Comparing certificates Experimental feature

You are comparing two certificates. By default, only differing attributes are shown. Use the button below to show/hide all attributes.

Showing only differing attributes.
Automated Privilege Password Management v4.0.01
ISCB-5-RPT-C082-CR-v1
VMware® ESXi 4.0 Update 1 and vCenter Server 4.0 Update 1
383-4-147
name Automated Privilege Password Management v4.0.01 VMware® ESXi 4.0 Update 1 and vCenter Server 4.0 Update 1
category Other Devices and Systems Operating Systems
scheme MY CA
not_valid_after 24.11.2022 15.05.2017
not_valid_before 24.11.2017 15.10.2010
report_link https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/ISCB-5-RPT-C082-CR-v1.pdf https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/vmware-esxi-v40-cert-eng.pdf
st_link https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/SecureKi%20APPM_ST_0.5.pdf https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/vmware-esxi-v40-sec-eng.pdf
manufacturer SecureKi Sdn. Bhd. VMware Inc.
manufacturer_web https://www.secureki.com/ https://www.vmware.com
security_level EAL2 EAL4+, ALC_FLR.2
dgst e9dc44ab77bbeeda 6d943c6a06ed7b36
heuristics/cert_id ISCB-5-RPT-C082-CR-v1 383-4-147
heuristics/cert_lab [] CANADA
heuristics/extracted_sars ASE_CCL.1, ATE_FUN.1, ASE_OBJ.2, ALC_CMS.2, ASE_INT.1, ASE_REQ.2, AGD_PRE.1, ATE_IND.2, ASE_ECD.1, AVA_VAN.2, ADV_TDS.1, ASE_SPD.1, ALC_CMC.2, ADV_FSP.2, ATE_COV.1, AGD_OPE.1, ALC_DEL.1, ASE_TSS.1, ADV_ARC.1 ALC_LCD.1, ADV_TDS.3, ALC_TAT.1, AVA_VAN.3, AGD_PRE.1, ATE_FUN.1, ATE_IND.2, ALC_FLR.2, ATE_DPT.1, AGD_OPE.1, ATE_COV.2, ALC_CMS.4, ALC_CMC.4, ADV_IMP.1, ALC_DEL.1, ADV_FSP.4, ADV_ARC.1, ALC_DVS.1
heuristics/extracted_versions 4.0.01 4.0
heuristics/scheme_data
  • cert_no: 2017-008-C082
  • certification_date: 24.11.2017
  • developer: SecureKi Sdn. Bhd.
  • enhanced:
    • assurance_level: EAL2
    • category: Other Devices and Systems
    • cert_id: C082
    • certification_date: 24.11.2017
    • developer: The TOE is a solution to manage the issuance of One Time Password access credentials and permissions on Unix servers, Linux servers, Windows servers, network devices and other relevant applications for the assigned/registered privileged accounts in these stated components. The TOE primary features include: Security Audit: The TOE will generate audit records for selected security events in several log files and categories. Each audited event will be recorded along with date and time of event, user accounts that performed the event, event name and other event details. Authentication and Identification: All TOE Administrator (Super User) must have a valid username/user ID inclusive of password to access and OTP. TOE Administrator (Super User) must login to APPM to manage all the connected devices (IT entities) as well as credentials of accessing these IT entities. Thus, configurations of these IT entities required to be registered in the APPM system, plus configuration policy of managing the access credentials of the IT entities shall be defined. User Data Protection: User data and credentials including TOE Administrator (Super User) information is protected by ensuring that specific TOE Administrator (Super User) that is assigned with roles and privilege scan only access specific web pages/portals and hence the data associated with the web pages/portal. The accessibility of the pages/portals is protected based upon the access control policy. Security Management: TOE Administrator (Super User) has access to all TOE features, that applicable to be managed through web application portal hosted by TOE. TOE is able to provide accessibility of account that has access privilege, similar or limited, to “Super User” account. In which, Super User account has the full access rights, role and privileges to the TOE.
