16 Documentation
RSA BSAFE Cert-J 6.2.4 Release Notes
Documentation
The Cert-J documentation suite includes:
• This document, the RSA BSAFE Cert-J Release Notes, in Portable Document
Format (PDF), with the latest information on Cert-J.
• RSA BSAFE Cert-J Installation Guide, in PDF, with instructions on how to install
and build Cert-J.
• RSA BSAFE Cert-J Security Policy, in PDF, which describes how Cert-J uses the
RSA BSAFE JSAFE and JCE Software Module, and how to operate Cert-J in a
manner consistent with the requirements of the cryptographic module.
• RSA BSAFE Cert-J Third Party Licenses, in PDF, with license information for
third-party products included with Cert-J.
• RSA BSAFE Cert-J Troubleshooting Guide, in PDF, with information and
instructions for troubleshooting common issues with Cert-J.
• RSA BSAFE Cert-J Developers Guide, in HTML format, with information and
instructions on how to develop applications that integrate Cert-J.
• RSA BSAFE Cert-J to Crypto-J Migration Guide, in HTML, which compares the
Cert-J toolkit and the RSA BSAFE Crypto-J 6.2.4 or newer (Crypto-J) toolkit, to
assist with the changes required to migrate applications between Cert-J 6.x and
Crypto-J.
• Related product documentation consisting of:
– RSA BSAFE Crypto-C Micro Edition 4.1 Security Policy documents, Level 1
and Level 2, in PDF, which describe how the Crypto-C ME Cryptographic
Module meets the Level 1 security requirements of FIPS 140-2, the Level 2
security requirements of FIPS 140-2 for Roles, Authentication and Services,
Level 3 security requirements for Design Assurance, and how to securely
operate it.
– RSA BSAFE Crypto-J FIPS Compliance Guide, in PDF, which describes how
Crypto-J uses the Crypto-J JSAFE and JCE Software Module, and how to
operate Crypto-J in a manner consistent with the requirements of the
cryptographic module.
– RSA BSAFE Crypto-J Release Notes, in PDF, with the latest information on
Crypto-J.
– RSA BSAFE Crypto-J JSAFE and JCE Software Module Security Policy
documents, Level 1 and Level 2, in PDF, which describes how the Crypto-J
JSAFE and JCE Software Module meets the Level 1 security requirements of
FIPS 140-2, the Level 2 security requirements of FIPS 140-2 for Roles,
Authentication and Services, the Level 3 security requirements for Design
Assurance, and how to securely operate it.