Page 59 of
91
Copyright (c) 2012 RICOH COMPANY, LTD. All rights reserved.
FIA_UID.2.1
The TSF shall require each user to be successfully identified (refinement: identification of a
person who intends to use the TOE from RC Gate communication interface) before allowing
other TSF-mediated actions on behalf of that user.
FIA_USB.1
User-subject binding
Hierarchical to:
No other components.
Dependencies:
FIA_ATD.1 User attribute definition
FIA_USB.1.1
The TSF shall associate the following user security attributes with subjects acting on the behalf
of that user:
[assignment: login user name of normal user, login user name of MFP
administrator, available function list, and user role]
.
FIA_USB.1.2
The TSF shall enforce the following rules on the initial association of user security attributes
with subjects acting on the behalf of users:
[assignment: rules for the initial association of
attributes listed in Table 24]
.
Table 24 : Rules for Initial Association of Attributes
Users
Subjects
User Security Attributes
Normal user
Normal user process
- Login user name of normal user
- User role
- Available function list
Supervisor
Supervisor process
- User role
MFP administrator
MFP administrator process
- Login user name of MFP administrator
- User role
RC Gate
RC Gate process
- User role
FIA_USB.1.3
The TSF shall enforce the following rules governing changes to the user security attributes
associated with subjects acting on the behalf of users:
[assignment: none]
.
6.1.5
Class FMT: Security management
FMT_MSA.1(a) Management of security attributes
Hierarchical to:
No other components.
Dependencies:
[FDP_ACC.1 Subset access control, or
FDP_IFC.1 Subset information flow control]
FMT_SMR.1 Security roles
FMT_SMF.1 Specification of Management Function
FMT_MSA.1.1(a) The TSF shall enforce the
[assignment: document access control SFP]
to restrict the ability to
[selection: query, modify, delete, [assignment: newly create]]
the security attributes
[assignment: security attributes in Table 25]
to
[assignment: the user roles with operation
permission in Table 25]
.