    • expiration_date: 24.11.2022
    • mutual_recognition: CCRA
    • product: Automated Privilege Password Management v4.0.01
    • report_link: https://iscb.cybersecurity.my/resources/document/mycc/mycpr/C082/ISCB-5-RPT-C082-CR-v1.pdf
    • scope: SecureKi Sdn. Bhd.DF2-09-03A (Unit No.2),Level 9, Persoft Tower,Persiaran Tropicana, URL: www.secureki.comEmail: [email protected]: +603 7652 1188
    • status: Archive
    • target_link: https://iscb.cybersecurity.my/resources/document/mycc/mycpr/C082/SecureKi%20APPM_ST_0.5.pdf
    • type: A management of the issuance of One Time Password
  • expiration_date: 24.11.2022
  • level: EAL2
  • product: Automated Privilege Password Management v4.0.01
  • recognition: CCRA
  • url: https://iscb.cybersecurity.my/index.php/certification/product-certification/mycc/archived-certified-products-and-systems/submission-view/138
maintenance_updates
pdf_data/report_filename ISCB-5-RPT-C082-CR-v1.pdf vmware-esxi-v40-cert-eng.pdf
pdf_data/report_frontpage
  • CA:
  • CA:
    • cert_id: 383-4-147-CR
    • cert_lab: CANADA
pdf_data/report_keywords/cc_cert_id
  • MY:
    • ISCB-5-RPT-C082-CR-v1: 29
  • CA:
    • 383-4-147-CR: 1
pdf_data/report_keywords/cc_security_level
  • EAL:
    • EAL2: 9
  • EAL:
    • EAL 4: 4
    • EAL 4 augmented: 2
    • EAL 4+: 3
    • EAL4+: 1
pdf_data/report_keywords/cc_sar
  • ALC:
    • ALC_FLR.2: 2
pdf_data/report_keywords/vendor
  • Microsoft:
    • Microsoft: 1
pdf_data/report_keywords/eval_facility
  • EWA:
    • EWA-Canada: 4
pdf_data/report_keywords/symmetric_crypto
  • AES_competition:
    • AES:
      • AES: 1
  • DES:
    • 3DES:
      • 3DES: 1
      • Triple-DES: 1
pdf_data/report_keywords/hash_function
  • SHA:
    • SHA1:
      • SHA-1: 1
pdf_data/report_keywords/crypto_protocol
  • SSH:
    • SSH: 4
pdf_data/report_keywords/standard_id
  • ISO:
    • ISO/IEC 18045: 2
    • ISO/IEC15408: 2
  • FIPS:
    • FIPS 180-3: 1
    • FIPS 186-2: 1
    • FIPS 197: 1
    • FIPS 46-3: 1
  • ISO:
    • ISO/IEC 17025:2005: 1
pdf_data/report_metadata
  • /AM_ACPP_Date: [dd month yyyy]
  • /AM_ACPP_Doc#: [AM_AMCPP_Doc#]
  • /AM_ACPP_Title: Assurance Continuity Program Plan (ACPP)
  • /AM_ACPP_Version: [AM_AMCPP_Version]
  • /AM_IAR_Date: [dd month yyyy]
  • /AM_IAR_Doc#: [AM_IAR_Doc#]
  • /AM_IAR_Title: Assurance Maintenace Impact Analysis Report
  • /AM_IAR_Version: [AM_IAR_Version]
  • /AM_ST Date: [dd month yyyy]
  • /AM_ST Title: [AM_ST Title]
  • /AM_ST Version: [AM_ST Version]
  • /AM_TOE: [AM_TOE]
  • /AM_TOE Short: [AM_TOE Short]
  • /AM_TOE Version: [AM_TOE Version]
  • /Author: sjackson
  • /CC Version: 3.1 Revision 3
  • /CC date: July 2009
  • /CEM Version: 3.1 Revision 3
  • /CEM date: July 2009
  • /CR_Date: 2 September 2010
  • /CR_Version: 0.3
  • /Client City: Palo Alto
  • /Client Country: USA
  • /Client Full Name: VMware, Inc.
  • /Client Postal Code: 94304
  • /Client Short Name: VMware
  • /Client State: CA
  • /Client Street: 3401 Hillview Ave.
  • /CreationDate: D:20101123115917-05'00'
  • /Creator: Acrobat PDFMaker 9.0 for Word
  • /Developer Long Name: VMware, Inc.
