ADSS PKI Server v8

CSV information

Status active
Valid from 17.04.2023
Valid until 17.04.2028
Scheme 🇮🇹 IT
Manufacturer Ascertia Ltd.
Category Key Management Systems
Security level EAL4+, ALC_FLR.3
Maintenance updates OCSI/MNT/ASC/01/2024/RM - Note: addition of ALC_FLR.3 (17.10.2024) Certification report Security target

Heuristics summary

Certificate ID: OCSI/CERT/CCL/07/2022/RC

Certificate

Extracted keywords

Security level
EAL4, EAL2

Standards
ISO/IEC 15408

File metadata

Title Certification Report "ADSS PKI Server v8".pdf
Author t.inzerilli
Creation date D:20230419150931+02'00'
Modification date D:20230419150931+02'00'
Pages 1
Producer Microsoft: Print To PDF

Certification report

Extracted keywords

Symmetric Algorithms
AES, HMAC
Asymmetric Algorithms
ECC
Protocols
TLS, TLS v1.2, VPN

Vendor
Thales, Microsoft

Security level
EAL4, EAL2, EAL 4
Claims
O.J
Security Assurance Requirements (SAR)
ADV_ARC.1, ADV_FSP.4, ADV_IMP.1, ADV_TDS.3, AGD_OPE.1, AGD_PRE.1, ALC_FLR, ALC_CMC.4, ALC_CMS.4, ALC_DEL.1, ALC_DVS.1, ALC_LCD.1, ALC_TAT.1, ATE_COV.2, ATE_DPT.1, ATE_FUN.1, ATE_IND.2, AVA_VAN.3, ASE_CCL.1, ASE_ECD.1, ASE_INT.1, ASE_OBJ.2, ASE_REQ.2, ASE_SPD.1, ASE_TSS.1
Certificates
OCSI/CERT/CCL/07/2022/RC
Evaluation facilities
CCLab Software Laboratory

Standards
ISO/IEC 15408, ISO/IEC 18045:2008, X.509, CCMB-2017-04-001, CCMB-2017-04-002, CCMB-2017-04-003, CCMB-2017-04-004
Technical reports
BSI TR-03110-1

File metadata

Title Certification Report "ADSS PKI Server v8"
Author OCSI
Creation date D:20230419124733+02'00'
Modification date D:20230419124733+02'00'
Pages 31
Creator Microsoft® Word per Microsoft 365
Producer Microsoft® Word per Microsoft 365

Security target

Extracted keywords

Symmetric Algorithms
AES, DES, HMAC, HMAC-SHA-256
Asymmetric Algorithms
ECDSA, ECC, Diffie-Hellman, DH, DHE, DSA
Hash functions
SHA1, SHA-1, SHA-256, SHA-512, SHA256, SHA-384, SHA-2, SHA-3, SHA3-256, SHA3-384, SHA3-512
Schemes
MAC, Key Exchange
Protocols
SSH, SSL, SSL 2.0, SSL 3.0, SSL2.0, TLS, TLS v1.2, TLS 1.2, TLS 1.1, TLS 1.0, TLS1.0, IKE, IPsec, VPN, PGP
Randomness
DRBG, RBG
Elliptic Curves
P-256, P-384, P-521, secp256r1, secp384r1, secp521r1
Block cipher modes
CBC, GCM, CCM
TLS cipher suites
TLS_RSA_WITH_AES_128_GCM_SHA256, TLS_RSA_WITH_AES_256_GCM_SHA384, TLS_RSA_WITH_AES_128_CBC_SHA256, TLS_RSA_WITH_AES_256_CBC_SHA, TLS_RSA_WITH_AES_128_CBC_SHA, TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256, TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384, TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256, TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA, TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384, TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA

Vendor
Thales, Microsoft

Security level
EAL4+, EAL4, EAL 4
Claims
O.AUDIT_LOSS_RESPONSE, O.AUDIT_PROTECTION, O.CERTIFICATES, O.CONFIGURATION_MANAGEMENT, O.INTEGRITY_PROTECTION, O.NON_REPUDIATION, O.PROTECTED_COMMUNICATIONS, O.RECOVERY, O.RESIDUAL_INFORMATION_CLEARING, O.SYSTEM_MONITORING, O.TOE_ADMINISTRATION, O.TSF_SELF_TEST, O.VERIFIABLE_UPDATES, O.DISPLAY_BANNER, O.CONFIGURATION_MANAGEMEN, O.CONFIGURATION_MANAGEME, O.PROTECTED_COMMUNICATION, T.PRIVILEGED_USER_ERROR, T.UNAUTHENTICATED_TRANSACTIONS, T.UNAUTHORIZED_UPDATE, T.USER_DATA_REUSE, T.WEAK_CRYPTO, T.TSF_FAILURE, T.UNAUTHORIZED_ACCESS, T.UNDETECTED_ACTIONS, T.UNAUTHENTICATED_TRANSACTION, T.UNAUTHORIZED_ACCE, A.NO_GENERAL_PURPOSE, A.PHYSICAL, A.TRUSTED_ADMIN, OE.CERT_REPOSITORY, OE.AUDIT_RETENTION, OE.CRYPTOGRAPHY, OE.NO_GENERAL_PURPOSE, OE.PHYSICAL, OE.TOE_ADMINISTRATION, OE.TRUSTED_ADMIN, OE.TRUSTED_PLATFORM, OE.AUDIT_STORAGE, OE.SESSION_PROTECTION_LOCAL, OE.SESSION_PROTECTION_REMOTE, OE.SESSION_PROTECTION_REMOT, OE.SESSION_PROTECTION_REMO
Security Functional Requirements (SFR)
FAU_ADP_EXT.1, FAU_SAR.1, FAU_SAR.3, FAU_STG_EXT.1, FAU_GCR_EXT.1, FAU_GEN.1, FAU_GEN.2, FAU_STG.4, FAU_SCR_EXT.1, FAU_ADP_EXT, FAU_STG_EXT, FAU_GCR_EXT, FAU_SCR_EXT, FAU_ADP_EXT.1.1, FAU_SAR.1.1, FAU_SAR.1.2, FAU_SAR.3.1, FAU_STG_EXT.1.1, FAU_GCR_EXT.1.1, FAU_GEN.1.1, FAU_GEN.1.2, FAU_GEN.2.1, FAU_STG.4.1, FAU_SCR_EXT.1.1, FCO_NRO_EXT.2, FCO_NRR_EXT.2, FCO_NRO_EXT, FCO_NRR_EXT, FCO_NRO_EXT.2.1, FCO_NRO_EXT.2.2, FCO_NRO_EXT.2.3, FCO_NRO_EXT.2.4, FCO_NRO_EXT.2.5, FCO_NRR_EXT.2.1, FCS_CDP_EXT.1, FCS_CKM.1, FCS_CKM.2, FCS_CKM_EXT.1, FCS_CKM_EXT.4, FCS_CKM_EXT.5, FCS_CKM_EXT.7, FCS_CKM_EXT.8, FCS_COP.1, FCS_RBG_EXT.1, FCS_STG_EXT.1, FCS_TLSS_EXT.1, FCS_TLSS_EXT.2, FCS_TLSC_EXT.2, FCS_TLSS_EXT.2.4, FCS_CDP_EXT, FCS_CKM_EXT, FCS_RBG_EXT, FCS_STG_EXT, FCS_TLSC_EXT, FCS_TLSS_EXT, FCS_CDP_EXT.1.1, FCS_CKM.1.1, FCS_CKM.2.1, FCS_CKM_EXT.1.1, FCS_CKM_EXT.4.1, FCS_CKM_EXT.4.2, FCS_CKM_EXT.5.1, FCS_CKM_EXT.5.2, FCS_CKM_EXT.7.1, FCS_CKM_EXT.7.2, FCS_CKM_EXT.7.3, FCS_CKM_EXT.7.4, FCS_CKM_EXT.8.1, FCS_CKM_EXT.8.2, FCS_CKM_EXT.8.3, FCS_COP.1.1, FCS_RBG_EXT.1.1, FCS_RBG_EXT.1.2, FCS_STG_EXT.1.1, FCS_TLSS_EXT.1.1, FCS_TLSS_EXT.1.2, FCS_TLSS_EXT.1.3, FCS_TLSS_EXT.2.1, FCS_TLSS_EXT.2.2, FCS_TLSS_EXT.2.3, FCS_TLSS_EXT.2.5, FCS_TLSS_EXT.2.6, FCS_TLSC_EXT.2.1, FCS_TLSC_EXT.2.2, FCS_TLSC_EXT.2.3, FCS_TLSC_EXT.2.4, FCS_TLSC_EXT.2.5, FCS_CKM.4, FDP_CER_EXT.1, FDP_CER_EXT.2, FDP_CER_EXT.3, FDP_CSI_EXT.1, FDP_RIP.1, FDP_CRL_EXT.1, FDP_ITT.1, FDP_STG_EXT.1, FDP_CER_EXT, FDP_CSI_EXT, FDP_CRL_EXT, FDP_STG_EXT, FDP_CER_EXT.1.1, FDP_CER_EXT.1.2, FDP_CER_EXT.1.3, FDP_CER_EXT.2.1, FDP_CER_EXT.3.1, FDP_CSI_EXT.1.1, FDP_CSI_EXT.1.2, FDP_RIP.1.1, FDP_CRL_EXT.1.1, FDP_ITT.1.1, FIA_UAU_EXT.1, FIA_UIA_EXT.1, FIA_ESTS_EXT.1, FIA_UAU_EXT, FIA_UIA_EXT, FIA_ESTS_EXT, FIA_UAU_EXT.1.1, FIA_UIA_EXT.1.1, FIA_UIA_EXT.1.2, FIA_UIA_EXT.1.3, FIA_ESTS_EXT.1.1, FIA_ESTS_EXT.1.2, FIA_ESTS_EXT.1.3, FIA_ESTS_EXT.1.4, FIA_UID.1, FMT_MOF.1, FMT_MTD.1, FMT_SMF.1, FMT_SMR.2, FMT_MOF.1.1, FMT_MTD.1.1, FMT_SMF.1.1, FMT_SMR.2.1, FMT_SMR.2.2, FMT_SMR.2.3, FPT_FLS.1, FPT_KST_EXT.1, FPT_KST_EXT.2, FPT_RCV.1, FPT_SKP_EXT.1, FPT_STM.1, FPT_TUD_EXT.1, FPT_TST_EXT.2, FPT_ITT.1, FPT_KST_EXT, FPT_SKP_EXT, FPT_TUD_EXT, FPT_TST_EXT, FPT_FLS.1.1, FPT_KST_EXT.1.1, FPT_KST_EXT.2.1, FPT_RCV.1.1, FPT_SKP_EXT.1.1, FPT_STM.1.1, FPT_TUD_EXT.1.1, FPT_TUD_EXT.1.2, FPT_TUD_EXT.1.3, FPT_TUD_EXT.1.4, FPT_TST_EXT.2.1, FPT_TST_EXT.2.2, FPT_ITT.1.1, FTA_SSL.4, FTA_TAB.1, FTA_SSL.4.1, FTA_TAB.1.1, FTP_TRP.1, FTP_ITC.1, FTP_TRP.1.1, FTP_TRP.1.2, FTP_TRP.1.3, FTP_ITC.1.1, FTP_ITC.1.2

