IDnomic ID CA Version 1.3.7

CSV information ?

Status active
Valid from 12.05.2021
Valid until 12.05.2026
Scheme 🇫🇷 FR
Manufacturer IDNOMIC
Category Key Management Systems
Security level ALC_FLR.3, EAL4+

Heuristics summary ?

Certificate ID: ANSSI-CC-2021/17

Certification report ?

Extracted keywords

Symmetric Algorithms
DES

Security level
EAL 4, EAL2, EAL4, EAL 1, EAL 3, EAL 5, EAL 7, ITSEC E3 Elémentaire
Security Assurance Requirements (SAR)
ADV_ARC, ADV_FSP, ADV_IMP, ADV_INT, ADV_SPM, ADV_TDS, AGD_OPE, AGD_PRE, ALC_FLR.3, ALC_FLR, ALC_CMC, ALC_CMS, ALC_DEL, ALC_DVS, ALC_LCD, ALC_TAT, ATE_COV, ATE_DPT, ATE_FUN, ATE_IND, AVA_VAN.3, AVA_VAN, ASE_CCL, ASE_ECD, ASE_INT, ASE_OBJ, ASE_REQ, ASE_SPD, ASE_TSS
Certificates
ANSSI-CC-2021/17
Evaluation facilities
CESTI, OPPIDA

Standards
CCMB-2017-04-001, CCMB-2017-04-002, CCMB-2017-04-003, CCMB-2017-04-004

File metadata

Creation date: D:20210519154641+02'00'
Modification date: D:20210519154641+02'00'
Pages: 14
Creator: PScript5.dll Version 5.2.2
Producer: Acrobat Distiller 11.0 (Windows)

References

No references.

Security target ?

Extracted keywords

Asymmetric Algorithms
ECDSA
Protocols
SSH, TLS, IPsec

Security level
EAL4, EAL4 augmented
Claims
T.PRIVILEGED_USER_ERROR, T.UNDETECTED_ACTIONS, T.UNAUTHORIZED_ACCESS, T.TSF_FAILURE, T.UNAUTHORIZED_UPDATE, T.USER_DATA_REUSE, T.UNAUTHENTICATED_TRANSACTIONS, T.WEAK_CRYPTO, A.NO_GENERAL_PURPOSE, A.PHYSICAL, A.TRUSTED_ADMIN, A.BACK_UP, A.COMSEC, A.NTP, A.OPERATING_SYSTEM, A.HSM, A.RPM_SIGNATURE, OT.RECOVERY, OT.INTEGRITY_PROTECTION, OT.TOE_ADMINISTRATION, OT.AUDIT_PROTECTION, OT.AUDIT_LOSS_RESPONSE, OT.SYSTEM_MONITORING, OT.VERIFIABLE_UPDATES, OT.RESIDUAL_INFORMATION_CLEARING, OT.KEY_ESCROW, OT.CERTIFICATES, OT.NON_REPUDIATION, OT.CONFIGURATION_MANAGEMENT, OE.NO_GENERAL_PURPOSE, OE.PHYSICAL, OE.TRUSTED_ADMIN, OE.BACKUP, OE.COMSEC, OE.NTP, OE.OPERATING_SYSTEM, OE.HSM, OE.RPM_SIGNATURE
Security Assurance Requirements (SAR)
ADV_ARC.1, ADV_IMP.1, ADV_TDS.1, ADV_TDS.3, ADV_FSP.4, ADV_FSP.1, ADV_FSP.2, ADV_TDS.2, AGD_OPE.1, AGD_PRE.1, ALC_FLR.3, ALC_CMC.4, ALC_DEL.1, ALC_TAT.1, ALC_DVS.1, ALC_LCD.1, ATE_COV.2, ATE_DPT.1, ATE_IND.2, ATE_FUN.1, ATE_COV.1, AVA_VAN.4, AVA_VAN.3, ASE_CCL.1, ASE_INT.1, ASE_REQ.2, ASE_TSS.1, ASE_ECD.1, ASE_REQ.1, ASE_OBJ.2, ASE_SPD.1
Security Functional Requirements (SFR)
FAU_STG_EXT, FAU_STG.4, FAU_STG.3, FAU_GEN.1, FAU_GEN.2, FAU_SAR.1, FAU_SAR.3, FAU_SEL.1, FAU_STG.1, FAU_GEN.1.1, FAU_GEN.1.2, FAU_GEN.2.1, FAU_SAR.1.1, FAU_SAR.1.2, FAU_SAR.3.1, FAU_SEL.1.1, FAU_STG.1.1, FAU_STG.1.2, FAU_STG.3.1, FAU_GEN, FCO_NRO_EXT, FCO_NRR_EXT, FCO_NRO_EXT.2, FCO_NRR_EXT.2, FCO_NRO_EXT.2.1, FCO_NRO_EXT.2.3, FCO_NRO_EXT.2.4, FCO_NRO_EXT.2.5, FCO_NRR_EXT.2.1, FCO_NRO_EXT.2.2, FCS_CKM.4, FCS_CKM.1, FCS_COP.1, FCS_CKM.5, FCS_CKM_EXT, FCS_STG_EXT, FCS_CKM_EXT.1, FCS_CKM_EXT.2, FCS_STG_EXT.1, FCS_CKM.1.1, FCS_CKM_EXT.1.1, FCS_CKM_EXT.2.1, FCS_CKM.4.1, FCS_COP.1.1, FCS_STG_EXT.1.1, FCS_CKM.2, FCS_CKM, FDP_CER_EXT, FDP_CSI_EXT, FDP_CRL_EXT, FDP_STG_EXT, FDP_CER_EXT.1, FDP_CER_EXT.2, FDP_CER_EXT.3, FDP_CSI_EXT.1, FDP_CRL_EXT.1, FDP_STG_EXT.1, FDP_RIP.2, FDP_CER_EXT.1.1, FDP_CER_EXT.1.2, FDP_CER_EXT.1.3, FDP_CER_EXT.2.1, FDP_CER_EXT.3.1, FDP_CSI_EXT.1.1, FDP_CSI_EXT.1.2, FDP_CRL_EXT.1.1, FDP_STG_EXT.1.1, FDP_RIP.2.1, FDP_ITC.1, FDP_ITC.2, FIA_UAU.2, FIA_UID.2, FIA_UAU.2.1, FIA_UID.2.1, FIA_CMC_EXT.1, FIA_EST_EXT.1, FIA_UID.1, FMT_MOF.1, FMT_MTD.1, FMT_SMF.1, FMT_SMR.2, FMT_SMF, FMT_SMF.1.1, FMT_SMR, FMT_SMR.2.1, FMT_SMR.2.2, FMT_SMR.2.3, FMT_MOF.1.1, FMT_MTD, FMT_MTD.1.1, FMT_SMR.1, FPT_TST.2, FPT_STM.1, FPT_TUD_EXT.1, FPT_FLS.1, FPT_SKP_EXT, FPT_TUD_EXT, FPT_SKP_EXT.1, FPT_SKP_EXT.1.1, FPT_TUD_EXT.1.1, FPT_TUD_EXT.1.2, FPT_TUD_EXT.1.3, FTA_TAB.1, FTA_SSL.3, FTA_SSL.4, FTA_SSL.4.1, FTP_ITC.1, FTP_TRP.1, FTP_TUD_EXT.1
Evaluation facilities
OPPIDA

Standards
PKCS#11, RFC 5280, RFC 5652, RFC 6960, X.509

File metadata

Title: Common Criteria Security Target
Subject: IDnomic ID CA
Author: IDnomic
Creation date: D:20210423093956+02'00'
Modification date: D:20210423094159+02'00'
Pages: 58
Creator: Acrobat PDFMaker 17 pour Word
Producer: Adobe PDF Library 17.11.238

References

No references.

Heuristics ?

Certificate ID: ANSSI-CC-2021/17

Extracted SARs

ALC_DVS.1, ASE_TSS.1, ATE_FUN.1, ALC_TAT.1, ATE_DPT.1, ASE_CCL.1, ASE_INT.1, ADV_TDS.3, ALC_LCD.1, ASE_REQ.2, ASE_SPD.1, AVA_VAN.4, ALC_DEL.1, AGD_PRE.1, ASE_OBJ.2, AGD_OPE.1, ALC_CMC.4, ATE_IND.2, ADV_IMP.1, ASE_ECD.1, ALC_FLR.3, ADV_FSP.4, ATE_COV.2, ADV_ARC.1

Scheme data ?