  • /Developer Short Name: VMware
  • /EAL Level: 4+
  • /EAL Level Base: 4
  • /EAL Level Text: 4 augmented
  • /EAL Long: EAL 4 Augmented
  • /EAL Short: EAL 4+
  • /ER Document Date: 9 September 2009
  • /ER Version: Version 1.0
  • /ETPlan_Doc#: 1651-000-D003
  • /ETPlan_Title: Evaluation Test Plan
  • /ETPlan_Version: 0.1
  • /ETPlan_date: 3 August 2010
  • /ETProcRes_Date: September 2010
  • /ETProcRes_Doc#: 1651-000-D005
  • /ETProcRes_Title: Evaluation Test Results
  • /ETProcRes_Version: 0.1
  • /ETProc_Date: 13 August 2010
  • /ETProc_Doc#: 1651-000-D004
  • /ETProc_Title: Evaluation Test Procedures
  • /ETProc_Version: 0.2
  • /ETReport_Date: 1 September 2010
  • /ETReport_Doc#: 1651-000-D002
  • /ETReport_Title: Evaluation Technical Report
  • /ETReport_TitleShort: ETR
  • /ETReport_Version: 1.4
  • /EWP_Date: 5 July 2010
  • /EWP_Doc#: 1651-000-D001
  • /EWP_Title: Evaluation Work Plan for EAL 4+ Common Criteria Evaluation of VMware Incorporated ESX 4.0 and vCenter 4.0, Document No. 1651-000-D001, Version 1.3, 5 July 2010, Common Criteria Evaluation Number: 383-4-145
  • /EWP_Version: 1.3
  • /Eval number: 383-4-145
  • /Eval_End_Date: 22 October 2010
  • /Eval_Start_Date: 1 December 2009
  • /LeadEvaluator: K. Braun
  • /LeadEvaluatorInitials: KB
  • /ModDate: D:20101123120044-05'00'
  • /Producer: Acrobat Distiller 9.0.0 (Windows)
  • /ProjectManager: M. Gauvreau
  • /ProjectManagerInitials: MG
  • /ProjectNumber: 1651
  • /ST_Date: 31 August 2010
  • /ST_Title: VMware, Inc. VMware® ESXi 4.0 Update 1 and vCenter Server 4.0 Update 1 Security Target
  • /ST_Version: 1.2
  • /SVC_Date: 5 August 2009
  • /SVC_Doc#: 1610-000-D006
  • /SVC_Title: Site Visit Checklist
  • /SVC_Version: 1.0
  • /SVR_Date: 5 August 2009
  • /SVR_Doc#: 1610-000-D006
  • /SVR_Title: Site Visit Report
  • /SVR_Version: 1.0
  • /SV_City: Palo Alto
  • /Security Classification: EWA-Canada & VMware Proprietary
  • /SourceModified: D:20101123164210
  • /Sponsor: VMware, Inc.
  • /Sponsor City: Palo Alto
  • /Sponsor Country: USA
  • /Sponsor Postal Code: 94304
  • /Sponsor State: CA
  • /Sponsor Street: 3401 Hillview Ave.
  • /TOE: VMware® ESX 4.0 Update 1 and vCenter Server 4.0 Update 1
  • /TOE Short-NoTM: ESXi and vCenter Server 4.0 Update 1
  • /TOE Version: 4.0 Update 1
  • /TOE with version: VMware® ESXi 4.0 Update 1 and vCenter Server 4.0 Update 1
  • /TOE-NoTM: VMware® ESX 4.0 Update 1 and vCenter Server 4.0 Update 1
  • /Title: EAL X+ Evaluation of [Developer Long Name]
  • /_AdHocReviewCycleID: 1598644691
  • /_AuthorEmail: [email protected]
  • /_AuthorEmailDisplayName: Reade, Rick A.
