Monterey - Set Smartcard Certificate Trust to Moderate

Information

The macOS system _MUST_ be configured to block access to users who are no longer authorized (i.e., users with revoked certificates).

To prevent the use of untrusted certificates, the certificates on a smartcard card _MUST_ meet the following criteria: its issuer has a system-trusted certificate, the certificate is not expired, its "valid-after" date is in the past, and it passes Certificate Revocation List (CRL) and Online Certificate Status Protocol (OCSP) checking.

By setting the smartcard certificate trust level to moderate, the system will execute a soft revocation, i.e., if the OCSP/CRL server is unreachable, authentication will still succeed.

NOTE: Before applying this setting, please see the smartcard supplemental guidance.

Solution

This is implemented by a Configuration Profile.

mobileconfig profile info:

com.apple.security.smartcard:
checkCertificateTrust:
2

See Also

https://github.com/usnistgov/macos_security

Item Details

Category: IDENTIFICATION AND AUTHENTICATION, SYSTEM AND COMMUNICATIONS PROTECTION

References: 800-53|IA-2(12), 800-53|IA-5(2), 800-53|IA-5(2)(b), 800-53|IA-5(2)(d), 800-53|SC-17, 800-53|SC-23(5), CCE|CCE-90882-2, CCI|CCI-000186, CCI|CCI-001953, CCI|CCI-001954, CCI|CCI-001991, CCI|CCI-002470

Plugin: Unix

Control ID: fc8fff4b44ecfc3b659b3768b7a0e4d3b60b8beb2a636efb3052bb7cdcb313df