Product IDnomic ID CA Version 1.3.7
Vendor IDNOMICIDNOMIC
Level EAL4+
Id 2021/17
Certification Date 12/05/2021
Category Products for PC and servers
Url https://www.ssi.gouv.fr/certification_cc/idnomic-id-ca-version-1-3-7/
Enhanced
Id 2021/17
Certification Date 12/05/2021
Expiration Date 12/05/2026
Category Produits pour ordinateur personnel et serveur
Cc Version Critères Communs version 3.1r5
Level EAL4+
Augmentations ALC_FLR.3
Developer IDNOMIC / IDNOMIC
Evaluation Facility OPPIDA
Recognition SOG-IS - CCRA
Description Descriptif du produit Le produit évalué est « IDnomic ID CA, Version 1.3.7 » développé par IDNOMIC, marque commerciale de KEYNECTIS SA. Ce produit est une autorité de certification (AC) et intervient en tant que composant principal dans une infrastructure de gestion de clés (IGC). La TOE consiste en des programmes, formats de données, procédures, protocoles de communications, politiques de sécurité et mécanismes de cryptographie à clé publique fonctionnant ensemble pour permettre à des personnes d’établir des relations de confiance à travers l’usage de certificats électroniques. Rapport de certification Security target Certificat
Report Link https://www.ssi.gouv.fr/uploads/2021/05/anssi-cc-2021_17fr.pdf
Target Link https://www.ssi.gouv.fr/uploads/2021/05/anssi-cible-2021-17en.pdf
Cert Link https://www.ssi.gouv.fr/uploads/2021/05/certificat_2021_17fr.pdf

References ?

No references are available for this certificate.

Updates ?

  • 26.04.2023 The certificate data changed.
    Certificate changed

    The computed heuristics were updated.

    • The following values were inserted: {'scheme_data': {'product': 'IDnomic ID CA Version 1.3.7', 'vendor': 'IDNOMICIDNOMIC', 'level': 'EAL4+', 'id': '2021/17', 'certification_date': '12/05/2021', 'category': 'Products for PC and servers', 'url': 'https://www.ssi.gouv.fr/certification_cc/idnomic-id-ca-version-1-3-7/', 'enhanced': {'id': '2021/17', 'certification_date': '12/05/2021', 'expiration_date': '12/05/2026', 'category': 'Produits pour ordinateur personnel et serveur', 'cc_version': 'Critères Communs version 3.1r5', 'level': 'EAL4+', 'augmentations': 'ALC_FLR.3', 'developer': 'IDNOMIC / IDNOMIC', 'evaluation_facility': 'OPPIDA', 'recognition': 'SOG-IS - CCRA', 'description': 'Descriptif du produit\n\t\t\t\tLe produit Ă©valuĂ© est « IDnomic ID CA, Version 1.3.7 » dĂ©veloppĂ© par IDNOMIC, marque commerciale de KEYNECTIS SA.\nCe produit est une autoritĂ© de certification (AC) et intervient en tant que composant principal dans une infrastructure de gestion de clĂ©s (IGC). La TOE consiste en des programmes, formats de donnĂ©es, procĂ©dures, protocoles de communications, politiques de sĂ©curitĂ© et mĂ©canismes de cryptographie Ă  clĂ© publique fonctionnant ensemble pour permettre Ă  des personnes d’établir des relations de confiance Ă  travers l’usage de certificats Ă©lectroniques.\n\t\t\t\t\n Rapport de certification\nSecurity target\nCertificat', 'report_link': 'https://www.ssi.gouv.fr/uploads/2021/05/anssi-cc-2021_17fr.pdf', 'target_link': 'https://www.ssi.gouv.fr/uploads/2021/05/anssi-cible-2021-17en.pdf', 'cert_link': 'https://www.ssi.gouv.fr/uploads/2021/05/certificat_2021_17fr.pdf'}}}.
  • 11.02.2023 The certificate data changed.
    Certificate changed

    The _type was updated.

    • The new value is sec_certs.sample.cc.CCCertificate.

    The state of the certificate object was updated.

    • The _type property was set to sec_certs.sample.cc.CCCertificate.InternalState.
    • The following properties were deleted: ['errors'].

    The PDF extraction data was updated.

    • The _type property was set to sec_certs.sample.cc.CCCertificate.PdfData.

    The computed heuristics were updated.

    • The following values were inserted: {'direct_transitive_cves': None, 'indirect_transitive_cves': None}.
    • The _type property was set to sec_certs.sample.cc.CCCertificate.Heuristics.
    • The following properties were deleted: ['direct_dependency_cves', 'indirect_dependency_cves'].
  • 24.12.2022 The certificate data changed.
    Certificate changed

    The state of the certificate object was updated.

    • The report_download_ok property was set to True.
    • The report_convert_ok property was set to True.
    • The report_extract_ok property was set to True.
    • The errors property was set to [].
    • The report_pdf_hash property was set to 080e2277524778c58ebdeeffbf38b7f8082866b4924e6d0a3867d2a33a0e3d3b.
    • The report_txt_hash property was set to 83004789d08d8073012f835ba105e965483b6f9326bf4aa3b96789367040acd7.

    The PDF extraction data was updated.

    • The report_metadata property was set to {'pdf_file_size_bytes': 223359, 'pdf_is_encrypted': False, 'pdf_number_of_pages': 14, '/Author': '', '/CreationDate': "D:20210519154641+02'00'", '/Creator': 'PScript5.dll Version 5.2.2', '/ModDate': "D:20210519154641+02'00'", '/Producer': 'Acrobat Distiller 11.0 (Windows)', '/Title': '', 'pdf_hyperlinks': {'_type': 'Set', 'elements': []}}.
    • The report_frontpage property was set to {'anssi': {}, 'bsi': {}, 'nscib': {}, 'niap': {}, 'canada': {}}.
    • The report_keywords property was set to {'cc_cert_id': {'FR': {'ANSSI-CC-2021/17': 4}}, 'cc_protection_profile_id': {}, 'cc_security_level': {'EAL': {'EAL 4': 2, 'EAL2': 2, 'EAL4': 2, 'EAL 1': 1, 'EAL 3': 1, 'EAL 5': 1, 'EAL 7': 1}, 'ITSEC': {'ITSEC E3 ElĂ©mentaire': 1}}, 'cc_sar': {'ADV': {'ADV_ARC': 1, 'ADV_FSP': 1, 'ADV_IMP': 1, 'ADV_INT': 1, 'ADV_SPM': 1, 'ADV_TDS': 1}, 'AGD': {'AGD_OPE': 1, 'AGD_PRE': 1}, 'ALC': {'ALC_FLR.3': 2, 'ALC_FLR': 2, 'ALC_CMC': 1, 'ALC_CMS': 1, 'ALC_DEL': 1, 'ALC_DVS': 1, 'ALC_LCD': 1, 'ALC_TAT': 1}, 'ATE': {'ATE_COV': 1, 'ATE_DPT': 1, 'ATE_FUN': 1, 'ATE_IND': 1}, 'AVA': {'AVA_VAN.3': 1, 'AVA_VAN': 1}, 'ASE': {'ASE_CCL': 1, 'ASE_ECD': 1, 'ASE_INT': 1, 'ASE_OBJ': 1, 'ASE_REQ': 1, 'ASE_SPD': 1, 'ASE_TSS': 1}}, 'cc_sfr': {}, 'cc_claims': {}, 'vendor': {}, 'eval_facility': {'CESTI': {'CESTI': 1}, 'OPPIDA': {'OPPIDA': 3}}, 'symmetric_crypto': {'DES': {'DES': {'DES': 1}}}, 'asymmetric_crypto': {}, 'pq_crypto': {}, 'hash_function': {}, 'crypto_scheme': {}, 'crypto_protocol': {}, 'randomness': {}, 'cipher_mode': {}, 'ecc_curve': {}, 'crypto_engine': {}, 'tls_cipher_suite': {}, 'crypto_library': {}, 'vulnerability': {}, 'side_channel_analysis': {}, 'technical_report_id': {}, 'device_model': {}, 'tee_name': {}, 'os_name': {}, 'cplc_data': {}, 'ic_data_group': {}, 'standard_id': {'CC': {'CCMB-2017-04-001': 1, 'CCMB-2017-04-002': 1, 'CCMB-2017-04-003': 1, 'CCMB-2017-04-004': 1}}, 'javacard_version': {}, 'javacard_api_const': {}, 'javacard_packages': {}, 'certification_process': {}}.
    • The report_filename property was set to anssi-cc-2021_17fr.pdf.