  • /_EmailSubject: CPL post request ... rr
  • pdf_file_size_bytes: 95769
  • pdf_hyperlinks: {}
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 17
pdf_data/st_filename SecureKi APPM_ST_0.5.pdf vmware-esxi-v40-sec-eng.pdf
pdf_data/st_keywords/cc_security_level
  • EAL:
    • EAL 2: 1
    • EAL2: 5
  • EAL:
    • EAL4: 2
    • EAL4+: 3
pdf_data/st_keywords/cc_sar
  • ADV:
    • ADV_ARC.1: 1
    • ADV_FSP.2: 1
    • ADV_TDS.1: 1
  • AGD:
    • AGD_OPE.1: 1
    • AGD_PRE.1: 1
  • ALC:
    • ALC_CMC.2: 1
    • ALC_CMS.2: 1
    • ALC_DEL.1: 1
  • ASE:
    • ASE_CCL.1: 1
    • ASE_ECD.1: 1
    • ASE_INT.1: 1
    • ASE_OBJ.2: 1
    • ASE_REQ.2: 1
    • ASE_SPD.1: 1
    • ASE_TSS.1: 1
  • ATE:
    • ATE_COV.1: 1
    • ATE_FUN.1: 1
    • ATE_IND.2: 1
  • AVA:
    • AVA_VAN.2: 1
  • ADV:
    • ADV_ARC.1: 1
    • ADV_FSP.4: 1
    • ADV_IMP.1: 1
    • ADV_TDS.3: 1
  • AGD:
    • AGD_OPE.1: 1
    • AGD_PRE.1: 1
  • ALC:
    • ALC_CMC.4: 1
    • ALC_CMS.4: 1
    • ALC_DEL.1: 1
    • ALC_DVS.1: 1
    • ALC_FLR.2: 4
    • ALC_LCD.1: 1
    • ALC_TAT.1: 1
  • ATE:
    • ATE_COV.2: 1
    • ATE_DPT.1: 1
    • ATE_FUN.1: 1
    • ATE_IND.2: 1
  • AVA:
    • AVA_VAN.3: 1
pdf_data/st_keywords/cc_sfr
  • FAU:
    • FAU_GEN.1: 9
    • FAU_GEN.1.1: 1
    • FAU_GEN.1.2: 1
    • FAU_GEN.2: 5
    • FAU_GEN.2.1: 1
    • FAU_SAR.1: 6
    • FAU_SAR.1.1: 1
    • FAU_SAR.1.2: 1
    • FAU_SAR.2: 5
    • FAU_SAR.2.1: 1
    • FAU_STG.1: 6
    • FAU_STG.1.1: 1
    • FAU_STG.1.2: 1
  • FCS:
    • FCS_COP.1: 1
  • FDP:
    • FDP_ACC.1: 10
    • FDP_ACC.1.1: 1
    • FDP_ACF.1: 6
    • FDP_ACF.1.1: 1
    • FDP_ACF.1.2: 1
    • FDP_ACF.1.3: 1
    • FDP_ACF.1.4: 1
    • FDP_IFC.1: 10
    • FDP_IFC.1.1: 1
    • FDP_IFF.1: 6
    • FDP_IFF.1.1: 1
    • FDP_IFF.1.2: 1
    • FDP_IFF.1.3: 1
    • FDP_IFF.1.4: 1
    • FDP_IFF.1.5: 1
  • FIA:
    • FIA_ATD.1: 6
    • FIA_ATD.1.1: 1
    • FIA_UAU.1: 1
    • FIA_UAU.2: 6
    • FIA_UAU.2.1: 1
    • FIA_UID.1: 10
    • FIA_UID.2: 14
    • FIA_UID.2.1: 1
    • FIA_USB.1: 5
    • FIA_USB.1.1: 1
    • FIA_USB.1.2: 1
  • FMT:
    • FMT_MOF.1: 6
    • FMT_MOF.1.1: 1
    • FMT_MSA.1: 6
    • FMT_MSA.1.1: 1
    • FMT_MSA.3: 9
    • FMT_MSA.3.1: 1
    • FMT_MSA.3.2: 1
    • FMT_MTD.1: 6
    • FMT_MTD.1.1: 1
    • FMT_SMF.1: 10
    • FMT_SMF.1.1: 1
    • FMT_SMR.1: 11
    • FMT_SMR.1.1: 1
    • FMT_SMR.1.2: 1
  • FPT:
    • FPT_STM.1: 3
  • FAU:
    • FAU_ARP.1: 2
    • FAU_GEN.1: 9
    • FAU_GEN.1.1: 1
    • FAU_GEN.1.2: 1
    • FAU_SAR.1: 6
    • FAU_SAR.1.1: 1
    • FAU_SAR.1.2: 1
  • FCS:
    • FCS_CKM.1: 2
    • FCS_CKM.4: 2
    • FCS_COP.1: 6
    • FCS_COP.1.1: 1
  • FDP:
    • FDP_ACC.1: 21
    • FDP_ACC.1.1: 2
    • FDP_ACF.1: 16
    • FDP_ACF.1.1: 2
    • FDP_ACF.1.2: 2
    • FDP_ACF.1.3: 2