Standards
FIPS 140-2, FIPS 201-2, FIPS PUB 186-4, NIST SP 800-38A, NIST SP 800-38D, NIST SP 800-57, RFC 6960, RFC 5019, RFC 5280, RFC 8954, RFC 8017, RFC 2818, RFC 5246, RFC 4346, RFC 5288, RFC 3268, RFC 5289, RFC 4492, RFC 6125, RFC 8603, RFC 7030, ICAO, X.509, x.509
Technical reports
BSI TR-03110

File metadata

Author Mihály Pajerich
Creation date D:20230419164259+05'00'
Modification date D:20230419164259+05'00'
Pages 73
Creator Microsoft® Word 2019
Producer Microsoft® Word 2019

Heuristics

Automated inference - use with caution

All attributes shown in this section (e.g., links between certificates, products, vendors, and known CVEs) are generated by automated heuristics and have not been reviewed by humans. These methods can produce false positives or false negatives and should not be treated as definitive without independent verification. For details on our data sources and inference methods, see our methodology. If you believe any information here is inaccurate or harmful, please submit feedback.

Certificate ID

OCSI/CERT/CCL/07/2022/RC

Extracted SARs

ADV_ARC.1, ADV_FSP.4, ADV_IMP.1, ADV_TDS.3, AGD_OPE.1, AGD_PRE.1, ALC_CMC.4, ALC_CMS.4, ALC_DEL.1, ALC_DVS.1, ALC_FLR.3, ALC_LCD.1, ALC_TAT.1, ASE_CCL.1, ASE_ECD.1, ASE_INT.1, ASE_OBJ.2, ASE_REQ.2, ASE_SPD.1, ASE_TSS.1, ATE_COV.2, ATE_DPT.1, ATE_FUN.1, ATE_IND.2, AVA_VAN.3

References

No references are available for this certificate.

Updates Feed

  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate was first processed.