    The computed heuristics were updated.

    • The cert_id property was set to ANSSI-CC-2021/17.
  • 24.12.2022 The certificate data changed.
    Certificate changed

    The cert_link was updated.

    • The new value is https://www.commoncriteriaportal.org/files/epfiles/certificat_2021_17fr.pdf.

    The manufacturer_web was updated.

    • The new value is https://atos.net/en/solutions/cyber-security-products/idnomic-pki-solutions-for-digital-identities-security.

    The state of the certificate object was updated.

    • The report_download_ok property was set to False.
    • The report_convert_ok property was set to False.
    • The report_extract_ok property was set to False.
    • The errors property was set to ['failed to download report from https://www.commoncriteriaportal.org/files/epfiles/anssi-cc-2021_17fr.pdf, code: 408', 'failed to download report from https://www.commoncriteriaportal.org/files/epfiles/anssi-cc-2021_17fr.pdf, code: 408'].
    • The report_pdf_hash property was set to None.
    • The report_txt_hash property was set to None.

    The PDF extraction data was updated.

    • The report_metadata property was set to None.
    • The report_frontpage property was set to None.
    • The report_keywords property was set to None.
    • The report_filename property was set to None.

    The computed heuristics were updated.

    • The cert_id property was set to None.
  • 23.12.2022 The certificate data changed.
    Certificate changed

    The cert_link was updated.

    • The new value is None.

    The manufacturer_web was updated.

    • The new value is None.
  • 05.10.2022 The certificate data changed.
    Certificate changed

    The state of the certificate object was updated.

    • The following values were inserted: {'st_convert_garbage': False, 'report_convert_garbage': False}.
  • 24.09.2022 The certificate data changed.
    Certificate changed

    The PDF extraction data was updated.

    • The following values were inserted: {'report_filename': 'anssi-cc-2021_17fr.pdf', 'st_filename': 'anssi-cible-2021-17en.pdf'}.
    • The report_keywords property was updated, with the {'cc_security_level': {'__update__': {'EAL': {'__update__': {'EAL 4': 2}, '__delete__': ['EAL 2', 'EAL 6']}}}, 'cc_sar': {'__update__': {'ALC': {'__update__': {'ALC_FLR.3': 2, 'ALC_FLR': 2}}}}, 'eval_facility': {'__update__': {'OPPIDA': {'__update__': {'OPPIDA': 3}}}}, 'symmetric_crypto': {'__update__': {'DES': {'__update__': {'DES': {'__update__': {'DES': 1}}}}}}, 'tee_name': {}, 'standard_id': {'__update__': {'CC': {'__insert__': {'CCMB-2017-04-003': 1, 'CCMB-2017-04-004': 1}}}}} data.
    • The st_keywords property was updated, with the {'cc_sar': {'__update__': {'ADV': {'__update__': {'ADV_FSP.4': 6, 'ADV_IMP.1': 5, 'ADV_TDS.3': 6, 'ADV_FSP.1': 2}}, 'AGD': {'__update__': {'AGD_PRE.1': 5}}, 'ALC': {'__update__': {'ALC_DVS.1': 3, 'ALC_FLR.3': 4, 'ALC_LCD.1': 3}, '__delete__': ['ALC_CMS.4']}, 'ATE': {'__update__': {'ATE_COV.2': 3, 'ATE_DPT.1': 3, 'ATE_FUN.1': 6}}, 'ASE': {'__update__': {'ASE_ECD.1': 4, 'ASE_INT.1': 3, 'ASE_OBJ.2': 2, 'ASE_REQ.2': 3, 'ASE_SPD.1': 1}}}}, 'cc_sfr': {'__update__': {'FAU': {'__update__': {'FAU_STG.3': 6, 'FAU_GEN.1': 12, 'FAU_SAR.1': 7, 'FAU_SAR.3': 5, 'FAU_STG.1': 7}}, 'FCS': {'__insert__': {'FCS_CKM': 1}, '__update__': {'FCS_CKM.4': 16, 'FCS_CKM.1': 15, 'FCS_COP.1': 44, 'FCS_STG_EXT.1': 13}}, 'FDP': {'__update__': {'FDP_CER_EXT.1': 14, 'FDP_CSI_EXT.1': 16, 'FDP_RIP.2': 14, 'FDP_CER_EXT.3.1': 1}}, 'FIA': {'__update__': {'FIA_UID.2': 6, 'FIA_UID.1': 2}}, 'FMT': {'__insert__': {'FMT_SMF': 1, 'FMT_SMR': 1, 'FMT_MTD': 1}, '__update__': {'FMT_MOF.1': 24, 'FMT_MTD.1': 7, 'FMT_SMR.2': 5}}, 'FPT': {'__update__': {'FPT_SKP_EXT.1': 12}}}}, 'cc_claims': {'__update__': {'T': {'__update__': {'T.UNDETECTED_ACTIONS': 1, 'T.TSF_FAILURE': 1, 'T.USER_DATA_REUSE': 1, 'T.WEAK_CRYPTO': 1}, '__delete__': ['T.RECOVERY', 'T.INTEGRITY_PROTECTION', 'T.TOE_ADMINISTRATION', 'T.AUDIT_PROTECTION', 'T.AUDIT_LOSS_RESPONSE', 'T.SYSTEM_MONITORING', 'T.VERIFIABLE_UPDATES', 'T.RESIDUAL_INFORMATION_CLEARING', 'T.KEY_ESCROW', 'T.CERTIFICATES', 'T.NON_REPUDIATION', 'T.CONFIGURATION_MANAGEMENT']}, 'A': {'__update__': {'A.PHYSICAL': 1, 'A.COMSEC': 1, 'A.HSM': 1}, '__delete__': ['A.BACKUP']}, 'OT': {'__update__': {'OT.AUDIT_LOSS_RESPONSE': 5, 'OT.SYSTEM_MONITORING': 3, 'OT.RESIDUAL_INFORMATION_CLEARING': 3, 'OT.KEY_ESCROW': 3, 'OT.NON_REPUDIATION': 3}}}}, 'vendor': {}, 'asymmetric_crypto': {'__delete__': ['FF']}, 'crypto_protocol': {'__update__': {'TLS': {'__update__': {'TLS': {'__update__': {'TLS': 9}}}}}}, 'cipher_mode': {}, 'tee_name': {}, 'standard_id': {'__update__': {'X509': {'__update__': {'X.509': 5}}}}} data.

    The computed heuristics were updated.

    • The extracted_sars property was updated, with the {'_type': 'Set', 'elements': [{'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_CMS', 'level': 4}]} values discarded.
  • 28.07.2022 The certificate data changed.
    Certificate changed

    The state of the certificate object was updated.

    • The st_extract_ok property was set to True.
    • The errors property was set to [].

    The PDF extraction data was updated.

    • The st_metadata property was set to {'pdf_file_size_bytes': 1023987, 'pdf_is_encrypted': False, 'pdf_number_of_pages': 58, '/Author': 'IDnomic', '/Category': '[Mettre Ă  jour la propriĂ©tĂ© "CatĂ©gorie" du document pour insĂ©rer ici le numĂ©ro de chrono/ref du document]', '/Company': 'Microsoft', '/CreationDate': "D:20210423093956+02'00'", '/Creator': 'Acrobat PDFMaker 17 pour Word', '/MSIP_Label_e463cba9-5f6c-478d-9329-7b2295e4e8ed_ActionId': '09aba970-b117-4f0a-bebd-4540198027e9', '/MSIP_Label_e463cba9-5f6c-478d-9329-7b2295e4e8ed_ContentBits': '0', '/MSIP_Label_e463cba9-5f6c-478d-9329-7b2295e4e8ed_Enabled': 'true', '/MSIP_Label_e463cba9-5f6c-478d-9329-7b2295e4e8ed_Method': 'Standard', '/MSIP_Label_e463cba9-5f6c-478d-9329-7b2295e4e8ed_Name': 'All Employees_2', '/MSIP_Label_e463cba9-5f6c-478d-9329-7b2295e4e8ed_SetDate': '2021-01-08T16:57:10Z', '/MSIP_Label_e463cba9-5f6c-478d-9329-7b2295e4e8ed_SiteId': '33440fc6-b7c7-412c-bb73-0e70b0198d5a', '/ModDate': "D:20210423094159+02'00'", '/Producer': 'Adobe PDF Library 17.11.238', '/SourceModified': '', '/Subject': 'IDnomic ID CA', '/Title': 'Common Criteria Security Target', 'pdf_hyperlinks': {'_type': 'Set', 'elements': []}}.
  • 18.07.2022 The certificate data changed.
    Certificate changed

    The _type was updated.

