1: 1
    • FCS_TLSC_EXT.1: 14
    • FCS_TLSC_EXT.1.1: 4
    • FCS_TLSC_EXT.1.2: 2
    • FCS_TLSC_EXT.1.3: 2
    • FCS_TLSC_EXT.2: 8
    • FCS_TLSC_EXT.2.1: 5
    • FCS_TLSC_EXT.3: 8
    • FCS_TLSC_EXT.3.1: 1
    • FCS_TLSC_EXT.4: 7
    • FCS_TLSC_EXT.4.1: 1
    • FCS_TLSC_EXT.5: 7
    • FCS_TLSC_EXT.5.1: 1
    • FCS_TLSS_EXT: 1
    • FCS_TLSS_EXT.1: 8
    • FCS_TLSS_EXT.1.1: 4
    • FCS_TLSS_EXT.1.2: 1
    • FCS_TLSS_EXT.1.3: 1
    • FCS_TLSS_EXT.2: 7
    • FCS_TLSS_EXT.2.1: 1
    • FCS_TLSS_EXT.2.2: 1
    • FCS_TLSS_EXT.2.3: 1
    • FCS_TLSS_EXT.3: 6
    • FCS_TLSS_EXT.3.1: 1
    • FCS_TLS_EXT.1: 6
    • FCS_TLS_EXT.1.1: 3
  • FDP:
    • FDP_ACF_EXT: 1
    • FDP_ACF_EXT.1: 4
    • FDP_ACF_EXT.1.1: 1
  • FIA:
    • FIA_AFL: 1
    • FIA_AFL.1: 4
    • FIA_AFL.1.1: 1
    • FIA_AFL.1.2: 1
    • FIA_UAU: 1
    • FIA_UAU.5: 4
    • FIA_UAU.5.1: 1
    • FIA_UAU.5.2: 1
  • FMT:
    • FMT_MOF_EXT.1: 6
    • FMT_MOF_EXT.1.1: 1
    • FMT_SMF_EXT: 2
    • FMT_SMF_EXT.1: 4
    • FMT_SMF_EXT.1.1: 2
  • FPT:
    • FPT_ACF_EXT: 1
    • FPT_ACF_EXT.1: 4
    • FPT_ACF_EXT.1.1: 1
    • FPT_ACF_EXT.1.2: 1
    • FPT_ASLR_EXT: 1
    • FPT_ASLR_EXT.1: 4
    • FPT_ASLR_EXT.1.1: 1
    • FPT_SBOP_EXT: 1
    • FPT_SBOP_EXT.1: 4
    • FPT_SBOP_EXT.1.1: 1
    • FPT_TST_EXT: 1
    • FPT_TST_EXT.1: 4
    • FPT_TST_EXT.1.1: 2
    • FPT_TUD_EXT: 4
    • FPT_TUD_EXT.1: 5
    • FPT_TUD_EXT.1.1: 2
    • FPT_TUD_EXT.1.2: 1
    • FPT_TUD_EXT.2: 4
    • FPT_TUD_EXT.2.1: 2
    • FPT_TUD_EXT.2.2: 1
  • FTA:
    • FTA_TAB: 1
    • FTA_TAB.1: 5
    • FTA_TAB.1.1: 1
  • FTP:
    • FTP_ITC_EXT.1: 9
    • FTP_ITC_EXT.1.1: 1
    • FTP_TRP: 1
    • FTP_TRP.1: 4
    • FTP_TRP.1.1: 1
    • FTP_TRP.1.2: 1
    • FTP_TRP.1.3: 1
  • FAU:
    • FAU_GEN: 1
    • FAU_GEN.1: 4
    • FAU_GEN.1.1: 1
    • FAU_GEN.1.2: 1
    • FAU_SAR: 1
    • FAU_SAR.1: 4
    • FAU_SAR.1.1: 1
    • FAU_SAR.1.2: 1
    • FAU_STG: 1
    • FAU_STG.1: 4
    • FAU_STG.1.1: 1
    • FAU_STG.1.2: 1
  • FCS:
    • FCS_CKM: 2
    • FCS_CKM.1: 5
    • FCS_CKM.1.1: 1
    • FCS_CKM.2: 5
    • FCS_CKM.2.1: 1
    • FCS_CKM.4: 6
    • FCS_COP: 1
    • FCS_COP.1: 7
    • FCS_COP.1.1: 1
  • FDP:
    • FDP_IFC: 1
    • FDP_IFC.1: 4
    • FDP_IFC.1.1: 1
    • FDP_IFF: 1
    • FDP_IFF.1: 6
    • FDP_IFF.1.1: 1
    • FDP_IFF.1.2: 1
    • FDP_IFF.1.3: 1
    • FDP_IFF.1.4: 1
    • FDP_IFF.1.5: 1
  • FIA:
    • FIA_ATD: 1
    • FIA_ATD.1: 8
    • FIA_ATD.1.1: 1
    • FIA_SOS: 1
    • FIA_SOS.1: 6
    • FIA_SOS.1.1: 1
    • FIA_UAU: 1
    • FIA_UAU.2: 7
    • FIA_UAU.2.1: 1
    • FIA_UID: 1
    • FIA_UID.2: 7
    • FIA_UID.2.1: 1
  • FMT:
    • FMT_MOF: 1
    • FMT_MOF.1: 6
    • FMT_MOF.1.1: 1
    • FMT_MSA: 3
    • FMT_MSA.1: 4
    • FMT_MSA.1.1: 1
    • FMT_MSA.2: 4
    • FMT_MSA.2.1: 1
    • FMT_MSA.3: 4
    • FMT_MSA.3.1: 1
    • FMT_MSA.3.2: 1
    • FMT_MTD: 1
    • FMT_MTD.1: 8
    • FMT_MTD.1.1: 3
    • FMT_SMF: 1
    • FMT_SMF.1: 7
    • FMT_SMF.1.1: 1
    • FMT_SMR: 1
    • FMT_SMR.1: 8
    • FMT_SMR.1.1: 1
