HomeAbout Us A-Z IndexSearchInquiries RegisterLoginPress Shop
Conformance Statement

Product Standard: Secure Communications Services

This form contains a series of questions that need to be answered. As you go about answering the questions, please keep the following things in mind:

Enter the name of the Organization that produced the implementation and the name of the author of the Conformance Statement.

Organization
Author


1. Secure Communications Services

Product Information

Enter the product name, version/release number, and product supplier for each product required to meet the conformance requirements.

Product IdentificationVersion/Release NumberProduct Supplier
 
 
 
 
 

Environment Specification

Product registration applies to software products operating in a specific hardware or hardware/software environment.

A product may be registered in all members of a binary-compatible family of products on the basis of a single test report.

Answer the questions for each binary-compatible family. Alternately, provide the answers in the Appendix at the end of this document.

Testing Environment Binary-compatible Family Portability Environment Indicator of Compliance Compliance Details
None.
None.
None.
None.
None.

Temporary Waivers

Enter the waiver number and expiry date for each temporary waiver granted by The Open Group.

Waiver NumberExpiry Date


1.1 Security Mechanisms

Question 1: What security mechanisms are supported?

Response

Rationale

Reference


Question 2: What is the default mechanism?

Response

Rationale

Reference


1.2 Support for the Confidentiality and Delegation Services

Question 3: Does the implementation provide Confidentiality Services?

Response

Rationale

Reference


Question 4: Does the implementation include Delegation Services?

Response

Rationale

Reference


Question 5: Does the implementation support multiple name spaces?

Response

Rationale

Reference


Question 6: If the answer to Question 5 is yes, and the name spaces are in-built rather than user definable, what are their identification details?

Response

Rationale

Reference


1.3 Credentials

Question 7: What access-control policy is applied by gss_acquire_cred()?

Response

Rationale

Reference


1.4 Security Contexts

Question 8: Does the implementation allow the gss_process_context_token() function to be used for deleting security context?

Response

Rationale

Reference


Question 9: If the answer to Question 8 is yes, in what ways does the effect of using one method vary as compared with the other? For example, is one method less secure than the other?

Response

Rationale

Reference


2. Appendix

This appendix contains additional, explanatory material that was provided by the vendor.


Copyright © 
All rights reserved.


3. Change History

DateNameComment
New

 Copyright © 1998-2002 The Open Group. All Rights Reserved.

 OSF/1, Motif, UNIX, and the "X" device are registered trademarks in the U.S. and other countries, and IT DialTone and The Open Group are trademarks of The Open Group.


[ Home ] [ Testing Home ] [ Conformance Statement Library Home ] [ Search Conformance Statements ] [ Send Feedback ]