Security Policy: Difference between revisions

Jump to navigation Jump to search
no edit summary
No edit summary
No edit summary
Line 336: Line 336:


An NSS User has access to all services of the module and all keys stored in the data base.
An NSS User has access to all services of the module and all keys stored in the data base.
The NSS cryptographic module does not have a Maintenance Role.


==Authentication Policy==
==Authentication Policy==
Line 353: Line 355:


After each failed authentication attempt in FIPS mode, the NSS cryptographic module inserts a one-second delay before returning to the caller, allowing at most 60 authentication attempts during a one-minute period. Therefore, the probability of a successful random guess of the password during a one-minute period is < 60 * 1/10,000,000 = 0.6 * (1/100,000).
After each failed authentication attempt in FIPS mode, the NSS cryptographic module inserts a one-second delay before returning to the caller, allowing at most 60 authentication attempts during a one-minute period. Therefore, the probability of a successful random guess of the password during a one-minute period is < 60 * 1/10,000,000 = 0.6 * (1/100,000).
==Specification of Maintenance Roles==
This section is not applicable to the NSS cryptographic module since it does not have a Maintenance Role.


==Multiple Concurrent Operator Roles and Services==
==Multiple Concurrent Operator Roles and Services==
canmove, Confirmed users
937

edits

Navigation menu