UCF STIG Viewer Logo

The vAMI must use a site-defined, user management system to uniquely identify and authenticate users (or processes acting on behalf of organizational users).


Overview

Finding ID Version Rule ID IA Controls Severity
V-240939 VRAU-VA-000195 SV-240939r879589_rule Medium
Description
To assure accountability and prevent unauthorized access, application server users must be uniquely identified and authenticated. This is typically accomplished via the use of a user store which is either local (OS-based) or centralized (LDAP) in nature. To ensure support to the enterprise, the authentication must utilize an enterprise solution.
STIG Date
VMware vRealize Automation 7.x vAMI Security Technical Implementation Guide 2023-09-12

Details

Check Text ( C-44172r675982_chk )
Interview the ISSO and/or the SA.

Determine the enterprise user management system being used to uniquely identify and authenticate users.

If the vAMI is not configured to use the enterprise user management system, this is a finding.
Fix Text (F-44131r675983_fix)
Consult the appropriate VMware technical guide to implement the site-specific enterprise user management system.