Xerox Multi-Function Device Security Target
49
Copyright
2013 Xerox Corporation. All rights reserved.
6.3.5.2. FIA_UAU.1 Timing of authentication
Hierarchical to:
No other components
Dependencies:
FIA_UID.1 Timing of identification
FIA_UAU.1.1
The TSF shall allow [job requests to be received via
printing protocols] on behalf of the user to be performed
before the user is authenticated.
FIA_UAU.1.2
The TSF shall require each user to be successfully
authenticated before allowing any other TSF-mediated
actions on behalf of that user.
6.3.5.3. FIA_UAU.7 Protected authentication feedback
Hierarchical to:
No other components
Dependencies:
FIA_UAU.1 Timing of Authentication
FIA_UAU.7.1
The TSF shall provide only [obscured feedback] to the
user while the authentication is in progress.
6.3.5.4. FIA_UID.1
Timing of identification
Hierarchical to:
No other components
Dependencies:
No dependencies
FIA_UID.1.1
The TSF shall allow [job requests to be received via
printing protocols] on behalf of the user to be performed
before the user is identified.
FIA_UID.1.2
The TSF shall require each user to be successfully
identified before allowing any other TSF-mediated actions
on behalf of that user.
6.3.5.5. FIA_USB.1 User-subject binding
Hierarchical to:
No other components.
Dependencies:
FIA_ATD.1 User attribute definition
FIA_USB.1.1
The TSF shall associate the following user security
attributes with subjects acting on the behalf of that user:
[username and role].
FIA_USB.1.2
The TSF shall enforce the following rules on the initial
association of user security attributes with the subjects
acting on behalf of users: [subjects will be assigned the
security attributes of the user that they are acting on
behalf of].
FIA_USB.1.3
The TSF shall enforce the following rules governing
changes to the user security attributes with the subjects