    • FMT_SMR.1.2: 1
  • FPT:
    • FPT_ITT: 1
    • FPT_ITT.1: 4
    • FPT_ITT.1.1: 1
    • FPT_STM: 1
    • FPT_STM.1: 5
    • FPT_STM.1.1: 1
pdf_data/st_keywords/cc_claims
  • A:
    • A.PLATFORM: 3
    • A.PROPER_ADMIN: 3
    • A.PROPER_USER: 3
  • O:
    • O.ACCOUNTABILITY: 6
    • O.INTEGRITY: 6
    • O.MANAGEMENT: 6
    • O.PROTECTED_COMMS: 8
    • O.PROTECTED_STORAGE: 4
  • OE:
    • OE.PLATFORM: 3
    • OE.PROPER_ADMIN: 3
    • OE.PROPER_USER: 3
  • T:
    • T.LIMITED_PHYSICAL_ACCESS: 2
    • T.LOCAL_ATTACK: 2
    • T.NETWORK_ATTACK: 6
    • T.NETWORK_EAVESDROP: 4
  • A:
    • A.LOCATE: 3
    • A.NOEVIL: 2
  • O:
    • O.AMANAGE: 6
    • O.AUDIT: 7
    • O.ENCRYPT: 7
    • O.PROTECT: 5
    • O.SECKEY: 5
    • O.TOECOM: 4
    • O.UNAUTH_ENDPOINT: 6
  • OE:
    • OE.ADMIN: 3
    • OE.PHYSICAL: 3
  • T:
    • T.NOAUDIT: 2
    • T.OPS: 3
    • T.PRIVIL: 2
    • T.PROCOM: 3
    • T.TOECOM: 2
    • T.UNAUTH_ENDPOINT: 3
pdf_data/st_keywords/symmetric_crypto
  • AES_competition:
    • AES:
      • AES: 12
      • AES-128: 2
      • AES-192: 1
      • AES-256: 3
  • constructions:
    • MAC:
      • HMAC: 11
  • AES_competition:
    • AES:
      • AES: 6
  • DES:
    • 3DES:
      • TDES: 6
pdf_data/st_keywords/asymmetric_crypto
  • ECC:
    • ECC:
      • ECC: 3
    • ECDH:
      • ECDHE: 1
    • ECDSA:
      • ECDSA: 9
  • FF:
    • DH:
      • DH: 4
      • Diffie-Hellman: 7
    • DSA:
      • DSA: 6
pdf_data/st_keywords/hash_function
  • PBKDF:
    • PBKDF2: 2
  • SHA:
    • SHA1:
      • SHA-1: 7
    • SHA2:
      • SHA-2: 5
      • SHA-256: 6
      • SHA-384: 3
      • SHA-512: 6
      • SHA256: 5
      • SHA384: 4
      • SHA512: 4
  • SHA:
    • SHA1:
      • SHA-1: 1
pdf_data/st_keywords/crypto_scheme
  • KEX:
    • KEX: 2
    • Key Exchange: 2
  • MAC:
    • MAC: 1
  • MAC:
    • MAC: 4
pdf_data/st_keywords/crypto_protocol
  • SSH:
    • SSH: 103
    • SSHv2: 3
  • TLS:
    • SSL:
      • SSL 2.0: 1
      • SSL 3.0: 1
    • TLS:
      • TLS: 119
      • TLS 1.0: 1
      • TLS 1.1: 1
      • TLS 1.2: 5
      • TLS v1.2: 3
  • VPN:
    • VPN: 4
  • SSH:
    • SSH: 1
  • TLS:
    • SSL:
      • SSL: 1
    • TLS:
      • TLS: 4
  • VPN:
    • VPN: 1
pdf_data/st_keywords/randomness
  • PRNG:
    • DRBG: 7
    • PRNG: 1
  • RNG:
    • RBG: 1
    • RNG: 1
pdf_data/st_keywords/cipher_mode
  • CBC:
    • CBC: 2
  • CTR:
    • CTR: 3
  • GCM:
    • GCM: 4
  • XTS:
    • XTS: 1
  • CBC:
    • CBC: 1
pdf_data/st_keywords/ecc_curve
  • NIST:
    • P-256: 4
    • P-384: 4
    • P-521: 4
    • secp256r1: 4
    • secp384r1: 4
    • secp521r1: 4
pdf_data/st_keywords/tls_cipher_suite
  • TLS:
    • TLS_DHE_RSA_WITH_AES_128_CBC_SHA256: 3
    • TLS_DHE_RSA_WITH_AES_128_GCM_SHA256: 3
    • TLS_DHE_RSA_WITH_AES_256_CBC_SHA256: 3
    • TLS_DHE_RSA_WITH_AES_256_GCM_SHA384: 3
    • TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256: 3
    • TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256: 3
    • TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384: 3
    • TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384: 3
    • TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256: 3
    • TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256: 3
    • TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384: 3
    • TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384: 3
    • TLS_RSA_WITH_AES_128_CBC_SHA: 3
    • TLS_RSA_WITH_AES_128_CBC_SHA256: 3
    • TLS_RSA_WITH_AES_128_GCM_SHA256: 3
    • TLS_RSA_WITH_AES_256_CBC_SHA: 3
    • TLS_RSA_WITH_AES_256_CBC_SHA256: 3
    • TLS_RSA_WITH_AES_256_GCM_SHA384: 3
pdf_data/st_keywords/crypto_library
  • OpenSSL:
    • OpenSSL: 16
pdf_data/st_keywords/tee_name
  • IBM:
    • SE: 87
pdf_data/st_keywords/standard_id
  • CC:
    • CCIMB-2012-09-003: 1
    • CCMB-2012-09-001: 1
  • FIPS:
    • FIPS 186-4: 2
    • FIPS PUB 186-4: 5
    • FIPS140: 2
    • FIPS186: 1
    • FIPS186-4: 4
    • FIPS197: 2
    • FIPS198-1: 1
  • NIST:
    • NIST SP 800-131A: 1
    • NIST SP 800-38A: 1
    • NIST SP 800-38D: 1
    • NIST SP 800-38E: 1
    • NIST SP 800-57: 2
    • NIST SP 800-90A: 1
  • RFC:
    • RFC 3526: 2
    • RFC 4151: 1
    • RFC 4251: 1
    • RFC 4252: 5
    • RFC 4253: 11
    • RFC 4256: 2
    • RFC 4344: 3
    • RFC 5246: 21
    • RFC 5280: 4
    • RFC 5288: 12
    • RFC 5289: 24
    • RFC 5656: 16
    • RFC 5759: 1
    • RFC 6125: 2
    • RFC 6668: 3
    • RFC 6960: 1
    • RFC 8017: 1
    • RFC 8268: 2
    • RFC 8332: 7
  • X509:
    • X.509: 16
    • x.509: 2
  • FIPS:
    • FIPS 180-2: 1
    • FIPS 197: 2
    • FIPS 46-3: 2
  • PKCS:
    • PKCS7: 1
  • RFC:
    • RFC 2246: 1
pdf_data/st_keywords/certification_process
  • OutOfScope:
    • DAC mechanism but may be supplemented by further restrictions. These additional restrictions are out of scope for this evaluation. Examples of objects that are accessible to users but cannot be used to store: 1
    • The OS relies upon a trustworthy computing platform for its execution. This underlying platform is out of scope of this PP. A.PROPER_USER The user of the OS is not willfully negligent or hostile, and uses the: 1
    • out of scope: 2
pdf_data/st_metadata
  • /Author: Apex Assurance Group
  • /Client: Juniper Networks
  • /Company:
  • /CreationDate: D:20130722160254+08'00'
  • /Creator: Acrobat PDFMaker 10.1 for Word
  • /DocVersion: 1.3
  • /ModDate: D:20130722160304+08'00'
  • /Producer: Adobe PDF Library 10.0
  • /Product Name: Junos Pulse Access Control Service
  • /Product Version: 4.2
  • /Rev: R4
  • /SourceModified: D:20130716035006
  • /Subject: Junos Pulse Access Control Service 4.2R4
  • /Title: Security Target
  • pdf_file_size_bytes: 504670
  • pdf_hyperlinks: http://www.apexassurance.com/, http://www.juniper.net/
  • pdf_is_encrypted: True
  • pdf_number_of_pages: 38
state/report/pdf_hash Different Different
state/report/txt_hash Different Different
state/st/pdf_hash Different Different
state/st/txt_hash Different Different