Ricoh Aficio MP 6001 SP Security Target - Page 53

Table 23: List of Authentication Events and Unsuccessful Authentication Attempts

Page 53 highlights

Table 22: Rules Governing the Operation for MFP Application (b) Page 52 of 87 Subject Normal user process Operation on Object Execution of MFP application Rule That Controls Operation When the function type associated with the MFP application is included in the available function list associated with the normal user process, execution of that MFP application is allowed for the normal user process. The MFP administrator registers the available MFP applications for each normal user on the available function list in advance. FDP_ACF.1.3(b) The TSF shall explicitly authorise access of subjects to objects based on the following additional rules: [assignment: rules that the Fax Reception Function operated using administrator permission is surely permitted]. FDP_ACF.1.4(b) The TSF shall explicitly deny access of subjects to objects based on the following additional rules: [assignment: no rules, based on security attributes, that explicitly deny access of subjects to objects]. FDP_RIP.1 Subset residual information protection Hierarchical to: No other components. Dependencies: No dependencies. FDP_RIP.1.1 The TSF shall ensure that any previous information content of a resource is made unavailable upon the [selection: deallocation of the resource from] the following objects: [assignment: user documents]. 6.1.4 Class FIA: Identification and authentication FIA_AFL.1 Authentication failure handling Hierarchical to: No other components. Dependencies: FIA_UAU.1 Timing of authentication FIA_AFL.1.1 The TSF shall detect when [selection: an administrator configurable positive integer within [assignment: 1 to 5]] unsuccessful authentication attempts occur related to [assignment: the authentication events shown in Table 23]. Table 23: List of Authentication Events and Unsuccessful Authentication Attempts Authentication Events User authentication using the Operation Panel User authentication using the TOE from client computer Web browser User authentication when printing from the client computer User authentication when using LAN Fax from client computer Copyright (c) 2011 RICOH COMPANY, LTD. All rights reserved.

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59
  • 60
  • 61
  • 62
  • 63
  • 64
  • 65
  • 66
  • 67
  • 68
  • 69
  • 70
  • 71
  • 72
  • 73
  • 74
  • 75
  • 76
  • 77
  • 78
  • 79
  • 80
  • 81
  • 82
  • 83
  • 84
  • 85
  • 86
  • 87
  • 88

Page 52 of
87
Table 22: Rules Governing the Operation for MFP Application (b)
Subject
Operation on Object
Rule That Controls Operation
Normal
user
process
Execution of MFP application
When the function type associated with the MFP
application is included in the available function list
associated with the normal user process, execution of that
MFP application is allowed for the normal user process.
The MFP administrator registers the available MFP
applications for each normal user on the available
function list in advance.
FDP_ACF.1.3(b) The TSF shall explicitly authorise access of subjects to objects based on the following
additional rules:
[assignment: rules that the Fax Reception Function operated using
administrator permission is surely permitted]
.
FDP_ACF.1.4(b) The TSF shall explicitly deny access of subjects to objects based on the following additional
rules:
[assignment: no rules, based on security attributes, that explicitly deny access of
subjects to objects]
.
FDP_RIP.1
Subset residual information protection
Hierarchical to:
No other components.
Dependencies:
No dependencies.
FDP_RIP.1.1
The TSF shall ensure that any previous information content of a resource is made unavailable
upon the
[selection: deallocation of the resource from]
the following objects:
[assignment:
user documents]
.
6.1.4
Class FIA: Identification and authentication
FIA_AFL.1
Authentication failure handling
Hierarchical to:
No other components.
Dependencies:
FIA_UAU.1 Timing of authentication
FIA_AFL.1.1
The TSF shall detect when
[selection: an administrator configurable positive integer within
[assignment: 1 to 5]]
unsuccessful authentication attempts occur related to
[assignment: the
authentication events shown in Table 23]
.
Table 23: List of Authentication Events and Unsuccessful Authentication Attempts
Authentication Events
User authentication using the Operation Panel
User authentication using the TOE from client computer Web
browser
User authentication when printing from the client computer
User authentication when using LAN Fax from client computer
Copyright (c) 2011 RICOH COMPANY, LTD. All rights reserved.