Raw data

{
  "_type": "sec_certs.sample.cc.CCCertificate",
  "category": "Key Management Systems",
  "cert_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/FP_cr_adss-pki-server-v8_v1.0_en.pdf",
  "dgst": "d16928d6b4a6cd39",
  "heuristics": {
    "_type": "sec_certs.sample.cc.CCCertificate.Heuristics",
    "annotated_references": null,
    "cert_id": "OCSI/CERT/CCL/07/2022/RC",
    "cert_lab": null,
    "cpe_matches": null,
    "direct_transitive_cves": null,
    "eal": "EAL4+",
    "extracted_sars": {
      "_type": "Set",
      "elements": [
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ALC_DEL",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ALC_FLR",
          "level": 3
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ADV_TDS",
          "level": 3
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ADV_ARC",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ALC_TAT",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ASE_ECD",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ATE_FUN",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ASE_INT",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ATE_DPT",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "AGD_OPE",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ALC_CMS",
          "level": 4
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ASE_REQ",
          "level": 2
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "AVA_VAN",
          "level": 3
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ASE_TSS",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ADV_FSP",
          "level": 4
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ALC_LCD",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ASE_OBJ",
          "level": 2
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ALC_DVS",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ALC_CMC",
          "level": 4
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ATE_COV",
          "level": 2
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ASE_CCL",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ATE_IND",
          "level": 2
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ADV_IMP",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "AGD_PRE",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ASE_SPD",
          "level": 1
        }
      ]
    },
    "extracted_versions": {
      "_type": "Set",
      "elements": [
        "-"
      ]
    },
    "indirect_transitive_cves": null,
    "next_certificates": null,
    "prev_certificates": null,
    "protection_profiles": null,
    "related_cves": null,
    "report_references": {
      "_type": "sec_certs.sample.certificate.References",
      "directly_referenced_by": null,
      "directly_referencing": null,
      "indirectly_referenced_by": null,
      "indirectly_referencing": null
    },
    "scheme_data": null,
    "st_references": {
      "_type": "sec_certs.sample.certificate.References",
      "directly_referenced_by": null,
      "directly_referencing": null,
      "indirectly_referenced_by": null,
      "indirectly_referencing": null
    },
    "verified_cpe_matches": null
  },
  "maintenance_updates": {
    "_type": "Set",
    "elements": [
      {
        "_type": "sec_certs.sample.cc.CCCertificate.MaintenanceReport",
        "maintenance_date": "2024-10-17",
        "maintenance_report_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/mr_adss-pki-server-v8_v.1.0_en.pdf",
        "maintenance_st_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/st_mnt_adss-pki-server-v8_v11.pdf",
        "maintenance_title": "OCSI/MNT/ASC/01/2024/RM - Note: addition of ALC_FLR.3"
      }
    ]
  },
  "manufacturer": "Ascertia Ltd.",
  "manufacturer_web": "https://www.ascertia.com/",
  "name": "ADSS PKI Server v8",
  "not_valid_after": "2028-04-17",
  "not_valid_before": "2023-04-17",
  "pdf_data": {
    "_type": "sec_certs.sample.cc.CCCertificate.PdfData",
    "cert_filename": "FP_cr_adss-pki-server-v8_v1.0_en.pdf",
    "cert_frontpage": null,
    "cert_keywords": {
      "asymmetric_crypto": {},
      "cc_cert_id": {},
      "cc_claims": {},
      "cc_protection_profile_id": {},
      "cc_sar": {},
      "cc_security_level": {
        "EAL": {
          "EAL2": 2,
          "EAL4": 1
        }
      },
      "cc_sfr": {},
      "certification_process": {},
      "cipher_mode": {},
      "cplc_data": {},
      "crypto_engine": {},
      "crypto_library": {},
      "crypto_protocol": {},
      "crypto_scheme": {},
      "device_model": {},
      "ecc_curve": {},
      "eval_facility": {},
      "hash_function": {},
      "ic_data_group": {},
      "javacard_api_const": {},
      "javacard_packages": {},
      "javacard_version": {},
      "os_name": {},
      "pq_crypto": {},
      "randomness": {},
      "side_channel_analysis": {},
      "standard_id": {
