canmove, Confirmed users
937
edits
Line 27: | Line 27: | ||
| 3 || The cryptographic module shall support the NSS User Role and the Crypto Officer Role. | | 3 || The cryptographic module shall support the NSS User Role and the Crypto Officer Role. | ||
|- | |- | ||
| 4 || A cryptographic module user shall have access to | | 4 || A cryptographic module user shall have access to '''all''' the services supplied by the cryptographic module. | ||
|- | |- | ||
| 5 || Cryptographic module services shall consist of public services, which require no authentication, and private services, which require authentication. Public services (e.g., random number generation) do not require access to the secret and private keys and other CSPs associated with the user. | | 5 || Cryptographic module services shall consist of public services, which require no authentication, and private services, which require authentication. Public services (e.g., random number generation) do not require access to the secret and private keys and other CSPs associated with the user. |