    • FDP_ACF.1.4: 2
    • FDP_IFC.1: 5
    • FDP_IFC.2: 7
    • FDP_IFC.2.1: 1
    • FDP_IFC.2.2: 1
    • FDP_IFF.1: 7
    • FDP_IFF.1.1: 1
    • FDP_IFF.1.2: 1
    • FDP_IFF.1.3: 1
    • FDP_IFF.1.4: 1
    • FDP_IFF.1.5: 1
    • FDP_ITC.1: 1
    • FDP_ITC.2: 1
  • FIA:
    • FIA_UAU.1: 3
    • FIA_UAU.2: 11
    • FIA_UAU.2.1: 1
    • FIA_UID.1: 8
    • FIA_UID.2: 11
    • FIA_UID.2.1: 1
  • FMT:
    • FMT_MSA.1: 26
    • FMT_MSA.1.1: 3
    • FMT_MSA.3: 26
    • FMT_MSA.3.1: 3
    • FMT_MSA.3.2: 3
    • FMT_SMF.1: 12
    • FMT_SMF.1.1: 1
    • FMT_SMR.1: 27
    • FMT_SMR.1.1: 2
    • FMT_SMR.1.2: 2
  • FPT:
    • FPT_ITC.1: 6
    • FPT_ITC.1.1: 1
    • FPT_ITT.1: 6
    • FPT_ITT.1.1: 1
    • FPT_STM.1: 3
pdf_data/st_keywords/cc_claims
  • A:
    • A.ADMIN: 2
    • A.CONN: 2
    • A.PHY: 2
    • A.TIMEBACK: 2
  • O:
    • O.ACCESSLOG: 3
    • O.AUDIT: 3
    • O.CONFIG: 4
    • O.DEVICEAPP: 2
    • O.NOAUTH: 3
    • O.SESSION: 3
  • OE:
    • OE.ADMIN: 3
    • OE.CONN: 3
    • OE.PHY: 2
    • OE.TIMEBACK: 2
  • T:
    • T.ACCESSLOG: 2
    • T.AUDIT: 2
    • T.CONFIG: 2
    • T.DEVICEAPP: 2
    • T.NOAUTH: 2
    • T.REMOTE: 2
    • T.SESSION: 2
  • A:
    • A.NOEVIL: 2
    • A.PHYSCL: 3
  • O:
    • O.ACCESS: 7
    • O.ADMIN: 6
    • O.AUDIT: 6
    • O.CONTINUITY: 4
    • O.IDAUTH: 9
    • O.SECURE: 5
    • O.VLAN: 4
    • O.VM: 4
    • O.VSWITCH: 4
  • OE:
    • OE.IDAUTH: 7
    • OE.SEP: 7
    • OE.TIME: 5
  • T:
    • T.AVAILABILITY: 2
    • T.COMINT: 2
    • T.PRIVIL: 2
    • T.VIRTUAL_NETWORK: 2
    • T.VM: 2
pdf_data/st_keywords/vendor
  • Cisco:
    • Cisco: 1
  • Cisco:
    • Cisco: 2
  • Microsoft:
    • Microsoft: 12
pdf_data/st_keywords/symmetric_crypto
  • AES_competition:
    • AES:
      • AES: 2
  • DES:
    • DES:
      • DES: 1
pdf_data/st_keywords/hash_function
  • SHA:
    • SHA1:
      • SHA-1: 2
pdf_data/st_keywords/crypto_protocol
  • SSH:
    • SSH: 3
  • TLS:
    • SSL:
      • SSL: 10
pdf_data/st_keywords/cipher_mode
  • CBC:
    • CBC: 2
pdf_data/st_keywords/crypto_library
  • OpenSSL:
    • OpenSSL: 4
pdf_data/st_keywords/side_channel_analysis
  • FI:
    • malfunction: 10
    • physical tampering: 2
pdf_data/st_metadata
  • /Author: wlim
  • /CreationDate: D:20171020131113+08'00'
  • /Creator: Microsoft® Word 2010
  • /ModDate: D:20171020131113+08'00'
  • /Producer: Microsoft® Word 2010
  • /Subject: SECUREKi APPM Security Target
  • /Title: SECUREKi APPM Security Target
  • pdf_file_size_bytes: 849588
  • pdf_hyperlinks: mailto:[email protected], http://www.secureki.com/
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 47
state/report/pdf_hash Different Different
state/report/txt_hash Different Different
state/st/pdf_hash Different Different
state/st/txt_hash Different Different