Xerox  Multi-Function Device Security Target 
 
13 
Copyright
 2013 Xerox Corporation. All rights reserved. 
The  On-Demand  Image  Overwrite  (ODIO)  function  overwrites  the  hard 
drive(s) on-demand of the system administrator.  The ODIO function operates 
in two modes:  full ODIO and standard ODIO.  A standard ODIO overwrites all 
files written to temporary storage areas of the HDD.  A full ODIO overwrites 
those files as well as the fax mailbox/dial directory and scan-to-mailbox data. 
1.3.2.2.  Authentication (TSF_AUT) 
A  user  must  authenticate  by  entering  a  username  and  password  prior  to 
being granted access to the LUI or the Web UI. While the user is typing the 
password, the TOE obscures each character entered.   
Upon successful authentication, users are granted access to functions based 
on their role. The system administrator defines the  privileges associated to 
each role.  
If  configured  for  local  authentication  the  system  requires  the  system 
administrator  to  create  each  user  and  assign  associated  credentials.    The 
system will authenticate the user against an internal database. The TOE may 
alternatively  be  configured  to  use  an  external  authentication  store  as 
described by section 1.3.2.3. 
The TOE enforces administrator defined session timeout periods for the LUI 
and Web UI.  
1.3.2.3.  Network Identification (TSF_NET_ID) 
As an alternative to local authentication, the TOE may be configured to refer 
to  an  external  identity  server  (a  trusted  remote  IT  entity).  User  credentials 
entered at the LUI or Web UI are authenticated at the server instead of the 
TOE.  The  network  authentication  services  supported  by  the  TOE  include: 
smart card authentication, LDAP v4, Kerberos v5 (Solaris) and Kerberos v5 
(Windows 2000/2003/2008). 
1.3.2.4.  Security Audit (TSF_FAU) 
The TOE generates audit logs that record events (e.g. copy/print/scan/fax job 
completion) and associated users.  The audit logs, which are stored locally in 
a 15000 entry circular log, are available to TOE administrators and can be 
exported  for  viewing  and  analysis.  The  downloaded  audit  records  are  in 
comma separated format. 
1.3.2.5.  Cryptographic Operations (TSF_FCS) 
The  TOE  utilizes  digital  signature  generation  and  verification  (RSA),  data 
encryption  (TDES,  AES),  key  establishment  (RSA)  and  cryptographic 
checksum  generation  and  secure  hash  computation  (HMAC,  SHA-1)  in 
support of disk encryption, SFTP, TLS and IPsec.