Page 50 of 81
Copyright (c) 2010 RICOH COMPANY, LTD. All Rights Reserved.
Functional
requirements
Management requirements Management items
- Security Management Function
(management of supervisor information):
management of supervisor authentication
information by supervisor.
FIA_UAU.7 None -
FIA_UID.2 a) Management of the user identities.
- Security Management Function
(management of general user
information): management of general user
IDs by the user administrator.
- Security Management Function
(management of administrator
information): management of own
administrator IDs by administrators.
- Security Management Function
(management of administrator
information): new registration of
administrators by administrators.
- Security Management Function
(management of supervisor information):
management of supervisor ID by
supervisor.
FIA_USB.1
a) An authorised administrator can
define default subject security attributes.
b) An authorised administrator can
change subject security attributes.
a) None: Default subject security
attributes cannot be defined.
b) Administrators can add own assigned
administrator roles to other administrators
and delete administrator roles.
FMT_MSA.1
a) Managing the group of roles that can
interact with the security attributes;
b) Management of rules by which
security attributes inherit specified
values.
a) Management of administrator roles by
administrators.
b) None: No rules by which security
attributes inherit specified values.
FMT_MSA.3
a) Managing the group of roles that can
specify initial values;
b) Managing the permissive or
restrictive setting of default values for a
given access control SFP;
c) Management of rules by which
security attributes inherit specified
values.
a) None: No groups of roles that can
specify the initial settings.
b) Management of the document data
default ACL.
- Allows the user administrator to modify
the document data default ACL for all
general user information registered to the
Address Book.
- Allows general users to modify the
document data default ACL of their own
general user information.
c) None: No rules by which security
attributes inherit specified values.