Hardware manual

Version 1.1, 03/31/2015
GSS CCT Evaluation Technical Report Page 32 of 56 © 2015 Gossamer Security Solutions, Inc.
Document: AAR-BrocadeNetIron5.8 All rights reserved.
2.4.4 USER IDENTIFICATION AND AUTHENTICATION (FIA_UIA_EXT.1)
2.4.4.1 FIA_UIA_EXT.1.1
TSS Assurance Activities: None Defined
Guidance Assurance Activities: None Defined
Testing Assurance Activities: None Defined
2.4.4.2 FIA_UIA_EXT.1.2
TSS Assurance Activities: None Defined
Guidance Assurance Activities: None Defined
Testing Assurance Activities: None Defined
Component Assurance Activities: The evaluator shall examine the TSS to determine that it describes the logon
process for each logon method (local, remote (HTTPS, SSH, etc.)) supported for the product. This description shall
contain information pertaining to the credentials allowed/used, any protocol transactions that take place, and
what constitutes a “successful logon”.
Section 6.4 describes that the TOE supports password authentication and can be configured on a per user basis to
support (i.e., by uploading the user’s public key)SSH public-key-based authentication mechanisms. Administrators
define and assign attributes to users and those determine the privileges the user will have once logged on.
Section 6.4 describes that a user is presented with a command prompt upon successfully completing
authentication (and thus logon).