F5BI-DM-000101 - The BIG-IP appliance must be configured to ensure administrators are authenticated with an individual authenticator prior to using a group authenticator.

Warning! Audit Deprecated

This audit has been deprecated and will be removed in a future update.

View Next Audit Version


To assure individual accountability and prevent unauthorized access, administrators must be individually identified and authenticated.

Individual accountability mandates that each administrator is uniquely identified. A group authenticator is a shared account or some other form of authentication that allows multiple unique individuals to access the network device using a single account.

If a device allows or provides for group authenticators, it must first individually authenticate administrators prior to implementing group authenticator functionality.

Some devices may not have the need to provide a group authenticator; this is considered a matter of device design. In those instances where the device design includes the use of a group authenticator, this requirement will apply. This requirement applies to accounts created and managed on or by the network device.

NOTE: Nessus has provided the target output to assist in reviewing the benchmark to ensure target compliance.


Configure the BIG-IP appliance to authenticate administrators with an individual authenticator prior to using a group authenticator.

See Also


Item Details

References: CAT|II, CCI|CCI-000770, Rule-ID|SV-217397r879594_rule, STIG-ID|F5BI-DM-000101, STIG-Legacy|SV-74575, STIG-Legacy|V-60145, Vuln-ID|V-217397

Plugin: F5

Control ID: 9449d220317fb5b8818260cd1abd9646c3a905cf2ce353628a14e5800268a63a