UBTU-20-010441 - The Ubuntu operating system must be configured such that Pluggable Authentication Module (PAM) prohibits the use of cached authentications after one day.

Information

If cached authentication information is out-of-date, the validity of the authentication information may be questionable.

Solution

Configure PAM to prohibit the use of cached authentications after one day. Add or change the following line in "/etc/sssd/sssd.conf" just below the line "[pam]":

offline_credentials_expiration = 1

Note: It is valid for this configuration to be in a file with a name that ends with ".conf" and does not begin with a "." in the "/etc/sssd/conf.d/" directory instead of the "/etc/sssd/sssd.conf" file.

See Also

https://dl.dod.cyber.mil/wp-content/uploads/stigs/zip/U_CAN_Ubuntu_20-04_LTS_V2R2_STIG.zip

Item Details

Category: IDENTIFICATION AND AUTHENTICATION

References: 800-53|IA-5(13), CAT|III, CCI|CCI-002007, Rule-ID|SV-238362r958828_rule, STIG-ID|UBTU-20-010441, Vuln-ID|V-238362

Plugin: Unix

Control ID: 87fca7f0ba76f0af53a3db812d135119ef7d5db22badb20c48c2716771fc7a24