Comparing certificates Experimental feature

You are comparing two certificates. By default, only differing attributes are shown. Use the button below to show/hide all attributes.

Showing only differing attributes.
RapidIdentity FIPS Cryptographic Module
RapidIdentity FIPS Cryptographic Module
cert_id 3655 4669
dgst a2c2bc574f117170 f27e859202343372
heuristics/algorithms AES#C1581, AES#C1580, SHS#C1581, SHA-3#C1581, SHS#C1580, DSA#C1580, RSA#C1581, DRBG#C1580, Triple-DES#C1580, HMAC#C1581, CVL#C1580, Triple-DES#C1581, KAS#C1580, DRBG#C1581, RSA#C1580, KAS#C1581, DSA#C1581, CVL#C1581, HMAC#C1580, SHA-3#C1580 CVL#A2698, KAS#A2698, KAS-SSC#A2698, KTS-RSA#A2698, Triple- DES#A2698, SHA-3#A2698, RSA#A2698, KDA#A2698, SHS#A2698, AES#A2698, HMAC#A2698, KTS#A2698, PBKDF#A2698, KMAC#A2698, ECDSA#A2698, DRBG#A2698, DSA#A2698
heuristics/module_processed_references/directly_referencing 2792 {}
heuristics/module_processed_references/indirectly_referencing 2792 {}
heuristics/module_prunned_references 2792 {}
pdf_data/keywords/fips_certlike
  • Certlike:
    • Cert # AES: 1
    • Cert # RSA: 1
    • DSA3: 1
    • HMAC SHA-512/224: 2
    • HMAC-SHA512: 2
    • PKCS #1: 2
    • PKCS#1: 2
    • PKCS#12: 2
    • PKCS#5: 2
    • PKCS1: 2
    • RSA13: 1
    • SHA-1: 8
    • SHA-2: 2
    • SHA-224: 5
    • SHA-256: 5
    • SHA-3: 3
    • SHA-384: 5
    • SHA-512: 5
    • SHA3-224: 2
    • SHA3-256: 2
    • SHA3-384: 2
    • SHA3-512: 2
  • Certlike:
    • Cert # AES: 1
    • DSA3: 1
    • Diffie-Hellman (224: 1
    • HMAC SHA- 256: 1
    • HMAC SHA- 512/256: 1
    • HMAC SHA-1: 2
    • HMAC SHA-224: 2
    • HMAC SHA-256: 1
    • HMAC SHA-384: 2
    • HMAC SHA-512: 2
    • HMAC SHA-512/224: 2
    • HMAC SHA-512/256: 1
    • HMAC-SHA-256: 6
    • HMAC-SHA512: 2
    • PKCS #1: 2
    • PKCS#1: 2
    • PKCS#12: 2
    • PKCS#5: 2
    • PKCS1: 2
    • RSA13: 1
    • SHA- 224: 1
    • SHA- 256: 2
    • SHA- 512: 1
    • SHA-1: 12
    • SHA-2: 2
    • SHA-224: 7
    • SHA-256: 8
    • SHA-3: 4
    • SHA-384: 8
    • SHA-512: 7
    • SHA3- 224: 1
    • SHA3- 512: 2
    • SHA3-224: 7
    • SHA3-256: 8
    • SHA3-384: 8
    • SHA3-512: 6
pdf_data/keywords/symmetric_crypto
  • AES_competition:
    • AES:
      • AES: 22
    • RC:
      • RC4: 1
    • Serpent:
      • Serpent: 1
  • DES:
    • 3DES:
      • TDEA: 6
      • TDES: 1
      • Triple-DES: 16
    • DES:
      • DES: 6
  • constructions:
    • MAC:
      • CBC-MAC: 1
      • CMAC: 6
      • HMAC: 11
  • djb:
    • ChaCha:
      • ChaCha: 1
    • Poly:
      • Poly1305: 1
  • miscellaneous:
    • Camellia:
      • Camellia: 1
    • SEED:
      • SEED: 1
  • AES_competition:
    • AES:
      • AES: 34
    • RC:
      • RC4: 1
    • Serpent:
      • Serpent: 1
  • DES:
    • 3DES:
      • TDEA: 6
      • TDES: 1
      • Triple-DES: 27
    • DES:
      • DES: 5
  • constructions:
    • MAC:
      • CBC-MAC: 1
      • CMAC: 5
      • HMAC: 34
      • HMAC-SHA-256: 3
  • djb:
    • ChaCha:
      • ChaCha: 1
    • Poly:
      • Poly1305: 1
  • miscellaneous:
    • Camellia:
      • Camellia: 1
    • SEED:
      • SEED: 1
pdf_data/keywords/asymmetric_crypto
  • ECC:
    • ECC:
      • ECC: 2
    • ECDSA:
      • ECDSA: 9
  • FF:
    • DH:
      • Diffie-Hellman: 5
    • DSA:
      • DSA: 12
  • ECC:
    • ECC:
      • ECC: 3
    • ECDSA:
      • ECDSA: 8
    • EdDSA:
      • EdDSA: 1
  • FF:
    • DH:
      • DH: 7
      • Diffie-Hellman: 4
    • DSA:
      • DSA: 13
pdf_data/keywords/hash_function
  • MD:
    • MD5:
      • MD5: 5
  • PBKDF:
    • PBKDF: 10
  • RIPEMD:
    • RIPEMD: 1