    • The new value is sec_certs.sample.common_criteria.CommonCriteriaCert.

    The state of the certificate object was updated.

    • The _type property was set to sec_certs.sample.common_criteria.CommonCriteriaCert.InternalState.

    The PDF extraction data was updated.

    • The _type property was set to sec_certs.sample.common_criteria.CommonCriteriaCert.PdfData.

    The computed heuristics were updated.

    • The _type property was set to sec_certs.sample.common_criteria.CommonCriteriaCert.Heuristics.
    • The st_references property was updated, with the {'_type': 'sec_certs.sample.certificate.References'} data.
    • The report_references property was updated, with the {'_type': 'sec_certs.sample.certificate.References'} data.
    • The extracted_sars property was set to {'_type': 'Set', 'elements': [{'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_DVS', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_TSS', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_FUN', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_TAT', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_DPT', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_CCL', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_INT', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_TDS', 'level': 3}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_LCD', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_REQ', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_SPD', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AVA_VAN', 'level': 4}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_CMS', 'level': 4}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_DEL', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AGD_PRE', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_OBJ', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AGD_OPE', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_IND', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_CMC', 'level': 4}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_IMP', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_ECD', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_FLR', 'level': 3}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_FSP', 'level': 4}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_COV', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_ARC', 'level': 1}]}.
  • 17.07.2022 The certificate data changed.
    Certificate changed

    The state of the certificate object was updated.

    • The st_extract_ok property was set to False.
    • The errors property was set to ['Failed to read metadata of certs/targets/pdf/abc5ebc2d7461bae.pdf, error: can only concatenate list (not "IndirectObject") to list', 'Failed to read metadata of certs/targets/pdf/abc5ebc2d7461bae.pdf, error: can only concatenate list (not "IndirectObject") to list'].

    The PDF extraction data was updated.

