OL08-00-010400 - OL 8 must implement certificate status checking for multifactor authentication.

Warning! Audit Deprecated

This audit has been deprecated and will be removed in a future update.

View Next Audit Version


Using an authentication device, such as a DoD Common Access Card (CAC) or token that is separate from the information system, ensures that even if the information system is compromised, credentials stored on the authentication device will not be affected.

Multifactor solutions that require devices separate from information systems gaining access include, for example, hardware tokens providing time-based or challenge-response authenticators and smart cards such as the U.S. Government Personal Identity Verification (PIV) card and the DoD CAC.

OL 8 includes multiple options for configuring certificate status checking but for this requirement focuses on the system security services daemon (sssd). By default, sssd performs Online Certificate Status Protocol (OCSP) checking and certificate verification using a sha256 digest function.

Satisfies: SRG-OS-000375-GPOS-00160, SRG-OS-000377-GPOS-00162


Configure OL 8 to implement certificate status checking for multifactor authentication.

Review the '/etc/sssd/sssd.conf' file to determine if the system is configured to prevent OCSP or certificate verification.

Add the following line to the [sssd] section of the '/etc/sssd/sssd.conf' file:

certificate_verification = ocsp_dgst=sha1

The 'sssd' service must be restarted for the changes to take effect. To restart the 'sssd' service, run the following command:

$ sudo systemctl restart sssd.service

See Also


Item Details

References: CAT|II, CCI|CCI-001948, CCI|CCI-001954, Rule-ID|SV-248587r860917_rule, STIG-ID|OL08-00-010400, Vuln-ID|V-248587

Plugin: Unix

Control ID: 7746a39ce961617bc6a472b952a99b98c0b110f6028b6035019f797b843629b5