  • SHA:
    • SHA1:
      • SHA-1: 8
    • SHA2:
      • SHA-2: 2
      • SHA-224: 5
      • SHA-256: 5
      • SHA-384: 5
      • SHA-512: 5
    • SHA3:
      • SHA-3: 3
      • SHA3-224: 2
      • SHA3-256: 2
      • SHA3-384: 2
      • SHA3-512: 2
  • SHAKE:
    • SHAKE128: 1
    • SHAKE256: 2
  • MD:
    • MD5:
      • MD5: 5
  • PBKDF:
    • PBKDF: 15
  • RIPEMD:
    • RIPEMD: 1
  • SHA:
    • SHA1:
      • SHA-1: 12
    • SHA2:
      • SHA-2: 2
      • SHA-224: 7
      • SHA-256: 8
      • SHA-384: 8
      • SHA-512: 7
    • SHA3:
      • SHA-3: 4
      • SHA3-224: 7
      • SHA3-256: 8
      • SHA3-384: 8
      • SHA3-512: 6
  • SHAKE:
    • SHAKE128: 1
    • SHAKE256: 2
pdf_data/keywords/crypto_scheme
  • KA:
    • Key Agreement: 3
    • Key agreement: 1
  • MAC:
    • MAC: 4
  • KA:
    • Key Agreement: 3
  • MAC:
    • MAC: 4
pdf_data/keywords/crypto_protocol
  • TLS:
    • TLS:
      • TLS: 8
      • TLS 1.0: 1
      • TLS 1.2: 1
  • TLS:
    • TLS:
      • TLS: 15
      • TLS 1.0: 3
      • TLS 1.2: 3
pdf_data/keywords/randomness
  • PRNG:
    • DRBG: 23
  • RNG:
    • RNG: 2
  • PRNG:
    • DRBG: 32
  • RNG:
    • RNG: 2
pdf_data/keywords/cipher_mode
  • CBC:
    • CBC: 3
  • CCM:
    • CCM: 4
  • CFB:
    • CFB: 1
  • CTR:
    • CTR: 6
  • ECB:
    • ECB: 3
  • GCM:
    • GCM: 9
  • OFB:
    • OFB: 2
  • CBC:
    • CBC: 3
  • CCM:
    • CCM: 4
  • CFB:
    • CFB: 1
  • CTR:
    • CTR: 10
  • ECB:
    • ECB: 3
  • GCM:
    • GCM: 7
  • OFB:
    • OFB: 2
pdf_data/keywords/ecc_curve
  • NIST:
    • B-283: 1
    • B-409: 1
    • B-571: 1
    • K-233: 1
    • K-283: 1
    • K-409: 1
    • K-571: 1
    • P-224: 2
    • P-256: 6
    • P-384: 2
  • NIST:
    • B-233: 5
    • B-283: 4
    • B-409: 2
    • B-571: 4
    • K-233: 4
    • K-283: 3
    • K-409: 4
    • K-571: 4
    • P-224: 8
    • P-256: 12
    • P-384: 8
    • P-521: 2
pdf_data/keywords/standard_id
  • FIPS:
    • FIPS 140-2: 14
    • FIPS 180-4: 2
    • FIPS 186-2: 1
    • FIPS 186-3: 1
    • FIPS 186-4: 10
    • FIPS 197: 2
    • FIPS 198-1: 3
    • FIPS 202: 2
    • FIPS PUB 140-2: 1
  • NIST:
    • NIST SP 800-38D: 1
    • SP 800-132: 5
    • SP 800-135: 4
    • SP 800-38A: 3
    • SP 800-38B: 2
    • SP 800-38C: 2
    • SP 800-38D: 5
    • SP 800-38F: 5
    • SP 800-56A: 5
    • SP 800-56B: 6
    • SP 800-56C: 3
    • SP 800-67: 5
    • SP 800-89: 1
    • SP 800-90A: 3
  • PKCS:
    • PKCS #1: 1
    • PKCS#1: 1
    • PKCS#12: 1
    • PKCS#5: 1
    • PKCS1: 1
  • FIPS:
    • FIPS 140-2: 16
    • FIPS 180-4: 2
    • FIPS 186-2: 1
    • FIPS 186-3: 1
    • FIPS 186-4: 10
    • FIPS 197: 2
    • FIPS 198-1: 3
    • FIPS 202: 2
    • FIPS PUB 140-2: 1
  • NIST:
    • NIST SP 800-38D: 1
    • SP 800-132: 5
    • SP 800-133: 1
    • SP 800-135: 5
    • SP 800-185: 1
    • SP 800-38A: 5
    • SP 800-38B: 2
    • SP 800-38C: 4
    • SP 800-38D: 5
    • SP 800-38F: 5
    • SP 800-38G: 4
    • SP 800-52: 1
    • SP 800-56A: 3
    • SP 800-56C: 7
    • SP 800-67: 5
    • SP 800-89: 1
    • SP 800-90A: 3
  • PKCS:
    • PKCS #1: 1
    • PKCS#1: 1
    • PKCS#12: 1
    • PKCS#5: 1
    • PKCS1: 1
  • RFC:
    • RFC 5288: 1
pdf_data/policy_metadata
  • /Author: webex
  • /CreationDate: D:20200706202444-07'00'
  • /Creator: Microsoft® Word for Microsoft 365
  • /ModDate: D:20200706202444-07'00'
  • /Producer: Microsoft® Word for Microsoft 365
  • /Subject: FIPS 140-2 Security Policy Template
  • pdf_file_size_bytes: 772702
  • pdf_hyperlinks: {}
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 26
  • /AppVersion: 14.0000
  • /Author: webex
  • /Company:
