F5BI-DM-300055 - The F5 BIG-IP appliance must prohibit the use of cached authenticators after eight hours or less.

Information

Some authentication implementations can be configured to use cached authenticators.

If cached authentication information is out-of-date, the validity of the authentication information may be questionable.

The organization-defined time period must be established for each device depending on the nature of the device; for example, a device with just a few administrators in a facility with spotty network connectivity may merit a longer caching time period than a device with many administrators.

NOTE: Nessus has not performed this check. Please review the benchmark to ensure target compliance.

Solution

From the BIG-IP GUI:
1. System.
2. Users.
3. Authentication.
4. If ClientCert LDAP is used as the remote authentication type, configure "OCSP Response Max Age" for an organization-defined time period.
Note: The OCSP Override option must be set to "on" to view the OCSP Response Max Age value.

See Also

https://dl.dod.cyber.mil/wp-content/uploads/stigs/zip/U_F5_BIG-IP_TMOS_Y25M07_STIG.zip

Item Details

Category: IDENTIFICATION AND AUTHENTICATION

References: 800-53|IA-5(13), CAT|II, CCI|CCI-002007, Rule-ID|SV-266093r1024899_rule, STIG-ID|F5BI-DM-300055, Vuln-ID|V-266093

Plugin: F5

Control ID: 4febee0285e0cc4a6f09fa11070575e2507fa2a7f2062b2c5a3c9b123fea63dd