VCTR-67-000060 - The vCenter Server must enable revocation checking for certificate-based authentication.

Warning! Audit Deprecated

This audit has been deprecated and will be removed in a future update.

View Next Audit Version

Information

The system must establish the validity of the user-supplied identity certificate using OCSP and/or CRL revocation checking.

NOTE: Nessus has not performed this check. Please review the benchmark to ensure target compliance.

Solution

From the vSphere Client, go to Administration >> Single Sign-On > Configuration >> Smart Card Authentication.

Under Smart card authentication settings >> Certificate revocation, click the 'Edit' button.

By default, the PSC will use the CRL from the certificate to check revocation check status.

OCSP with CRL fallback is recommended, but this setting is site specific and should be configured appropriately.

See Also

https://dl.dod.cyber.mil/wp-content/uploads/stigs/zip/U_VMW_vSphere_6-7_Y22M04_STIG.zip

Item Details

References: CAT|II, CCI|CCI-000366, Rule-ID|SV-243115r719588_rule, STIG-ID|VCTR-67-000060, Vuln-ID|V-243115

Plugin: VMware

Control ID: 00ea36fb82c6f4906dc3993653e21d60ce5ec6bc57124fce1c1756954f3ab56f