Rolesandservices: Difference between revisions

Jump to navigation Jump to search
Line 98: Line 98:


== Specification of Services ==
== Specification of Services ==
Since the Crypto Officer's functions are limited to module installation and initialization, the NSS User has access to '''all''' the services. Routines have been specified for each service and denoted whether they are public services, meaning that they require no authentication to utilize, or NSS User services, meaning that authentication must be provided before the routine is utilized. This model allows a type of safety state by allowing an operator to log out (thus disallowing any access to NSS User services) without ending the session, and then log back in to re-authenticate into NSS User services rendered by the cryptographic module. All public and NSS User services are listed in the following table:
Since the Crypto Officer's functions are limited to module installation and initialization, the NSS User has access to '''all''' the services. Routines have been specified for each service and denoted whether they are public services, meaning that they require no authentication to utilize, or private services, meaning that authentication must be provided before the routine is utilized. This model allows a type of safety state by allowing an operator to log out (thus disallowing any access to private services) without ending the session, and then log back in to re-authenticate into private services rendered by the cryptographic module. All public and private services are listed in the following table:


== Table II. Services ==
== Table II. Services ==
canmove, Confirmed users
937

edits

Navigation menu