WBSP-AS-001260 - The WebSphere Application Server must use signer for DoD-issued certificates.

Information

The cornerstone of PKI is the private key used to encrypt or digitally sign information. The key by itself is a cryptographic value that does not contain specific user information, but the key can be mapped to a user. Without mapping the certificate used to authenticate to the user account, the ability to determine the identity of the individual user or group will not be available for forensic analysis.

Application servers must provide the capability to utilize and meet requirements of the DoD Enterprise PKI infrastructure for application authentication.

NOTE: Nessus has not performed this check. Please review the benchmark to ensure target compliance.

Solution

Obtain the signer certificate either as Base 64 encoded ASCII file, or as binary DER data.

Navigate to Security >> SSl certificate and key management >> SSL Configurations >> CellDefaultSSLSettings >> key stores and certificates.

Click on cell default trust store.

Click on 'Signer Certificates'.

Click 'Add'.

Enter a new alias for the signer, and the location of the file that stores signer certificate.

For 'Data type', choose the type appropriate for the file, either Base64-encoded ASCII data file, or binary DER data.

Click 'OK'.

See Also

http://iasecontent.disa.mil/stigs/zip/U_IBM_WebSphere_Traditional_V9-x_V1R1_STIG.zip

Item Details

Category: IDENTIFICATION AND AUTHENTICATION

References: 800-53|IA-5(2)(c), CAT|II, CCI|CCI-000187, Rule-ID|SV-96075r1_rule, STIG-ID|WBSP-AS-001260, Vuln-ID|V-81361

Plugin: Unix

Control ID: fc44e6aa69be379c3187ccd45650afb7fa7c38426f8ff5ea6216b0b139adf9e8