    • The report_metadata property was updated, with the {'pdf_hyperlinks': {'_type': 'Set', 'elements': []}} values inserted.
    • The st_metadata property was set to None.
    • The report_keywords property was set to {'cc_cert_id': {'FR': {'ANSSI-CC-2021/17': 4}}, 'cc_protection_profile_id': {}, 'cc_security_level': {'EAL': {'EAL 4': 4, 'EAL2': 2, 'EAL4': 2, 'EAL 1': 1, 'EAL 2': 1, 'EAL 3': 1, 'EAL 5': 1, 'EAL 6': 1, 'EAL 7': 1}, 'ITSEC': {'ITSEC E3 ElĂ©mentaire': 1}}, 'cc_sar': {'ADV': {'ADV_ARC': 1, 'ADV_FSP': 1, 'ADV_IMP': 1, 'ADV_INT': 1, 'ADV_SPM': 1, 'ADV_TDS': 1}, 'AGD': {'AGD_OPE': 1, 'AGD_PRE': 1}, 'ALC': {'ALC_FLR.3': 1, 'ALC_CMC': 1, 'ALC_CMS': 1, 'ALC_DEL': 1, 'ALC_DVS': 1, 'ALC_FLR': 1, 'ALC_LCD': 1, 'ALC_TAT': 1}, 'ATE': {'ATE_COV': 1, 'ATE_DPT': 1, 'ATE_FUN': 1, 'ATE_IND': 1}, 'AVA': {'AVA_VAN.3': 1, 'AVA_VAN': 1}, 'ASE': {'ASE_CCL': 1, 'ASE_ECD': 1, 'ASE_INT': 1, 'ASE_OBJ': 1, 'ASE_REQ': 1, 'ASE_SPD': 1, 'ASE_TSS': 1}}, 'cc_sfr': {}, 'cc_claims': {}, 'vendor': {}, 'eval_facility': {'CESTI': {'CESTI': 1}, 'OPPIDA': {'OPPIDA': 1}}, 'symmetric_crypto': {'DES': {'DES': {'DES': 3}}}, 'asymmetric_crypto': {}, 'pq_crypto': {}, 'hash_function': {}, 'crypto_scheme': {}, 'crypto_protocol': {}, 'randomness': {}, 'cipher_mode': {}, 'ecc_curve': {}, 'crypto_engine': {}, 'tls_cipher_suite': {}, 'crypto_library': {}, 'vulnerability': {}, 'side_channel_analysis': {}, 'technical_report_id': {}, 'device_model': {}, 'tee_name': {'IBM': {'SE': 1}}, 'os_name': {}, 'cplc_data': {}, 'ic_data_group': {}, 'standard_id': {'CC': {'CCMB-2017-04-001': 1, 'CCMB-2017-04-002': 1}}, 'javacard_version': {}, 'javacard_api_const': {}, 'javacard_packages': {}, 'certification_process': {}}.
    • The st_keywords property was set to {'cc_cert_id': {}, 'cc_protection_profile_id': {}, 'cc_security_level': {'EAL': {'EAL4': 2, 'EAL4 augmented': 2}}, 'cc_sar': {'ADV': {'ADV_ARC.1': 6, 'ADV_FSP.4': 11, 'ADV_IMP.1': 6, 'ADV_TDS.3': 9, 'ADV_FSP.1': 3, 'ADV_TDS.1': 2, 'ADV_FSP.2': 2, 'ADV_TDS.2': 1}, 'AGD': {'AGD_OPE.1': 6, 'AGD_PRE.1': 6}, 'ALC': {'ALC_CMC.4': 2, 'ALC_CMS.4': 4, 'ALC_DEL.1': 2, 'ALC_DVS.1': 4, 'ALC_FLR.3': 2, 'ALC_LCD.1': 4, 'ALC_TAT.1': 4}, 'ATE': {'ATE_COV.2': 4, 'ATE_DPT.1': 4, 'ATE_FUN.1': 8, 'ATE_IND.2': 2, 'ATE_COV.1': 2}, 'AVA': {'AVA_VAN.4': 2, 'AVA_VAN.3': 2}, 'ASE': {'ASE_CCL.1': 2, 'ASE_ECD.1': 6, 'ASE_INT.1': 6, 'ASE_OBJ.2': 4, 'ASE_REQ.2': 4, 'ASE_SPD.1': 4, 'ASE_TSS.1': 2, 'ASE_REQ.1': 2}}, 'cc_sfr': {'FAU': {'FAU_STG_EXT': 1, 'FAU_STG.4': 1, 'FAU_STG.3': 7, 'FAU_GEN.1': 16, 'FAU_GEN.2': 6, 'FAU_SAR.1': 8, 'FAU_SAR.3': 6, 'FAU_SEL.1': 6, 'FAU_STG.1': 8, 'FAU_GEN.1.1': 1, 'FAU_GEN.1.2': 1, 'FAU_GEN.2.1': 1, 'FAU_SAR.1.1': 1, 'FAU_SAR.1.2': 1, 'FAU_SAR.3.1': 1, 'FAU_SEL.1.1': 1, 'FAU_STG.1.1': 1, 'FAU_STG.1.2': 1, 'FAU_STG.3.1': 1, 'FAU_GEN': 6}, 'FCO': {'FCO_NRO_EXT': 3, 'FCO_NRR_EXT': 3, 'FCO_NRO_EXT.2': 13, 'FCO_NRR_EXT.2': 12, 'FCO_NRO_EXT.2.1': 2, 'FCO_NRO_EXT.2.3': 2, 'FCO_NRO_EXT.2.4': 2, 'FCO_NRO_EXT.2.5': 2, 'FCO_NRR_EXT.2.1': 2, 'FCO_NRO_EXT.2.2': 1}, 'FCS': {'FCS_CKM.4': 17, 'FCS_CKM.1': 19, 'FCS_COP.1': 49, 'FCS_CKM.5': 1, 'FCS_CKM_EXT': 4, 'FCS_STG_EXT': 3, 'FCS_STG_EXT.1': 14, 'FCS_CKM_EXT.1': 12, 'FCS_CKM_EXT.2': 12, 'FCS_CKM.1.1': 1, 'FCS_CKM_EXT.1.1': 2, 'FCS_CKM_EXT.2.1': 2, 'FCS_CKM.4.1': 1, 'FCS_COP.1.1': 4, 'FCS_STG_EXT.1.1': 2, 'FCS_CKM.2': 1}, 'FDP': {'FDP_CER_EXT': 5, 'FDP_CSI_EXT': 3, 'FDP_CRL_EXT': 3, 'FDP_STG_EXT': 3, 'FDP_CER_EXT.1': 15, 'FDP_CER_EXT.2': 12, 'FDP_CER_EXT.3': 12, 'FDP_CSI_EXT.1': 17, 'FDP_CRL_EXT.1': 12, 'FDP_STG_EXT.1': 12, 'FDP_RIP.2': 12, 'FDP_CER_EXT.1.1': 2, 'FDP_CER_EXT.1.2': 2, 'FDP_CER_EXT.1.3': 2, 'FDP_CER_EXT.2.1': 2, 'FDP_CER_EXT.3.1': 2, 'FDP_CSI_EXT.1.1': 2, 'FDP_CSI_EXT.1.2': 2, 'FDP_CRL_EXT.1.1': 2, 'FDP_STG_EXT.1.1': 2, 'FDP_RIP.2.1': 1, 'FDP_ITC.1': 5, 'FDP_ITC.2': 5}, 'FIA': {'FIA_UAU.2': 5, 'FIA_UID.2': 8, 'FIA_UAU.2.1': 1, 'FIA_UID.2.1': 1, 'FIA_CMC_EXT.1': 3, 'FIA_EST_EXT.1': 3, 'FIA_UID.1': 3}, 'FMT': {'FMT_MOF.1': 27, 'FMT_MTD.1': 8, 'FMT_SMF.1': 15, 'FMT_SMR.2': 10, 'FMT_SMF.1.1': 1, 'FMT_SMR.2.1': 3, 'FMT_SMR.2.2': 1, 'FMT_SMR.2.3': 1, 'FMT_MOF.1.1': 4, 'FMT_MTD.1.1': 1, 'FMT_SMR.1': 5}, 'FPT': {'FPT_TST.2': 1, 'FPT_STM.1': 2, 'FPT_TUD_EXT.1': 12, 'FPT_FLS.1': 1, 'FPT_SKP_EXT': 3, 'FPT_TUD_EXT': 3, 'FPT_SKP_EXT.1': 11, 'FPT_SKP_EXT.1.1': 2, 'FPT_TUD_EXT.1.1': 2, 'FPT_TUD_EXT.1.2': 2, 'FPT_TUD_EXT.1.3': 2}, 'FTA': {'FTA_TAB.1': 1, 'FTA_SSL.3': 1, 'FTA_SSL.4': 7, 'FTA_SSL.4.1': 1}, 'FTP': {'FTP_ITC.1': 1, 'FTP_TRP.1': 1, 'FTP_TUD_EXT.1': 1}}, 'cc_claims': {'T': {'T.RECOVERY': 1, 'T.INTEGRITY_PROTECTION': 1, 'T.PRIVILEGED_USER_ERROR': 2, 'T.TOE_ADMINISTRATION': 6, 'T.AUDIT_PROTECTION': 6, 'T.AUDIT_LOSS_RESPONSE': 7, 'T.UNDETECTED_ACTIONS': 2, 'T.SYSTEM_MONITORING': 5, 'T.UNAUTHORIZED_ACCESS': 2, 'T.TSF_FAILURE': 2, 'T.UNAUTHORIZED_UPDATE': 2, 'T.VERIFIABLE_UPDATES': 6, 'T.USER_DATA_REUSE': 2, 'T.RESIDUAL_INFORMATION_CLEARING': 5, 'T.KEY_ESCROW': 5, 'T.UNAUTHENTICATED_TRANSACTIONS': 2, 'T.CERTIFICATES': 5, 'T.NON_REPUDIATION': 5, 'T.CONFIGURATION_MANAGEMENT': 5, 'T.WEAK_CRYPTO': 2}, 'A': {'A.NO_GENERAL_PURPOSE': 2, 'A.PHYSICAL': 2, 'A.TRUSTED_ADMIN': 2, 'A.BACK_UP': 1, 'A.COMSEC': 2, 'A.NTP': 3, 'A.OPERATING_SYSTEM': 2, 'A.HSM': 2, 'A.RPM_SIGNATURE': 2, 'A.BACKUP': 1}, 'OT': {'OT.RECOVERY': 1, 'OT.INTEGRITY_PROTECTION': 1, 'OT.TOE_ADMINISTRATION': 6, 'OT.AUDIT_PROTECTION': 6, 'OT.AUDIT_LOSS_RESPONSE': 7, 'OT.SYSTEM_MONITORING': 5, 'OT.VERIFIABLE_UPDATES': 6, 'OT.RESIDUAL_INFORMATION_CLEARING': 5, 'OT.KEY_ESCROW': 5, 'OT.CERTIFICATES': 5, 'OT.NON_REPUDIATION': 5, 'OT.CONFIGURATION_MANAGEMENT': 5}, 'OE': {'OE.NO_GENERAL_PURPOSE': 3, 'OE.PHYSICAL': 3, 'OE.TRUSTED_ADMIN': 3, 'OE.BACKUP': 3, 'OE.COMSEC': 5, 'OE.NTP': 3, 'OE.OPERATING_SYSTEM': 3, 'OE.HSM': 3, 'OE.RPM_SIGNATURE': 3}}, 'vendor': {'STMicroelectronics': {'STM': 2}}, 'eval_facility': {'OPPIDA': {'OPPIDA': 1}}, 'symmetric_crypto': {}, 'asymmetric_crypto': {'ECC': {'ECDSA': {'ECDSA': 5}}, 'FF': {'DSA': {'DSA': 8}}}, 'pq_crypto': {}, 'hash_function': {}, 'crypto_scheme': {}, 'crypto_protocol': {'SSH': {'SSH': 2}, 'TLS': {'TLS': {'TLS': 8}}, 'IPsec': {'IPsec': 1}}, 'randomness': {}, 'cipher_mode': {'CBC': {'CBC': 1}}, 'ecc_curve': {}, 'crypto_engine': {}, 'tls_cipher_suite': {}, 'crypto_library': {}, 'vulnerability': {}, 'side_channel_analysis': {}, 'technical_report_id': {}, 'device_model': {}, 'tee_name': {'IBM': {'SE': 14}}, 'os_name': {}, 'cplc_data': {}, 'ic_data_group': {}, 'standard_id': {'PKCS': {'PKCS#11': 1}, 'RFC': {'RFC 5280': 11, 'RFC 5652': 1, 'RFC 6960': 2}, 'X509': {'X.509': 3}}, 'javacard_version': {}, 'javacard_api_const': {}, 'javacard_packages': {}, 'certification_process': {}}.

    The computed heuristics were updated.

    • The _type property was set to Heuristics.
  • 14.06.2022 The certificate data changed.
    Certificate changed

    The state of the certificate object was updated.

    • The following values were inserted: {'report_pdf_hash': '080e2277524778c58ebdeeffbf38b7f8082866b4924e6d0a3867d2a33a0e3d3b', 'st_pdf_hash': 'c0bf5b4f90559db4c7e2814af6a7605c75c960374a482392d4f869c8e6037731', 'report_txt_hash': '83004789d08d8073012f835ba105e965483b6f9326bf4aa3b96789367040acd7', 'st_txt_hash': '1d3ffe8d0a26c11cb213f8c2fa3b3076473ea3399d6b2269f8ff527fa90b852d'}.

    The PDF extraction data was updated.

    • The report_keywords property was updated, with the {'rules_symmetric_crypto': {'DES': 3}, 'rules_asymmetric_crypto': {}, 'rules_pq_crypto': {}, 'rules_hashes': {}, 'rules_crypto_schemes': {}, 'rules_randomness': {}, 'rules_tee': {'SE': 1}, 'rules_side_channels': {}} values inserted.
    • The st_keywords property was updated, with the {'rules_symmetric_crypto': {}, 'rules_asymmetric_crypto': {'ECDSA': 5, 'DSA': 8}, 'rules_pq_crypto': {}, 'rules_hashes': {}, 'rules_crypto_schemes': {'TLS': 8}, 'rules_randomness': {}, 'rules_tee': {'SE': 14}, 'rules_side_channels': {}} values inserted.
  • 13.05.2022 The certificate data changed.
    Certificate changed

    The computed heuristics were updated.

