UBTU-20-010441 - The Ubuntu operating system must be configured such that Pluggable Authentication Module (PAM) prohibits the use of cached authentications after one day.

Information

If cached authentication information is out-of-date, the validity of the authentication information may be questionable.

Solution

Configure PAM to prohibit the use of cached authentications after one day. Add or change the following line in '/etc/sssd/sssd.conf' just below the line '[pam]':

offline_credentials_expiration = 1

Note: It is valid for this configuration to be in a file with a name that ends with '.conf' and does not begin with a '.' in the '/etc/sssd/conf.d/' directory instead of the '/etc/sssd/sssd.conf' file.

See Also

https://dl.dod.cyber.mil/wp-content/uploads/stigs/zip/U_CAN_Ubuntu_20-04_LTS_V1R10_STIG.zip

Item Details

Category: IDENTIFICATION AND AUTHENTICATION

References: 800-53|IA-5(13), CAT|III, CCI|CCI-002007, Rule-ID|SV-238362r853437_rule, STIG-ID|UBTU-20-010441, Vuln-ID|V-238362

Plugin: Unix

Control ID: 0d5d71b634134fa573aa5760d29b796a8815a51055623b2557f9108a799eef92