Reference Guide

40 Secure Operation of Crypto-C ME
RSA BSAFE Crypto-C Micro Edition 4.1.4 Security Policy Level 1
2.2 Roles
If a user of Crypto-C ME needs to operate the toolkit in different roles, then the user
must ensure all instantiated cryptographic objects are destroyed before changing from
the Crypto User role to the Crypto Officer role, or unexpected results could occur. The
following table lists the roles in which a user can operate:
The complete list of the functionality available is outlined in Services.
Table 12 Services Authorized for Roles
Role Authorized Services
Crypto Officer
R_FIPS140_ROLE_OFFICER
All services.
Crypto User
R_FIPS140_ROLE_USER
All services except
R_PROV_FIPS140_self_tests_full().