    • The following values were inserted: {'extracted_sars': {'_type': 'Set', 'elements': [{'_type': 'SAR', 'family': 'ATE_DPT', 'level': 1}, {'_type': 'SAR', 'family': 'ALC_DEL', 'level': 1}, {'_type': 'SAR', 'family': 'ALC_DVS', 'level': 1}, {'_type': 'SAR', 'family': 'ADV_TDS', 'level': 3}, {'_type': 'SAR', 'family': 'AGD_PRE', 'level': 1}, {'_type': 'SAR', 'family': 'ASE_REQ', 'level': 2}, {'_type': 'SAR', 'family': 'ADV_ARC', 'level': 1}, {'_type': 'SAR', 'family': 'ALC_TAT', 'level': 1}, {'_type': 'SAR', 'family': 'ALC_LCD', 'level': 1}, {'_type': 'SAR', 'family': 'AGD_OPE', 'level': 1}, {'_type': 'SAR', 'family': 'ASE_CCL', 'level': 1}, {'_type': 'SAR', 'family': 'ALC_FLR', 'level': 3}, {'_type': 'SAR', 'family': 'ASE_SPD', 'level': 1}, {'_type': 'SAR', 'family': 'ALC_CMS', 'level': 4}, {'_type': 'SAR', 'family': 'AVA_VAN', 'level': 4}, {'_type': 'SAR', 'family': 'ATE_FUN', 'level': 1}, {'_type': 'SAR', 'family': 'ALC_CMC', 'level': 4}, {'_type': 'SAR', 'family': 'ATE_IND', 'level': 2}, {'_type': 'SAR', 'family': 'ASE_ECD', 'level': 1}, {'_type': 'SAR', 'family': 'ADV_IMP', 'level': 1}, {'_type': 'SAR', 'family': 'ATE_COV', 'level': 2}, {'_type': 'SAR', 'family': 'ADV_FSP', 'level': 4}, {'_type': 'SAR', 'family': 'ASE_TSS', 'level': 1}, {'_type': 'SAR', 'family': 'ASE_INT', 'level': 1}, {'_type': 'SAR', 'family': 'ASE_OBJ', 'level': 2}]}}.
  • 24.04.2022 The certificate data changed.
    Certificate changed

    The computed heuristics were updated.

    • The following values were inserted: {'direct_dependency_cves': None, 'indirect_dependency_cves': None}.
  • 08.03.2022 The certificate data changed.
    Certificate changed

    The computed heuristics were updated.

    • The following values were inserted: {'st_references': {'_type': 'References', 'directly_referenced_by': None, 'indirectly_referenced_by': None, 'directly_referencing': None, 'indirectly_referencing': None}, 'report_references': {'_type': 'References', 'directly_referenced_by': None, 'indirectly_referenced_by': None, 'directly_referencing': None, 'indirectly_referencing': None}}.
    • The following properties were deleted: ['directly_affected_by', 'indirectly_affected_by', 'directly_affecting', 'indirectly_affecting'].
  • 18.02.2022 The certificate data changed.
    Certificate changed

    The PDF extraction data was updated.

    • The report_frontpage property was updated, with the {'nscib': {}, 'niap': {}, 'canada': {}} values inserted.
    • The st_frontpage property was updated, with the {'nscib': {}, 'niap': {}, 'canada': {}} values inserted.

    The computed heuristics were updated.

    • The extracted_versions property was set to {'_type': 'Set', 'elements': ['1.3.7']}.
  • 28.01.2022 The certificate was first processed.
    New certificate

    A new Common Criteria certificate with the product name IDnomic ID CA Version 1.3.7 was processed.

