EasyManua.ls Logo

Fuji Xerox C2265 - Table 30 Security Attributes and Authorized Roles (FAX)

Fuji Xerox C2265
136 pages
Print Icon
To Next Page IconTo Next Page
To Next Page IconTo Next Page
To Previous Page IconTo Previous Page
To Previous Page IconTo Previous Page
Loading...
Fuji Xerox C2265/C2263 Security Target
- 77 - Copyright
2016 by Fuji Xerox Co., Ltd
- the roles listed in Table 30
Table 30 Security Attributes and Authorized Roles (FAX)
Security Attributes Operation Roles
Key operator identifier modify Key Operator
SA identifier query, modify
delete, creation
U.ADMINISTRATOR
General user identifier query, modify
delete, creation
U.ADMINISTRATOR
Owner identifier of D.DOC (own
document data in Mailbox)
query, delete,
creation
U.USER
Owner identifier of D.DOC (all
document data in Mailbox)
query, delete Key Operator
Owner identifier of D.FUNC (Personal
Mailbox)
query, delete,
creation
U.NORMAL, SA
Owner identifier of D.FUNC (Personal
Mailbox)
query, delete Key Operator
Owner identifier of D.FUNC (Shared
Mailbox)
query, delete,
creation
Key Operator
FMT_MSA.1 (g) Management of security attributes
Hierarchical to: No other components.
Dependencies: [FDP_ACC.1 Subset access control, or
FDP_IFC.1 Subset information flow control]
FMT_SMR.1 Security roles
FMT_SMF.1 Specification of Management Functions
FMT_MSA.1.1 (g) The TSF shall enforce the [assignment: access control SFP(s),
information flow control SFP(s)] to restrict the ability to [selection:
change default, query, modify, delete, [assignment: other
operations]] the security attributes [assignment: list of security
attributes] to [assignment: the authorized identified roles].
[assignment: access control SFP(s), information flow control SFP(s)]
- DSR Access Control SFP in Table 23
[selection: change default, query, modify, delete, [assignment: other
operations]]
- query, modify ,delete,[assignment: other operations]
[assignment: other operations]
- Creation
[assignment: list of security attributes]

Table of Contents

Related product manuals