        "ISO": {
          "ISO/IEC 15408": 4
        }
      },
      "symmetric_crypto": {},
      "technical_report_id": {},
      "tee_name": {},
      "tls_cipher_suite": {},
      "vendor": {},
      "vulnerability": {}
    },
    "cert_metadata": {
      "/Author": "t.inzerilli",
      "/CreationDate": "D:20230419150931+02\u002700\u0027",
      "/ModDate": "D:20230419150931+02\u002700\u0027",
      "/Producer": "Microsoft: Print To PDF",
      "/Title": "Certification Report \"ADSS PKI Server v8\".pdf",
      "pdf_file_size_bytes": 132059,
      "pdf_hyperlinks": {
        "_type": "Set",
        "elements": []
      },
      "pdf_is_encrypted": false,
      "pdf_number_of_pages": 1
    },
    "report_filename": "cr_adss-pki-server-v8_v1.0_en.pdf",
    "report_frontpage": {},
    "report_keywords": {
      "asymmetric_crypto": {
        "ECC": {
          "ECC": {
            "ECC": 2
          }
        }
      },
      "cc_cert_id": {
        "IT": {
          "OCSI/CERT/CCL/07/2022/RC": 31
        }
      },
      "cc_claims": {
        "O": {
          "O.J": 1
        }
      },
      "cc_protection_profile_id": {},
      "cc_sar": {
        "ADV": {
          "ADV_ARC.1": 1,
          "ADV_FSP.4": 1,
          "ADV_IMP.1": 1,
          "ADV_TDS.3": 1
        },
        "AGD": {
          "AGD_OPE.1": 1,
          "AGD_PRE.1": 1
        },
        "ALC": {
          "ALC_CMC.4": 1,
          "ALC_CMS.4": 1,
          "ALC_DEL.1": 1,
          "ALC_DVS.1": 1,
          "ALC_FLR": 1,
          "ALC_LCD.1": 1,
          "ALC_TAT.1": 1
        },
        "ASE": {
          "ASE_CCL.1": 1,
          "ASE_ECD.1": 1,
          "ASE_INT.1": 1,
          "ASE_OBJ.2": 1,
          "ASE_REQ.2": 1,
          "ASE_SPD.1": 1,
          "ASE_TSS.1": 1
        },
        "ATE": {
          "ATE_COV.2": 1,
          "ATE_DPT.1": 1,
          "ATE_FUN.1": 1,
          "ATE_IND.2": 1
        },
        "AVA": {
          "AVA_VAN.3": 1
        }
      },
      "cc_security_level": {
        "EAL": {
          "EAL 4": 2,
          "EAL2": 4,
          "EAL4": 12
        }
      },
      "cc_sfr": {},
      "certification_process": {},
      "cipher_mode": {},
      "cplc_data": {},
      "crypto_engine": {},
      "crypto_library": {},
      "crypto_protocol": {
        "TLS": {
          "TLS": {
            "TLS": 17,
            "TLS v1.2": 4
          }
        },
        "VPN": {
          "VPN": 1
        }
      },
      "crypto_scheme": {},
      "device_model": {},
      "ecc_curve": {},
      "eval_facility": {
        "CCLab": {
          "CCLab Software Laboratory": 5
        }
      },
      "hash_function": {},
      "ic_data_group": {},
      "javacard_api_const": {},
      "javacard_packages": {},
      "javacard_version": {},
      "os_name": {},
      "pq_crypto": {},
      "randomness": {},
      "side_channel_analysis": {},
      "standard_id": {
        "CC": {
          "CCMB-2017-04-001": 1,
          "CCMB-2017-04-002": 1,
          "CCMB-2017-04-003": 1,
          "CCMB-2017-04-004": 1
        },
        "ISO": {
          "ISO/IEC 15408": 6,
          "ISO/IEC 18045:2008": 2
        },
        "X509": {
          "X.509": 4
        }
      },
      "symmetric_crypto": {
        "AES_competition": {
          "AES": {
            "AES": 5
          }
        },
        "constructions": {
          "MAC": {
            "HMAC": 8
          }
        }
      },
      "technical_report_id": {
        "BSI": {
          "BSI TR-03110-1": 1
        }
      },
      "tee_name": {},
      "tls_cipher_suite": {},
      "vendor": {
        "Microsoft": {
          "Microsoft": 1
        },
        "Thales": {
          "Thales": 1
        }
      },
      "vulnerability": {}
    },
    "report_metadata": {
      "/Author": "OCSI",
      "/CreationDate": "D:20230419124733+02\u002700\u0027",
      "/Creator": "Microsoft\u00ae Word per Microsoft 365",
      "/ModDate": "D:20230419124733+02\u002700\u0027",
      "/Producer": "Microsoft\u00ae Word per Microsoft 365",
      "/Title": "Certification Report \"ADSS PKI Server v8\"",
      "pdf_file_size_bytes": 645621,
      "pdf_hyperlinks": {
        "_type": "Set",
        "elements": []
      },
      "pdf_is_encrypted": false,
      "pdf_number_of_pages": 31
    },
    "st_filename": "st_adss-pki-server-v8_v9.pdf",
    "st_frontpage": null,
    "st_keywords": {
      "asymmetric_crypto": {
        "ECC": {
          "ECC": {
            "ECC": 3
          },
          "ECDSA": {
            "ECDSA": 10
          }
        },
        "FF": {
          "DH": {
            "DH": 1,
            "DHE": 1,
            "Diffie-Hellman": 6
          },
          "DSA": {
            "DSA": 1
          }
        }
      },
      "cc_cert_id": {},
      "cc_claims": {
        "A": {
          "A.NO_GENERAL_PURPOSE": 3,