Raw data

{
  "_type": "sec_certs.sample.cc.CCCertificate",
  "category": "Key Management Systems",
  "cert_link": "https://www.commoncriteriaportal.org/files/epfiles/certificat_2021_17fr.pdf",
  "dgst": "abc5ebc2d7461bae",
  "heuristics": {
    "_type": "sec_certs.sample.cc.CCCertificate.Heuristics",
    "cert_id": "ANSSI-CC-2021/17",
    "cert_lab": null,
    "cpe_matches": null,
    "direct_transitive_cves": null,
    "extracted_sars": {
      "_type": "Set",
      "elements": [
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "AGD_PRE",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ASE_ECD",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "AVA_VAN",
          "level": 4
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ADV_TDS",
          "level": 3
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ATE_COV",
          "level": 2
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ALC_DVS",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ADV_IMP",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ALC_LCD",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ASE_REQ",
          "level": 2
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ATE_FUN",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ALC_FLR",
          "level": 3
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "AGD_OPE",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ATE_DPT",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ALC_CMC",
          "level": 4
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ALC_DEL",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ASE_OBJ",
          "level": 2
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ASE_INT",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ADV_FSP",
          "level": 4
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ASE_TSS",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ASE_CCL",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ALC_TAT",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ATE_IND",
          "level": 2
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ASE_SPD",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ADV_ARC",
          "level": 1
        }
      ]
    },
    "extracted_versions": {
      "_type": "Set",
      "elements": [
        "1.3.7"
      ]
    },
    "indirect_transitive_cves": null,
    "related_cves": null,
    "report_references": {
      "_type": "sec_certs.sample.certificate.References",
      "directly_referenced_by": null,
      "directly_referencing": null,
      "indirectly_referenced_by": null,
      "indirectly_referencing": null
    },
    "scheme_data": {
      "category": "Products for PC and servers",
      "certification_date": "12/05/2021",
      "enhanced": {
        "augmentations": "ALC_FLR.3",
        "category": "Produits pour ordinateur personnel et serveur",
        "cc_version": "Crit\u00e8res Communs version 3.1r5",
        "cert_link": "https://www.ssi.gouv.fr/uploads/2021/05/certificat_2021_17fr.pdf",
        "certification_date": "12/05/2021",
        "description": "Descriptif du produit\n\t\t\t\tLe produit \u00e9valu\u00e9 est \u00ab IDnomic ID CA, Version 1.3.7 \u00bb d\u00e9velopp\u00e9 par IDNOMIC, marque commerciale de KEYNECTIS SA.\nCe produit est une autorit\u00e9 de certification (AC) et intervient en tant que composant principal dans une infrastructure de gestion de cl\u00e9s (IGC). La TOE consiste en des programmes, formats de donn\u00e9es, proc\u00e9dures, protocoles de communications, politiques de s\u00e9curit\u00e9 et m\u00e9canismes de cryptographie \u00e0 cl\u00e9 publique fonctionnant ensemble pour permettre \u00e0 des personnes d\u2019\u00e9tablir des relations de confiance \u00e0 travers l\u2019usage de certificats \u00e9lectroniques.\n\t\t\t\t\n                Rapport de certification\nSecurity target\nCertificat",
        "developer": "IDNOMIC / IDNOMIC",
        "evaluation_facility": "OPPIDA",
        "expiration_date": "12/05/2026",
        "id": "2021/17",
        "level": "EAL4+",
        "recognition": "SOG-IS - CCRA",
        "report_link": "https://www.ssi.gouv.fr/uploads/2021/05/anssi-cc-2021_17fr.pdf",
        "target_link": "https://www.ssi.gouv.fr/uploads/2021/05/anssi-cible-2021-17en.pdf"
      },
      "id": "2021/17",
      "level": "EAL4+",
      "product": "IDnomic ID CA Version 1.3.7",
      "url": "https://www.ssi.gouv.fr/certification_cc/idnomic-id-ca-version-1-3-7/",
      "vendor": "IDNOMICIDNOMIC"
    },
    "st_references": {
      "_type": "sec_certs.sample.certificate.References",
      "directly_referenced_by": null,
      "directly_referencing": null,
      "indirectly_referenced_by": null,
      "indirectly_referencing": null
    },
    "verified_cpe_matches": null
  },
  "maintenance_updates": {
    "_type": "Set",
    "elements": []
  },
  "manufacturer": "IDNOMIC",
  "manufacturer_web": "https://atos.net/en/solutions/cyber-security-products/idnomic-pki-solutions-for-digital-identities-security",
  "name": "IDnomic ID CA Version 1.3.7",
  "not_valid_after": "2026-05-12",
  "not_valid_before": "2021-05-12",
  "pdf_data": {
    "_type": "sec_certs.sample.cc.CCCertificate.PdfData",
    "report_filename": "anssi-cc-2021_17fr.pdf",
    "report_frontpage": {
      "anssi": {},
      "bsi": {},
      "canada": {},
      "niap": {},
      "nscib": {}
    },
    "report_keywords": {
      "asymmetric_crypto": {},
      "cc_cert_id": {
        "FR": {
          "ANSSI-CC-2021/17": 4
        }
      },
      "cc_claims": {},
      "cc_protection_profile_id": {},
      "cc_sar": {
        "ADV": {
          "ADV_ARC": 1,
          "ADV_FSP": 1,
          "ADV_IMP": 1,
          "ADV_INT": 1,
          "ADV_SPM": 1,
          "ADV_TDS": 1
        },
        "AGD": {
          "AGD_OPE": 1,
          "AGD_PRE": 1
        },
        "ALC": {
          "ALC_CMC": 1,
          "ALC_CMS": 1,
          "ALC_DEL": 1,
          "ALC_DVS": 1,
          "ALC_FLR": 2,
          "ALC_FLR.3": 2,
          "ALC_LCD": 1,
          "ALC_TAT": 1
        },
        "ASE": {
          "ASE_CCL": 1,
          "ASE_ECD": 1,
          "ASE_INT": 1,
          "ASE_OBJ": 1,
          "ASE_REQ": 1,
          "ASE_SPD": 1,
          "ASE_TSS": 1
        },
        "ATE": {
          "ATE_COV": 1,
          "ATE_DPT": 1,
          "ATE_FUN": 1,
          "ATE_IND": 1
        },
        "AVA": {
          "AVA_VAN": 1,
          "AVA_VAN.3": 1
        }
      },
      "cc_security_level": {
        "EAL": {
          "EAL 1": 1,
          "EAL 3": 1,
          "EAL 4": 2,
          "EAL 5": 1,
          "EAL 7": 1,
          "EAL2": 2,
          "EAL4": 2
        },
        "ITSEC": {
          "ITSEC E3 El\u00e9mentaire": 1
        }
      },
      "cc_sfr": {},
      "certification_process": {},
      "cipher_mode": {},
      "cplc_data": {},
      "crypto_engine": {},
      "crypto_library": {},
      "crypto_protocol": {},
      "crypto_scheme": {},
      "device_model": {},
      "ecc_curve": {},
      "eval_facility": {
        "CESTI": {
          "CESTI": 1
        },
        "OPPIDA": {
          "OPPIDA": 3
        }
      },
      "hash_function": {},
      "ic_data_group": {},
      "javacard_api_const": {},
      "javacard_packages": {},
      "javacard_version": {},
      "os_name": {},
      "pq_crypto": {},
      "randomness": {},
      "side_channel_analysis": {},
      "standard_id": {
        "CC": {
          "CCMB-2017-04-001": 1,
          "CCMB-2017-04-002": 1,
          "CCMB-2017-04-003": 1,
          "CCMB-2017-04-004": 1
        }
      },
      "symmetric_crypto": {
        "DES": {
          "DES": {
            "DES": 1
          }
        }
      },
      "technical_report_id": {},
      "tee_name": {},
      "tls_cipher_suite": {},
      "vendor": {},
      "vulnerability": {}
    },
    "report_metadata": {
      "/Author": "",
      "/CreationDate": "D:20210519154641+02\u002700\u0027",
      "/Creator": "PScript5.dll Version 5.2.2",
      "/ModDate": "D:20210519154641+02\u002700\u0027",
      "/Producer": "Acrobat Distiller 11.0 (Windows)",
      "/Title": "",
      "pdf_file_size_bytes": 223359,
      "pdf_hyperlinks": {
        "_type": "Set",
        "elements": []
      },
      "pdf_is_encrypted": false,
      "pdf_number_of_pages": 14
    },
    "st_filename": "anssi-cible-2021-17en.pdf",
    "st_frontpage": {
      "anssi": {},
      "bsi": {},
      "canada": {},
      "niap": {},
      "nscib": {}
    },
    "st_keywords": {
      "asymmetric_crypto": {
        "ECC": {
          "ECDSA": {
            "ECDSA": 5
          }
        }
      },
      "cc_cert_id": {},
      "cc_claims": {
        "A": {
          "A.BACK_UP": 1,
          "A.COMSEC": 1,
          "A.HSM": 1,
          "A.NO_GENERAL_PURPOSE": 2,
          "A.NTP": 3,
          "A.OPERATING_SYSTEM": 2,
          "A.PHYSICAL": 1,
          "A.RPM_SIGNATURE": 2,
          "A.TRUSTED_ADMIN": 2
        },
        "OE": {
          "OE.BACKUP": 3,
          "OE.COMSEC": 5,
          "OE.HSM": 3,
          "OE.NO_GENERAL_PURPOSE": 3,
          "OE.NTP": 3,
