2.2.26 Ensure ldap_tls_cacert is set for LDAP - file

Information

The operating system must implement cryptography to protect the integrity of Lightweight Directory Access Protocol (LDAP) communications is set for ldap_tls_cacert.

Rationale:

Without cryptographic integrity protections, information can be altered by unauthorized users without detection.

Cryptographic mechanisms used for protecting the integrity of information include, for example, signed hash functions using asymmetric cryptography enabling distribution of the public key to verify the hash information while maintaining the confidentiality of the key used to generate the hash.

Solution

Configure the operating system to implement cryptography to protect the integrity of LDAP remote access sessions.
Add or modify the following line in /etc/sssd/sssd.conf:
Example: vim /etc/sssd/sssd.conf
Add, uncomment or update the following line:

ldap_tls_cacert = /etc/pki/tls/certs/ca-bundle.crt

Notes:

This Benchmark recommendation maps to:

Red Hat Enterprise Linux 7 Security Technical Implementation Guide:

Version 2, Release: 3 Benchmark Date: 26 Apr 2019



Vul ID: V-72231

Rule ID: SV-86855r3_rule

STIG ID: RHEL-07-040200

Severity: CAT II

See Also

https://workbench.cisecurity.org/files/2688

Item Details

Category: SYSTEM AND INFORMATION INTEGRITY

References: 800-53|SI-4, CSCv7|9.2

Plugin: Unix

Control ID: e345e455bb3952fc8ecb0d153411f0aac58314e504e7de7dca6e5b30ca435012