          "A.PHYSICAL": 3,
          "A.TRUSTED_ADMIN": 2
        },
        "O": {
          "O.AUDIT_LOSS_RESPONSE": 3,
          "O.AUDIT_PROTECTION": 4,
          "O.CERTIFICATES": 3,
          "O.CONFIGURATION_MANAGEME": 1,
          "O.CONFIGURATION_MANAGEMEN": 1,
          "O.CONFIGURATION_MANAGEMENT": 2,
          "O.DISPLAY_BANNER": 2,
          "O.INTEGRITY_PROTECTION": 3,
          "O.NON_REPUDIATION": 3,
          "O.PROTECTED_COMMUNICATION": 1,
          "O.PROTECTED_COMMUNICATIONS": 3,
          "O.RECOVERY": 4,
          "O.RESIDUAL_INFORMATION_CLEARING": 3,
          "O.SYSTEM_MONITORING": 3,
          "O.TOE_ADMINISTRATION": 4,
          "O.TSF_SELF_TEST": 3,
          "O.VERIFIABLE_UPDATES": 4
        },
        "OE": {
          "OE.AUDIT_RETENTION": 3,
          "OE.AUDIT_STORAGE": 2,
          "OE.CERT_REPOSITORY": 3,
          "OE.CRYPTOGRAPHY": 4,
          "OE.NO_GENERAL_PURPOSE": 3,
          "OE.PHYSICAL": 3,
          "OE.SESSION_PROTECTION_LOCAL": 3,
          "OE.SESSION_PROTECTION_REMO": 1,
          "OE.SESSION_PROTECTION_REMOT": 1,
          "OE.SESSION_PROTECTION_REMOTE": 1,
          "OE.TOE_ADMINISTRATION": 5,
          "OE.TRUSTED_ADMIN": 3,
          "OE.TRUSTED_PLATFORM": 4
        },
        "T": {
          "T.PRIVILEGED_USER_ERROR": 3,
          "T.TSF_FAILURE": 2,
          "T.UNAUTHENTICATED_TRANSACTION": 1,
          "T.UNAUTHENTICATED_TRANSACTIONS": 2,
          "T.UNAUTHORIZED_ACCE": 1,
          "T.UNAUTHORIZED_ACCESS": 1,
          "T.UNAUTHORIZED_UPDATE": 3,
          "T.UNDETECTED_ACTIONS": 2,
          "T.USER_DATA_REUSE": 3,
          "T.WEAK_CRYPTO": 3
        }
      },
      "cc_protection_profile_id": {},
      "cc_sar": {},
      "cc_security_level": {
        "EAL": {
          "EAL 4": 2,
          "EAL4": 5,
          "EAL4+": 2
        }
      },
      "cc_sfr": {
        "FAU": {
          "FAU_ADP_EXT": 1,
          "FAU_ADP_EXT.1": 12,
          "FAU_ADP_EXT.1.1": 1,
          "FAU_GCR_EXT": 1,
          "FAU_GCR_EXT.1": 6,
          "FAU_GCR_EXT.1.1": 3,
          "FAU_GEN.1": 6,
          "FAU_GEN.1.1": 1,
          "FAU_GEN.1.2": 1,
          "FAU_GEN.2": 8,
          "FAU_GEN.2.1": 1,
          "FAU_SAR.1": 6,
          "FAU_SAR.1.1": 1,
          "FAU_SAR.1.2": 1,
          "FAU_SAR.3": 7,
          "FAU_SAR.3.1": 1,
          "FAU_SCR_EXT": 1,
          "FAU_SCR_EXT.1": 7,
          "FAU_SCR_EXT.1.1": 1,
          "FAU_STG.4": 8,
          "FAU_STG.4.1": 1,
          "FAU_STG_EXT": 1,
          "FAU_STG_EXT.1": 7,
          "FAU_STG_EXT.1.1": 1
        },
        "FCO": {
          "FCO_NRO_EXT": 1,
          "FCO_NRO_EXT.2": 7,
          "FCO_NRO_EXT.2.1": 1,
          "FCO_NRO_EXT.2.2": 1,
          "FCO_NRO_EXT.2.3": 1,
          "FCO_NRO_EXT.2.4": 1,
          "FCO_NRO_EXT.2.5": 1,
          "FCO_NRR_EXT": 1,
          "FCO_NRR_EXT.2": 5,
          "FCO_NRR_EXT.2.1": 1
        },
        "FCS": {
          "FCS_CDP_EXT": 1,
          "FCS_CDP_EXT.1": 20,
          "FCS_CDP_EXT.1.1": 2,
          "FCS_CKM.1": 12,
          "FCS_CKM.1.1": 1,
          "FCS_CKM.2": 9,
          "FCS_CKM.2.1": 1,
          "FCS_CKM.4": 1,
          "FCS_CKM_EXT": 5,
          "FCS_CKM_EXT.1": 19,
          "FCS_CKM_EXT.1.1": 3,
          "FCS_CKM_EXT.4": 10,
          "FCS_CKM_EXT.4.1": 1,
          "FCS_CKM_EXT.4.2": 1,
          "FCS_CKM_EXT.5": 9,
          "FCS_CKM_EXT.5.1": 1,
          "FCS_CKM_EXT.5.2": 1,
          "FCS_CKM_EXT.7": 9,
          "FCS_CKM_EXT.7.1": 1,
          "FCS_CKM_EXT.7.2": 1,
          "FCS_CKM_EXT.7.3": 1,
          "FCS_CKM_EXT.7.4": 1,
          "FCS_CKM_EXT.8": 10,
          "FCS_CKM_EXT.8.1": 1,
          "FCS_CKM_EXT.8.2": 1,
          "FCS_CKM_EXT.8.3": 1,
          "FCS_COP.1": 54,
          "FCS_COP.1.1": 4,
          "FCS_RBG_EXT": 1,
          "FCS_RBG_EXT.1": 19,
          "FCS_RBG_EXT.1.1": 2,
          "FCS_RBG_EXT.1.2": 2,
          "FCS_STG_EXT": 1,
          "FCS_STG_EXT.1": 9,
          "FCS_STG_EXT.1.1": 1,
          "FCS_TLSC_EXT": 1,
          "FCS_TLSC_EXT.2": 9,
          "FCS_TLSC_EXT.2.1": 1,
          "FCS_TLSC_EXT.2.2": 1,
          "FCS_TLSC_EXT.2.3": 1,
          "FCS_TLSC_EXT.2.4": 1,
          "FCS_TLSC_EXT.2.5": 1,
          "FCS_TLSS_EXT": 2,
          "FCS_TLSS_EXT.1": 10,
          "FCS_TLSS_EXT.1.1": 1,
          "FCS_TLSS_EXT.1.2": 1,
          "FCS_TLSS_EXT.1.3": 1,
          "FCS_TLSS_EXT.2": 8,
          "FCS_TLSS_EXT.2.1": 1,
          "FCS_TLSS_EXT.2.2": 1,
          "FCS_TLSS_EXT.2.3": 1,
          "FCS_TLSS_EXT.2.4": 2,
          "FCS_TLSS_EXT.2.5": 1,
          "FCS_TLSS_EXT.2.6": 1
        },
        "FDP": {
          "FDP_CER_EXT": 3,
          "FDP_CER_EXT.1": 9,
          "FDP_CER_EXT.1.1": 1,
          "FDP_CER_EXT.1.2": 1,
          "FDP_CER_EXT.1.3": 1,
          "FDP_CER_EXT.2": 6,
          "FDP_CER_EXT.2.1": 1,
          "FDP_CER_EXT.3": 7,
