VCTR-67-000061 - The vCenter Server must disable Password and Windows integrated authentication.

Warning! Audit Deprecated

This audit has been deprecated and will be removed in a future update.

View Next Audit Version

Information

All forms of authentication other than CAC must be disabled. Password authentication can be temporarily re-enabled for emergency access to the local SSO domain accounts but it must be disable as soon as CAC authentication is functional.

NOTE: Nessus has not performed this check. Please review the benchmark to ensure target compliance.

Solution

From the vSphere Client go to Administration >> Single Sign-On >> Configuration >> Smart Card Authentication. Next to 'Authentication methods', click 'Edit'. Click the 'Enable smart card authentication' radio button and click 'Save'.

To re-enable password authentication for troubleshooting purposes, run the following command on the vCenter server:

/opt/vmware/bin/sso-config.sh -set_authn_policy -pwdAuthn true -winAuthn false -certAuthn false -securIDAuthn false -t vsphere.local

See Also

https://dl.dod.cyber.mil/wp-content/uploads/stigs/zip/U_VMW_vSphere_6-7_Y22M10_STIG.zip

Item Details

References: CAT|II, CCI|CCI-000366, Rule-ID|SV-243116r719591_rule, STIG-ID|VCTR-67-000061, Vuln-ID|V-243116

Plugin: VMware

Control ID: ac51bd3416844579e1f6f14f741e627e905479b15f2977c6dda572b4dca41d6d