{"product_id":3037,"v_id":3037,"product_name":"Computer Associates eTrust® Admin Version 8.0 with CAM v1.11 patch ","certification_status":"Not Certified","certification_date":"2006-02-03T00:02:00Z","tech_type":"System Access Control","vendor_id":{"name":"CA Technologies","website":"www.ca.com"},"vendor_poc":"William F. Clark","vendor_phone":"703-708-3501","vendor_email":"william.clark@ca.com","assigned_lab":{"cctl_name":"CygnaCom Solutions, Inc"},"product_description":"<p>The <em>e</em>Trust Admin product consists of an <em>e</em>Trust Admin Server, Administrator Interface, Web-based Interface, and <em>e</em>Trust Directory.  Briefly, the TOE includes the <em>e</em>Trust Admin Server software, the Administrator Interface, and the Web-based Interface.  The <em>e</em>Trust Directory and the Windows 2000 OS, upon which the <em>e</em>Trust Admin Server runs, are included in the IT Environment.  </p>\r\n<p>The TOE is a software-only TOE which consists of:</p>\r\n<ul>\r\n    <li><em>e</em>Trust Admin Server, which implements all evaluated security functionality </li>\r\n    <li>Administrator Interface CLI/GUI (i.e.: Manager and Batch Utility) and </li>\r\n    <li>Admin Web-based Interface software.  </li>\r\n</ul>\r\n<p>The TOE includes <em>e</em>Trust Admin Options (part of <em>e</em>Trust Admin Server) to communicate with managed systems.  Only the Windows OS option was tested during the evaluation.  </p>\r\n<p><em>e</em>Trust Admin provides the following security features:</p>\r\n<ul>\r\n    <li>Security audit </li>\r\n    <li>Identification and authentication (I&amp;A) </li>\r\n    <li>Security management </li>\r\n</ul>","evaluation_configuration":null,"security_evaluation_summary":"<p>The evaluation was carried out in accordance to the Common Criteria Evaluation and Validation Scheme (CCEVS) processes and procedures.  The TOE was evaluated against the criteria contained in the Common Criteria for Information Technology Security Evaluation, Version 2.2.  The evaluation methodology used by the evaluation team to conduct the evaluation is the Common Methodology for Information Technology Security Evaluation, Version 2.2. CygnaCom Solutions has determined that the product meets the security criteria in the Security Target, which specifies an assurance level of EAL 2.</p>\r\n<p>A validator, on behalf of the CCEVS Validation Body, monitored the evaluation.  The evaluation was completed in November 2005.</p>\r\n<h3 align=\"center\">Test Configuration for Evaluation</h3>\r\n<div align=\"center\">\r\n<table width=\"\" cellspacing=\"0\" cellpadding=\"6\" border=\"1\" align=\"\" style=\"font-size: 95%;\" summary=\"\">\r\n    <tbody>\r\n        <tr>\r\n            <td valign=\"top\"> \t\t\t\t<strong>TOE Component</strong> \t\t\t</td>\r\n            <td valign=\"top\"> \t\t\t\t<strong><em>e</em>Trust Admin Server 8.0</strong> \t\t\t</td>\r\n            <td valign=\"top\"> \t\t\t\t<strong><em>e</em>Trust Admin Manager</strong> \t\t\t</td>\r\n            <td valign=\"top\"> \t\t\t\t<strong><em>e</em>Trust Admin Web Server 8.0</strong><br />\r\n            <strong><em>e</em>Trust Admin Web Interface 8.0</strong><br />\r\n            <strong><em>e</em>Trust Admin Workflow Web Interface 8.0</strong> \t\t\t</td>\r\n        </tr>\r\n        <tr>\r\n            <td> \t\t\t\t<strong>Operating System</strong> \t\t\t</td>\r\n            <td> \t\t\t\tMicrosoft Windows 2000, Service Pack 4 \t\t\t</td>\r\n            <td> \t\t\t\tMicrosoft Windows XP, Service Pack 2 \t\t\t</td>\r\n            <td> \t\t\t\tMicrosoft Windows 2000, Service Pack 4 \t\t\t</td>\r\n        </tr>\r\n        <tr>\r\n            <td> \t\t\t<strong>Other Software</strong> \t\t\t</td>\r\n            <td> \t\t\t\teTrust Directory 4.1 Build 175<br />\r\n            Java Runtime Environments JRE 1.3.1 and JRE 1.4.1<br />\r\n            </td>\r\n            <td> \t\t\t\tNONE \t\t\t</td>\r\n            <td> \t\t\t\tMicrosoft IIS Version 5.0<br />\r\n            JRUN 4.0<br />\r\n            eTrust Directory 4.1 Build 175<br />\r\n            Java Runtime Environments JRE 1.3.1 and JRE 1.4.1 \t\t\t</td>\r\n        </tr>\r\n        <tr>\r\n            <td> \t\t\t\t\t<strong>Hardware</strong> \t\t\t\t</td>\r\n            <td> \t\t\t\t\tPentium 1 GHz Processor<br />\r\n            128 MB Memory<br />\r\n            300 MB Disk Space \t\t\t\t</td>\r\n            <td> \t\t\t\t\tPentium 1 GHz Processor<br />\r\n            256 MB Memory<br />\r\n            100 MB Disk Space \t\t\t\t</td>\r\n            <td> \t\t\t\t\tPentium 1 GHz Processor<br />\r\n            256 MB Memory<br />\r\n            1000 MB Disk Space \t\t\t\t</td>\r\n        </tr>\r\n    </tbody>\r\n</table>\r\n</div>","environmental_strengths":"<p>The TOE provides the following security functionality: security audit, identification and authentication, secure management, and partial protection of the TOE security functions.  </p>\r\n<p>The main security service provided by <em>e</em>Trust Admin is enablement of user life-cycle management across disparate systems, applications, physical resources, and Web services. Based on user roles, <em>e</em>Trust Admin automatically creates, modifies, and deletes user accounts on multiple, heterogeneous systems or applications. It integrates with human resources systems to achieve completely automated user account management.</p>","features":[]}