          "FDP_CER_EXT.3.1": 1,
          "FDP_CRL_EXT": 1,
          "FDP_CRL_EXT.1": 8,
          "FDP_CRL_EXT.1.1": 1,
          "FDP_CSI_EXT": 1,
          "FDP_CSI_EXT.1": 7,
          "FDP_CSI_EXT.1.1": 1,
          "FDP_CSI_EXT.1.2": 1,
          "FDP_ITT.1": 10,
          "FDP_ITT.1.1": 2,
          "FDP_RIP.1": 7,
          "FDP_RIP.1.1": 1,
          "FDP_STG_EXT": 1,
          "FDP_STG_EXT.1": 7
        },
        "FIA": {
          "FIA_ESTS_EXT": 1,
          "FIA_ESTS_EXT.1": 13,
          "FIA_ESTS_EXT.1.1": 1,
          "FIA_ESTS_EXT.1.2": 1,
          "FIA_ESTS_EXT.1.3": 1,
          "FIA_ESTS_EXT.1.4": 1,
          "FIA_UAU_EXT": 1,
          "FIA_UAU_EXT.1": 8,
          "FIA_UAU_EXT.1.1": 1,
          "FIA_UIA_EXT": 1,
          "FIA_UIA_EXT.1": 10,
          "FIA_UIA_EXT.1.1": 1,
          "FIA_UIA_EXT.1.2": 1,
          "FIA_UIA_EXT.1.3": 1,
          "FIA_UID.1": 1
        },
        "FMT": {
          "FMT_MOF.1": 48,
          "FMT_MOF.1.1": 5,
          "FMT_MTD.1": 10,
          "FMT_MTD.1.1": 1,
          "FMT_SMF.1": 7,
          "FMT_SMF.1.1": 1,
          "FMT_SMR.2": 10,
          "FMT_SMR.2.1": 3,
          "FMT_SMR.2.2": 1,
          "FMT_SMR.2.3": 1
        },
        "FPT": {
          "FPT_FLS.1": 7,
          "FPT_FLS.1.1": 1,
          "FPT_ITT.1": 9,
          "FPT_ITT.1.1": 2,
          "FPT_KST_EXT": 2,
          "FPT_KST_EXT.1": 7,
          "FPT_KST_EXT.1.1": 1,
          "FPT_KST_EXT.2": 8,
          "FPT_KST_EXT.2.1": 1,
          "FPT_RCV.1": 7,
          "FPT_RCV.1.1": 1,
          "FPT_SKP_EXT": 1,
          "FPT_SKP_EXT.1": 8,
          "FPT_SKP_EXT.1.1": 1,
          "FPT_STM.1": 6,
          "FPT_STM.1.1": 1,
          "FPT_TST_EXT": 1,
          "FPT_TST_EXT.2": 9,
          "FPT_TST_EXT.2.1": 1,
          "FPT_TST_EXT.2.2": 1,
          "FPT_TUD_EXT": 1,
          "FPT_TUD_EXT.1": 8,
          "FPT_TUD_EXT.1.1": 1,
          "FPT_TUD_EXT.1.2": 1,
          "FPT_TUD_EXT.1.3": 1,
          "FPT_TUD_EXT.1.4": 1
        },
        "FTA": {
          "FTA_SSL.4": 8,
          "FTA_SSL.4.1": 1,
          "FTA_TAB.1": 6,
          "FTA_TAB.1.1": 2
        },
        "FTP": {
          "FTP_ITC.1": 8,
          "FTP_ITC.1.1": 1,
          "FTP_ITC.1.2": 1,
          "FTP_TRP.1": 8,
          "FTP_TRP.1.1": 1,
          "FTP_TRP.1.2": 1,
          "FTP_TRP.1.3": 1
        }
      },
      "certification_process": {},
      "cipher_mode": {
        "CBC": {
          "CBC": 1
        },
        "CCM": {
          "CCM": 2
        },
        "GCM": {
          "GCM": 1
        }
      },
      "cplc_data": {},
      "crypto_engine": {},
      "crypto_library": {},
      "crypto_protocol": {
        "IKE": {
          "IKE": 1
        },
        "IPsec": {
          "IPsec": 3
        },
        "PGP": {
          "PGP": 1
        },
        "SSH": {
          "SSH": 1
        },
        "TLS": {
          "SSL": {
            "SSL": 2,
            "SSL 2.0": 2,
            "SSL 3.0": 3,
            "SSL2.0": 1
          },
          "TLS": {
            "TLS": 66,
            "TLS 1.0": 2,
            "TLS 1.1": 3,
            "TLS 1.2": 4,
            "TLS v1.2": 5,
            "TLS1.0": 1
          }
        },
        "VPN": {
          "VPN": 2
        }
      },
      "crypto_scheme": {
        "KEX": {
          "Key Exchange": 1
        },
        "MAC": {
          "MAC": 1
        }
      },
      "device_model": {},
      "ecc_curve": {
        "NIST": {
          "P-256": 4,
          "P-384": 4,
          "P-521": 4,
          "secp256r1": 5,
          "secp384r1": 5,
          "secp521r1": 5
        }
      },
      "eval_facility": {},
      "hash_function": {
        "SHA": {
          "SHA1": {
            "SHA-1": 3,
            "SHA1": 1
          },
          "SHA2": {
            "SHA-2": 1,
            "SHA-256": 4,
            "SHA-384": 4,
            "SHA-512": 5,
            "SHA256": 1
          },
          "SHA3": {
            "SHA-3": 1,
            "SHA3-256": 1,
            "SHA3-384": 1,
            "SHA3-512": 1
          }
        }
      },
      "ic_data_group": {},
      "javacard_api_const": {},
      "javacard_packages": {
        "java": {
          "java.security": 1
        }
      },
      "javacard_version": {},
      "os_name": {},
      "pq_crypto": {},
      "randomness": {
        "PRNG": {
          "DRBG": 1
        },
        "RNG": {
          "RBG": 8
        }
      },
      "side_channel_analysis": {},
      "standard_id": {
        "FIPS": {
          "FIPS 140-2": 2,
          "FIPS 201-2": 1,
          "FIPS PUB 186-4": 4
        },
        "ICAO": {
          "ICAO": 1
        },
        "NIST": {
          "NIST SP 800-38A": 1,
          "NIST SP 800-38D": 1,
          "NIST SP 800-57": 2
        },
        "RFC": {
          "RFC 2818": 1,
          "RFC 3268": 6,
          "RFC 4346": 3,
