Monterey - Set Smartcard Certificate Trust to High

Information

The macOS system _MUST_ be configured to block access to users who are no longer authorized (i.e., users with revoked certificates).

To prevent the use of untrusted certificates, the certificates on a smartcard card _MUST_ meet the following criteria: its issuer has a system-trusted certificate, the certificate is not expired, its "valid-after" date is in the past, and it passes Certificate Revocation List (CRL) and Online Certificate Status Protocol (OCSP) checking.

By setting the smartcard certificate trust level to high, the system will execute a hard revocation, i.e., a network connection is required. A verified positive response from the OSCP/CRL server is required for authentication to succeed.

NOTE: Before applying this setting, please see the smartcard supplemental guidance.

Solution

This is implemented by a Configuration Profile.

mobileconfig profile info:

com.apple.security.smartcard:
checkCertificateTrust:
3

See Also

https://github.com/usnistgov/macos_security

Item Details

Category: IDENTIFICATION AND AUTHENTICATION, SYSTEM AND COMMUNICATIONS PROTECTION

References: 800-53|IA-2(12), 800-53|IA-5(2), 800-53|IA-5(2)(b), 800-53|SC-17, CCE|CCE-90881-4, CCI|CCI-000186

Plugin: Unix

Control ID: 1c97a180881997c4f488b389adf70a73eae9a494507234800e6530690add0aa0