canmove, Confirmed users
937
edits
| Line 98: | Line 98: | ||
== Specification of Services == | == Specification of Services == | ||
Since the Crypto Officer's functions are limited to module installation and initialization, the NSS User has access to '''all''' the services. Routines have been specified for each service and denoted whether they are public services, meaning that they require no authentication to utilize, or | Since the Crypto Officer's functions are limited to module installation and initialization, the NSS User has access to '''all''' the services. Routines have been specified for each service and denoted whether they are public services, meaning that they require no authentication to utilize, or private services, meaning that authentication must be provided before the routine is utilized. This model allows a type of safety state by allowing an operator to log out (thus disallowing any access to private services) without ending the session, and then log back in to re-authenticate into private services rendered by the cryptographic module. All public and private services are listed in the following table: | ||
== Table II. Services == | == Table II. Services == | ||