VCTR-67-000069 - The vCenter Server must use a limited privilege account when adding an LDAP identity source.

Information

When adding an LDAP identity source to vSphere SSO, the account used to bind to AD must be minimally privileged. This account only requires read rights to the base DN specified. Any other permissions inside or outside of that OU are unnecessary and violate least privilege.

NOTE: Nessus has not performed this check. Please review the benchmark to ensure target compliance.

Solution

From the vSphere Client, go to Administration >> Single Sign-On >> Configuration.

Click the 'Identity Sources' tab.

For each identity source that has been configured with a highly privileged AD account, highlight the item and click 'Edit'.

Change the username and password to one with read-only rights to the base DN and complete the dialog.

See Also

https://dl.dod.cyber.mil/wp-content/uploads/stigs/zip/U_VMW_vSphere_6-7_Y23M07_STIG.zip

Item Details

Category: CONFIGURATION MANAGEMENT

References: 800-53|CM-6b., CAT|II, CCI|CCI-000366, Rule-ID|SV-243124r879887_rule, STIG-ID|VCTR-67-000069, Vuln-ID|V-243124

Plugin: VMware

Control ID: 7230c326ccca493225fc02b8d9b7fc7b547234673ffb55fbbcd43ecad19a2b4d