
Security Requirements for the IT Environment
Appendix A
Common Criteria Environment: Security Requirements
683
FIA_UAU.1.2
The IT environment shall require each user to be successfully
authenticated before allowing any other IT environment-mediated actions on behalf of that
user.
FIA_UID.1 Timing of identification (iteration 1)
FIA_UID.1.1
The IT environment shall allow [
HTTP and LDAP based services
] on
behalf of the user to be performed before the user is identified.
FIA_UID.1.2
The IT environment shall require each user to be successfully identified
before allowing any other IT environment-mediated actions on behalf of that user.
FIA_USB.1 User-subject binding (iteration 1)
FIA_USB.1.1
The IT environment shall associate the appropriate user security attributes
with subjects acting on behalf of that user.
Security management (FMT)
FMT_MOF.1 Management of security functions behavior (iteration 1)
FMT_MOF.1.1
The IT environment shall restrict the ability to modify the behavior of the
functions listed in Table 4 to the authorized roles as specified in Table A-4.
FMT_MSA.1 Management of security attributes
Table A-4
Authorized Roles for Management of Security Functions Behavior
Section/Function
Function/Authorized Role
Security Audit
The capability to configure the audit parameters shall be restricted to
Administrators.
Identification and Authentication
The capability to specify or change
maximum authentication attempts
shall be
restricted to Administrators.
The capability to change authentication mechanisms shall be restricted to
Administrators.
Account Administration
The capability to create user accounts and roles shall be restricted to
Administrators.
The capability to assign privileges to those accounts and roles shall be restricted to
Administrators.
Summary of Contents for CERTIFICATE 7.1 ADMINISTRATOR
Page 1: ...Administrator s Guide Red Hat Certificate System Version7 1 September 2005 ...
Page 22: ...22 Red Hat Certificate System Administrator s Guide September 2005 ...
Page 128: ...Cloning a CA 128 Red Hat Certificate System Administrator s Guide September 2005 ...
Page 368: ...ACL Reference 368 Red Hat Certificate System Administrator s Guide September 2005 ...
Page 460: ...Constraints Reference 460 Red Hat Certificate System Administrator s Guide September 2005 ...
Page 592: ...CRL Extension Reference 592 Red Hat Certificate System Administrator s Guide September 2005 ...