Security Target
Page 17
..., and the Web Copyright (c) 2010 RICOH COMPANY, LTD. All Rights Reserved. General users can store document data in the TOE and perform operations on the document data. 1.4.3.5 Customer Engineer A customer engineer (hereafter "CE") is an expert in maintenance of the TOE and is registered in the Address Book by a user administrator. Page 17...
..., and the Web Copyright (c) 2010 RICOH COMPANY, LTD. All Rights Reserved. General users can store document data in the TOE and perform operations on the document data. 1.4.3.5 Customer Engineer A customer engineer (hereafter "CE") is an expert in maintenance of the TOE and is registered in the Address Book by a user administrator. Page 17...
Security Target
Page 19
... by accessing the web server of the TOE from a client computer. Although the Management Function also provides Back Up/Restore Address Book functions, no evaluation based on this document is installed on the client computer and the TOE and client computer are network-...Audit Function, Identification and Authentication Function, Document Data Access Control Function, Stored Data Protection Function, Network Communication Data Protection Copyright (c) 2010 RICOH COMPANY, LTD. In addition, document data stored in the D-BOX as document data. When document data is printed, the Print ...
... by accessing the web server of the TOE from a client computer. Although the Management Function also provides Back Up/Restore Address Book functions, no evaluation based on this document is installed on the client computer and the TOE and client computer are network-...Audit Function, Identification and Authentication Function, Document Data Access Control Function, Stored Data Protection Function, Network Communication Data Protection Copyright (c) 2010 RICOH COMPANY, LTD. In addition, document data stored in the D-BOX as document data. When document data is printed, the Print ...
Security Target
Page 22
... successfully authenticated by the previously described "Identification and Authentication Function" to perform the following operations for document data ACL, and changingoperation permissions specified in the Address Book, with specified user roles to newly create, change their own general user information that correspond to add and delete administrator roles, and change the document... general users who have at least one other operations. General users can perform other Administrator is set to modify the document Data ACL. Copyright (c) 2010 RICOH COMPANY, LTD.
... successfully authenticated by the previously described "Identification and Authentication Function" to perform the following operations for document data ACL, and changingoperation permissions specified in the Address Book, with specified user roles to newly create, change their own general user information that correspond to add and delete administrator roles, and change the document... general users who have at least one other operations. General users can perform other Administrator is set to modify the document Data ACL. Copyright (c) 2010 RICOH COMPANY, LTD.
Security Target
Page 50
... management of roles that can specify the initial settings. a) None: Default subject security attributes cannot be defined. Copyright (c) 2010 RICOH COMPANY, LTD. Functional requirements FIA_UAU.7 FIA_UID.2 FIA_USB.1 FMT_MSA.1 FMT_MSA.3 Management requirements Management items Page 50 of 81 None a)... information registered to modify the document data default ACL of general user IDs by administrators. - Allows general users to the Address Book. - All Rights Reserved. b) Managing the permissive or restrictive setting of rules by administrators. a) Management of own administrator ...
... management of roles that can specify the initial settings. a) None: Default subject security attributes cannot be defined. Copyright (c) 2010 RICOH COMPANY, LTD. Functional requirements FIA_UAU.7 FIA_UID.2 FIA_USB.1 FMT_MSA.1 FMT_MSA.3 Management requirements Management items Page 50 of 81 None a)... information registered to modify the document data default ACL of general user IDs by administrators. - Allows general users to the Address Book. - All Rights Reserved. b) Managing the permissive or restrictive setting of rules by administrators. a) Management of own administrator ...
Security Target
Page 67
...user ID and corresponding password registered in "7.1.2.1 User Identification and Authentication". When a user authenticates successfully, as described in the Address Book. The TOE binds successfully authenticated users to the processes available to them (general user processes, administrator processes, or supervisor processes... in Event of Identification and Authentication Failure The TOE counts the number of Attempts before Lockout. Copyright (c) 2010 RICOH COMPANY, LTD. The TOE also identifies and authenticates the user based on the entered user IDs and passwords. When...
...user ID and corresponding password registered in "7.1.2.1 User Identification and Authentication". When a user authenticates successfully, as described in the Address Book. The TOE binds successfully authenticated users to the processes available to them (general user processes, administrator processes, or supervisor processes... in Event of Identification and Authentication Failure The TOE counts the number of Attempts before Lockout. Copyright (c) 2010 RICOH COMPANY, LTD. The TOE also identifies and authenticates the user based on the entered user IDs and passwords. When...
Security Target
Page 72
...will be set to the value of general users, S/MIME user information) Delete general user information registered to Address Book (S/MIME user information) Authorised user User administrators User administrators General users themselves User administrators General users themselves General ...default ACL, and S/MIME user information. Copyright (c) 2010 RICOH COMPANY, LTD. Table 31: Authorised operations on general user information Operations on general user information Creation of new general user information to Address Book (general user ID, general user authentication information, and ...
...will be set to the value of general users, S/MIME user information) Delete general user information registered to Address Book (S/MIME user information) Authorised user User administrators User administrators General users themselves User administrators General users themselves General ...default ACL, and S/MIME user information. Copyright (c) 2010 RICOH COMPANY, LTD. Table 31: Authorised operations on general user information Operations on general user information Creation of new general user information to Address Book (general user ID, general user authentication information, and ...
Security Target
Page 78
...RICOH COMPANY, LTD. All Rights Reserved. A database containing general user information for sending as data over the Internet to instructions from the TOE. There are Level 1 and Level 2 Password Complexity Settings. The network administrator is employed by E-mail Memory Transmission User administration Page 78 of character. Terms SMTP server Address Book... Back Up/Restore Address Book Internet Fax Customer engineer (CE) Fax reception process on Controller Board Supervisor Supervisor...
...RICOH COMPANY, LTD. All Rights Reserved. A database containing general user information for sending as data over the Internet to instructions from the TOE. There are Level 1 and Level 2 Password Complexity Settings. The network administrator is employed by E-mail Memory Transmission User administration Page 78 of character. Terms SMTP server Address Book... Back Up/Restore Address Book Internet Fax Customer engineer (CE) Fax reception process on Controller Board Supervisor Supervisor...