          "OE.OPERATING_SYSTEM": 3,
          "OE.PHYSICAL": 3,
          "OE.RPM_SIGNATURE": 3,
          "OE.TRUSTED_ADMIN": 3
        },
        "OT": {
          "OT.AUDIT_LOSS_RESPONSE": 5,
          "OT.AUDIT_PROTECTION": 6,
          "OT.CERTIFICATES": 5,
          "OT.CONFIGURATION_MANAGEMENT": 5,
          "OT.INTEGRITY_PROTECTION": 1,
          "OT.KEY_ESCROW": 3,
          "OT.NON_REPUDIATION": 3,
          "OT.RECOVERY": 1,
          "OT.RESIDUAL_INFORMATION_CLEARING": 3,
          "OT.SYSTEM_MONITORING": 3,
          "OT.TOE_ADMINISTRATION": 6,
          "OT.VERIFIABLE_UPDATES": 6
        },
        "T": {
          "T.PRIVILEGED_USER_ERROR": 2,
          "T.TSF_FAILURE": 1,
          "T.UNAUTHENTICATED_TRANSACTIONS": 2,
          "T.UNAUTHORIZED_ACCESS": 2,
          "T.UNAUTHORIZED_UPDATE": 2,
          "T.UNDETECTED_ACTIONS": 1,
          "T.USER_DATA_REUSE": 1,
          "T.WEAK_CRYPTO": 1
        }
      },
      "cc_protection_profile_id": {},
      "cc_sar": {
        "ADV": {
          "ADV_ARC.1": 6,
          "ADV_FSP.1": 2,
          "ADV_FSP.2": 2,
          "ADV_FSP.4": 6,
          "ADV_IMP.1": 5,
          "ADV_TDS.1": 2,
          "ADV_TDS.2": 1,
          "ADV_TDS.3": 6
        },
        "AGD": {
          "AGD_OPE.1": 6,
          "AGD_PRE.1": 5
        },
        "ALC": {
          "ALC_CMC.4": 2,
          "ALC_DEL.1": 2,
          "ALC_DVS.1": 3,
          "ALC_FLR.3": 4,
          "ALC_LCD.1": 3,
          "ALC_TAT.1": 4
        },
        "ASE": {
          "ASE_CCL.1": 2,
          "ASE_ECD.1": 4,
          "ASE_INT.1": 3,
          "ASE_OBJ.2": 2,
          "ASE_REQ.1": 2,
          "ASE_REQ.2": 3,
          "ASE_SPD.1": 1,
          "ASE_TSS.1": 2
        },
        "ATE": {
          "ATE_COV.1": 2,
          "ATE_COV.2": 3,
          "ATE_DPT.1": 3,
          "ATE_FUN.1": 6,
          "ATE_IND.2": 2
        },
        "AVA": {
          "AVA_VAN.3": 2,
          "AVA_VAN.4": 2
        }
      },
      "cc_security_level": {
        "EAL": {
          "EAL4": 2,
          "EAL4 augmented": 2
        }
      },
      "cc_sfr": {
        "FAU": {
          "FAU_GEN": 6,
          "FAU_GEN.1": 12,
          "FAU_GEN.1.1": 1,
          "FAU_GEN.1.2": 1,
          "FAU_GEN.2": 6,
          "FAU_GEN.2.1": 1,
          "FAU_SAR.1": 7,
          "FAU_SAR.1.1": 1,
          "FAU_SAR.1.2": 1,
          "FAU_SAR.3": 5,
          "FAU_SAR.3.1": 1,
          "FAU_SEL.1": 6,
          "FAU_SEL.1.1": 1,
          "FAU_STG.1": 7,
          "FAU_STG.1.1": 1,
          "FAU_STG.1.2": 1,
          "FAU_STG.3": 6,
          "FAU_STG.3.1": 1,
          "FAU_STG.4": 1,
          "FAU_STG_EXT": 1
        },
        "FCO": {
          "FCO_NRO_EXT": 3,
          "FCO_NRO_EXT.2": 13,
          "FCO_NRO_EXT.2.1": 2,
          "FCO_NRO_EXT.2.2": 1,
          "FCO_NRO_EXT.2.3": 2,
          "FCO_NRO_EXT.2.4": 2,
          "FCO_NRO_EXT.2.5": 2,
          "FCO_NRR_EXT": 3,
          "FCO_NRR_EXT.2": 12,
          "FCO_NRR_EXT.2.1": 2
        },
        "FCS": {
          "FCS_CKM": 1,
          "FCS_CKM.1": 15,
          "FCS_CKM.1.1": 1,
          "FCS_CKM.2": 1,
          "FCS_CKM.4": 16,
          "FCS_CKM.4.1": 1,
          "FCS_CKM.5": 1,
          "FCS_CKM_EXT": 4,
          "FCS_CKM_EXT.1": 12,
          "FCS_CKM_EXT.1.1": 2,
          "FCS_CKM_EXT.2": 12,
          "FCS_CKM_EXT.2.1": 2,
          "FCS_COP.1": 44,
          "FCS_COP.1.1": 4,
          "FCS_STG_EXT": 3,
          "FCS_STG_EXT.1": 13,
          "FCS_STG_EXT.1.1": 2
        },
        "FDP": {
          "FDP_CER_EXT": 5,
          "FDP_CER_EXT.1": 14,
          "FDP_CER_EXT.1.1": 2,
          "FDP_CER_EXT.1.2": 2,
          "FDP_CER_EXT.1.3": 2,
          "FDP_CER_EXT.2": 12,
          "FDP_CER_EXT.2.1": 2,
          "FDP_CER_EXT.3": 12,
          "FDP_CER_EXT.3.1": 1,
          "FDP_CRL_EXT": 3,
          "FDP_CRL_EXT.1": 12,
          "FDP_CRL_EXT.1.1": 2,
          "FDP_CSI_EXT": 3,
          "FDP_CSI_EXT.1": 16,
          "FDP_CSI_EXT.1.1": 2,
          "FDP_CSI_EXT.1.2": 2,
          "FDP_ITC.1": 5,
          "FDP_ITC.2": 5,
          "FDP_RIP.2": 14,
          "FDP_RIP.2.1": 1,
          "FDP_STG_EXT": 3,
          "FDP_STG_EXT.1": 12,
          "FDP_STG_EXT.1.1": 2
        },
        "FIA": {
          "FIA_CMC_EXT.1": 3,
          "FIA_EST_EXT.1": 3,
          "FIA_UAU.2": 5,
          "FIA_UAU.2.1": 1,
          "FIA_UID.1": 2,
          "FIA_UID.2": 6,
          "FIA_UID.2.1": 1
        },
        "FMT": {
          "FMT_MOF.1": 24,
          "FMT_MOF.1.1": 4,
          "FMT_MTD": 1,
          "FMT_MTD.1": 7,
          "FMT_MTD.1.1": 1,
          "FMT_SMF": 1,
          "FMT_SMF.1": 15,
          "FMT_SMF.1.1": 1,
          "FMT_SMR": 1,
          "FMT_SMR.1": 5,
          "FMT_SMR.2": 5,
          "FMT_SMR.2.1": 3,
          "FMT_SMR.2.2": 1,
          "FMT_SMR.2.3": 1
        },
        "FPT": {
          "FPT_FLS.1": 1,
          "FPT_SKP_EXT": 3,
          "FPT_SKP_EXT.1": 12,
          "FPT_SKP_EXT.1.1": 2,
          "FPT_STM.1": 2,
          "FPT_TST.2": 1,
          "FPT_TUD_EXT": 3,
          "FPT_TUD_EXT.1": 12,
          "FPT_TUD_EXT.1.1": 2,
          "FPT_TUD_EXT.1.2": 2,
          "FPT_TUD_EXT.1.3": 2
        },
        "FTA": {
          "FTA_SSL.3": 1,
          "FTA_SSL.4": 7,
          "FTA_SSL.4.1": 1,
          "FTA_TAB.1": 1
        },
        "FTP": {
          "FTP_ITC.1": 1,
          "FTP_TRP.1": 1,
          "FTP_TUD_EXT.1": 1
        }
      },
      "certification_process": {},
      "cipher_mode": {},
      "cplc_data": {},
      "crypto_engine": {},
      "crypto_library": {},
      "crypto_protocol": {
        "IPsec": {
          "IPsec": 1
        },
        "SSH": {
          "SSH": 2
        },
        "TLS": {
          "TLS": {
            "TLS": 9
          }
        }
      },
      "crypto_scheme": {},
      "device_model": {},
      "ecc_curve": {},
      "eval_facility": {
        "OPPIDA": {
          "OPPIDA": 1
        }
      },
      "hash_function": {},
      "ic_data_group": {},
      "javacard_api_const": {},
      "javacard_packages": {},
      "javacard_version": {},
      "os_name": {},
      "pq_crypto": {},
      "randomness": {},
      "side_channel_analysis": {},
      "standard_id": {
        "PKCS": {
          "PKCS#11": 1
        },
        "RFC": {
          "RFC 5280": 11,
          "RFC 5652": 1,
          "RFC 6960": 2
        },
        "X509": {
          "X.509": 5
        }
      },
      "symmetric_crypto": {},
      "technical_report_id": {},
      "tee_name": {},
      "tls_cipher_suite": {},
      "vendor": {},
      "vulnerability": {}
    },
    "st_metadata": {
      "/Author": "IDnomic",
      "/Category": "[Mettre \u00e0 jour la propri\u00e9t\u00e9 \"Cat\u00e9gorie\" du document pour ins\u00e9rer ici le num\u00e9ro de chrono/ref du document]",
      "/Company": "Microsoft",
      "/CreationDate": "D:20210423093956+02\u002700\u0027",
      "/Creator": "Acrobat PDFMaker 17 pour Word",
      "/MSIP_Label_e463cba9-5f6c-478d-9329-7b2295e4e8ed_ActionId": "09aba970-b117-4f0a-bebd-4540198027e9",
      "/MSIP_Label_e463cba9-5f6c-478d-9329-7b2295e4e8ed_ContentBits": "0",
      "/MSIP_Label_e463cba9-5f6c-478d-9329-7b2295e4e8ed_Enabled": "true",
      "/MSIP_Label_e463cba9-5f6c-478d-9329-7b2295e4e8ed_Method": "Standard",
      "/MSIP_Label_e463cba9-5f6c-478d-9329-7b2295e4e8ed_Name": "All Employees_2",
      "/MSIP_Label_e463cba9-5f6c-478d-9329-7b2295e4e8ed_SetDate": "2021-01-08T16:57:10Z",
      "/MSIP_Label_e463cba9-5f6c-478d-9329-7b2295e4e8ed_SiteId": "33440fc6-b7c7-412c-bb73-0e70b0198d5a",
      "/ModDate": "D:20210423094159+02\u002700\u0027",
      "/Producer": "Adobe PDF Library 17.11.238",
      "/SourceModified": "",
      "/Subject": "IDnomic ID CA",
      "/Title": "Common Criteria Security Target",
      "pdf_file_size_bytes": 1023987,
      "pdf_hyperlinks": {
        "_type": "Set",
        "elements": []
      },
      "pdf_is_encrypted": false,
      "pdf_number_of_pages": 58
    }
  },
  "protection_profiles": {
    "_type": "Set",
    "elements": []
  },
  "report_link": "https://www.commoncriteriaportal.org/files/epfiles/anssi-cc-2021_17fr.pdf",
  "scheme": "FR",
  "security_level": {
    "_type": "Set",
    "elements": [
      "EAL4+",
      "ALC_FLR.3"
    ]
  },
  "st_link": "https://www.commoncriteriaportal.org/files/epfiles/anssi-cible-2021-17en.pdf",
  "state": {
    "_type": "sec_certs.sample.cc.CCCertificate.InternalState",
    "report_convert_garbage": false,
    "report_convert_ok": true,
    "report_download_ok": true,
    "report_extract_ok": true,
    "report_pdf_hash": "080e2277524778c58ebdeeffbf38b7f8082866b4924e6d0a3867d2a33a0e3d3b",
    "report_txt_hash": "83004789d08d8073012f835ba105e965483b6f9326bf4aa3b96789367040acd7",
    "st_convert_garbage": false,
    "st_convert_ok": true,
    "st_download_ok": true,
    "st_extract_ok": true,
    "st_pdf_hash": "c0bf5b4f90559db4c7e2814af6a7605c75c960374a482392d4f869c8e6037731",
    "st_txt_hash": "1d3ffe8d0a26c11cb213f8c2fa3b3076473ea3399d6b2269f8ff527fa90b852d"
  },
  "status": "active"
}