          "RFC 4492": 4,
          "RFC 5019": 1,
          "RFC 5246": 6,
          "RFC 5280": 8,
          "RFC 5288": 6,
          "RFC 5289": 11,
          "RFC 6125": 1,
          "RFC 6960": 7,
          "RFC 7030": 4,
          "RFC 8017": 1,
          "RFC 8603": 1,
          "RFC 8954": 2
        },
        "X509": {
          "X.509": 13,
          "x.509": 1
        }
      },
      "symmetric_crypto": {
        "AES_competition": {
          "AES": {
            "AES": 16
          }
        },
        "DES": {
          "DES": {
            "DES": 1
          }
        },
        "constructions": {
          "MAC": {
            "HMAC": 23,
            "HMAC-SHA-256": 1
          }
        }
      },
      "technical_report_id": {
        "BSI": {
          "BSI TR-03110": 1
        }
      },
      "tee_name": {},
      "tls_cipher_suite": {
        "TLS": {
          "TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA": 3,
          "TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256": 3,
          "TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA": 1,
          "TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384": 2,
          "TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384": 3,
          "TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256": 3,
          "TLS_RSA_WITH_AES_128_CBC_SHA": 3,
          "TLS_RSA_WITH_AES_128_CBC_SHA256": 3,
          "TLS_RSA_WITH_AES_128_GCM_SHA256": 3,
          "TLS_RSA_WITH_AES_256_CBC_SHA": 3,
          "TLS_RSA_WITH_AES_256_GCM_SHA384": 3
        }
      },
      "vendor": {
        "Microsoft": {
          "Microsoft": 2
        },
        "Thales": {
          "Thales": 2
        }
      },
      "vulnerability": {}
    },
    "st_metadata": {
      "/Author": "Mih\u00e1ly Pajerich",
      "/CreationDate": "D:20230419164259+05\u002700\u0027",
      "/Creator": "Microsoft\u00ae Word 2019",
      "/ModDate": "D:20230419164259+05\u002700\u0027",
      "/Producer": "Microsoft\u00ae Word 2019",
      "pdf_file_size_bytes": 1112908,
      "pdf_hyperlinks": {
        "_type": "Set",
        "elements": [
          "https://www.niap-ccevs.org/Documents_and_Guidance/view_td.cfm?TD=0328",
          "https://www.niap-ccevs.org/Documents_and_Guidance/view_td.cfm?TD=0599",
          "https://www.niap-ccevs.org/Documents_and_Guidance/view_td.cfm?TD=0294",
          "https://www.niap-ccevs.org/Documents_and_Guidance/view_td.cfm?TD=0286",
          "https://www.niap-ccevs.org/Documents_and_Guidance/view_td.cfm?TD=0278",
          "https://www.niap-ccevs.org/Documents_and_Guidance/view_td.cfm?TD=0353",
          "https://www.niap-ccevs.org/Documents_and_Guidance/view_td.cfm?TD=0415",
          "https://www.niap-ccevs.org/Documents_and_Guidance/view_td.cfm?TD=0522",
          "https://www.niap-ccevs.org/Documents_and_Guidance/view_td.cfm?TD=0348",
          "https://www.niap-ccevs.org/Documents_and_Guidance/view_td.cfm?TD=0500",
          "https://www.niap-ccevs.org/Documents_and_Guidance/view_td.cfm?TD=0276",
          "https://www.niap-ccevs.org/Documents_and_Guidance/view_td.cfm?TD=0287",
          "https://www.niap-ccevs.org/Documents_and_Guidance/view_td.cfm?TD=0375"
        ]
      },
      "pdf_is_encrypted": false,
      "pdf_number_of_pages": 73
    }
  },
  "protection_profile_links": {
    "_type": "Set",
    "elements": []
  },
  "report_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/cr_adss-pki-server-v8_v1.0_en.pdf",
  "scheme": "IT",
  "security_level": {
    "_type": "Set",
    "elements": [
      "ALC_FLR.3",
      "EAL4+"
    ]
  },
  "st_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/st_adss-pki-server-v8_v9.pdf",
  "state": {
    "_type": "sec_certs.sample.cc.CCCertificate.InternalState",
    "cert": {
      "_type": "sec_certs.sample.document_state.DocumentState",
      "convert_ok": true,
      "download_ok": true,
      "extract_ok": true,
      "json_hash": null,
      "pdf_hash": "d074b28f364c64af24a3d4cc887663462dd450862150d6d34ba9d0e69625a456",
      "txt_hash": "2d55398b633ad4becca0c9a4b8417feaab105924ce722eb3c798136833f5874c"
    },
    "report": {
      "_type": "sec_certs.sample.document_state.DocumentState",
      "convert_ok": true,
      "download_ok": true,
      "extract_ok": true,
      "json_hash": null,
      "pdf_hash": "2a47f9ec9f828ffdeed314d61c1a474ab071a08c9252e883b558671d034f8c38",
      "txt_hash": "c730a8161b0348927e20dd9fc6759477296181613305a3f19395b10380a3e560"
    },
    "st": {
      "_type": "sec_certs.sample.document_state.DocumentState",
      "convert_ok": true,
      "download_ok": true,
      "extract_ok": true,
      "json_hash": null,
      "pdf_hash": "03a8fca508e1fdc36debacea63b0ac206632fe0df129ba43c6ac0b02fe773150",
      "txt_hash": "fea04851627138904ae15e29ebdc3fbad43574471db64edfe0c8086750a345d9"
    }
  },
  "status": "active"
}