  • /CreationDate: D:20240411145850-07'00'
  • /Creator: Acrobat PDFMaker 24 for Word
  • /DocSecurity: 0.000000
  • /HyperlinksChanged: 0
  • /LinksUpToDate: 0
  • /ModDate: D:20240411145931-07'00'
  • /Producer: Adobe PDF Library 24.1.149
  • /ScaleCrop: 0
  • /ShareDoc: 0
  • /SourceModified: D:20240411215324
  • /Subject: FIPS 140-2 Security Policy Template
  • pdf_file_size_bytes: 819228
  • pdf_hyperlinks: https://csrc.nist.gov/projects/cryptographic-algorithm-validation-program/details?validation=35309
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 30
state/policy_pdf_hash Different Different
state/policy_txt_hash Different Different
web_data/caveat When installed, initialized and configured as specified in the Security Policy Section 8 and operated in FIPS mode. The module generates cryptographic keys whose strengths are modified by available entropy. No assurance of the minimum strength of generated keys. This validation entry is a non-security relevant modification to Cert. #2792. When operated in FIPS mode. No assurance of the minimum strength of generated keys.
web_data/certificate_pdf_url https://csrc.nist.gov/CSRC/media/projects/cryptographic-module-validation-program/documents/certificates/May 2020_010620_1115.pdf https://csrc.nist.gov/CSRC/media/projects/cryptographic-module-validation-program/documents/certificates/December 2023_020124_0656.pdf
web_data/date_sunset 21.09.2026
web_data/description The RapidIdentity FIPS Cryptographic Module for Windows is a cryptographic engine for Windows Server. The module delivers core cryptographic functions to Identity Automation’s RapidIdentity MFA server, providing a multitude of authentication methods. The RapidIdentity FIPS Cryptographic Module leverages industry leading, FIPS approved cryptographic algorithms provided by the Bouncy Castle FIPS .NET and Java APIs. The RapidIdentity FIPS Cryptographic Module is a cryptographic engine for Windows, iOS, and Android. The module delivers core cryptographic functions to Identity Automation’s RapidIdentity MFA Server and MFA Mobile app which provide a variety of authentication methods. The RapidIdentity FIPS Cryptographic Module leverages industry leading, FIPS approved cryptographic algorithms provided by the Bouncy Castle FIPS .NET APIs.
web_data/historical_reason Moved to historical list due to sunsetting
web_data/mentioned_certs
  • 2792: 1
web_data/status historical active
web_data/sw_versions 1.0 2.0
web_data/tested_conf Android 10 on .NET framework 4.5.2 running on a Google Pixel 3 with Qualcomm Snapdragon 845 Chipset, iOS 13 on Xamarin.iOS 13 running on an iPhone 11 with the Apple A13 Bionic processor, Windows Server 2016 Standard on Vmware ESXi 6.5 on .NET framework 4.5.2 running on a Dell PowerEdge T630 with Intel Xeon E5-2630 (single user mode) Android 11 with Xamarin.Android 11.1.0.26 running on Realme RMX3461 with Qualcomm Snapdragon 778G SM7325, iOS 15.5 with Xamarin.iOS 15.2.0.17 running on Apple iPhone 7 with Apple A10 Fusion, Windows Server 2016 with .NET Framework 4.6 running on Dell Latitude 3410 with Intel(R) Core(TM) i5-10210U (single-user mode)
web_data/validation_history
  • date: 20.05.2020
  • lab: ACUMEN SECURITY, LLC
  • validation_type: Initial

  • date: 13.07.2020
  • lab: ACUMEN SECURITY, LLC
  • validation_type: Update
  • date: 08.12.2023
  • lab: ACUMEN SECURITY, LLC
  • validation_type: Initial

  • date: 24.04.2024
  • lab: ACUMEN SECURITY, LLC
  • validation_type: Update
web_data/vendor_url https://www.identityautomation.com/ http://www.identityautomation.com