ESXI-65-100037 - The ESXi host must require individuals to be authenticated with an individual authenticator prior to using a group authenticator by using Active Directory for local user authentication.

Information

Join ESXi hosts to an Active Directory (AD) domain to eliminate the need to create and maintain multiple local user accounts. Using AD for user authentication simplifies the ESXi host configuration, ensures password complexity and reuse policies are enforced and reduces the risk of security breaches and unauthorized access. Note: If the AD group 'ESX Admins' (default) exists then all users and groups that are assigned as members to this group will have full administrative access to all ESXi hosts the domain.

NOTE: Nessus has not performed this check. Please review the benchmark to ensure target compliance.

Solution

From the vSphere Client select the ESXi host and go to Configuration >> Authentication Services. Click 'Properties' and change the 'Directory Service Type' to 'Active Directory', enter the domain to join, check 'Use vSphere Authentication Proxy' and enter the proxy server address then click 'Join Domain'.

or

From a PowerCLI command prompt while connected to the ESXi host run the following command:

Get-VMHost | Get-VMHostAuthentication | Set-VMHostAuthentication -JoinDomain -Domain 'domain name' -User 'username' -Password 'password'

See Also

https://dl.dod.cyber.mil/wp-content/uploads/stigs/zip/U_VMW_vSphere_6-5_Y21M10_STIG.zip

Item Details

Category: IDENTIFICATION AND AUTHENTICATION

References: 800-53|IA-2(5), CAT|III, CCI|CCI-000770, Rule-ID|SV-207675r378862_rule, STIG-ID|ESXI-65-100037, STIG-Legacy|SV-104335, STIG-Legacy|V-94505, Vuln-ID|V-207675

Plugin: VMware

Control ID: 23f117cad72e5ff3ac43e44d7be79bc9e2ae8ab2a279aac1ad371c8cee60c95f