Security Policy: Difference between revisions

Jump to navigation Jump to search
m
Line 410: Line 410:
The Crypto Officer role is assumed implicitly during installation of the module. The NSS User role is entered by authenticating, or logging in, to the module. Some services require the user to assume the NSS User role. Other services do not impose any role requirement.
The Crypto Officer role is assumed implicitly during installation of the module. The NSS User role is entered by authenticating, or logging in, to the module. Some services require the user to assume the NSS User role. Other services do not impose any role requirement.


Each service is provided by a PKCS #11 function.  The following table lists the defined services and correlates role, service type and access to security-relavant information. Access type is Read/Write/Zeroize.
Each service is provided by a PKCS #11 function.  The following table lists the defined services and correlates role, service type and type of access to security-relavant information. Access type is Read/Write/Zeroize.


<table border="1">
<table border="1">
198

edits

Navigation menu