UCF STIG Viewer Logo
Changes are coming to https://stigviewer.com. Take our survey to help us understand your usage and how we can better serve you in the future.
Take Survey

The storage system must only be operated in conjunction with an LDAP server in a trusted environment if an Active Directory server is not available.


Overview

Finding ID Version Rule ID IA Controls Severity
V-70503 HP3P-32-001503 SV-85125r1_rule High
Description
Where strong account and password management capabilities are required, the 3PAR system is heavily dependent on its ability to use an LDAP server. Satisfies: SRG-OS-000001-GPOS-00001, SRG-OS-000104-GPOS-00051, SRG-OS-000480-GPOS-00227
STIG Date
HPE 3PAR StoreServ 3.2.x Security Technical Implementation Guide 2017-01-06

Details

Check Text ( C-70903r1_chk )
Determine if the system is configured for LDAP.

Enter the following command:

cli% showauthparam

If the output indicates an error, this is a finding.

If the resulting output does not include group parameters "groups-dn", "group-obj", or "group-name-attr" then the host is configured to use Active Directory and this requirement is not applicable.

If the host is using LDAP and the following fields of the output are not configured, this is a finding.

ldap-server
ldap-server-hn

Next, verify that the LDAP authentication is operational by entering the following command:

cli% checkpassword
password:

If the username and password used in "checkpassword" are known to be valid LDAP credentials, and the following text is NOT displayed at the end of the resulting output, this is a finding.

user is authenticated and authorized

Note: The "checkpassword" command will not display authenticated information even if LDAP is properly configured, if the username and password are not entered correctly.
Fix Text (F-76741r1_fix)
Use this series of commands to configure LDAP.

cli% setauthparam -f ldap-server
cli% setauthparam -f ldap-server-hn
cli% setauthparam -f binding simple
cli% setauthparam -f ldap-StartTLS require
cli% setauthparam -f groups-dn ou=Groups,dc=thisdomain,dc=com
cli% setauthparam -f user-dn-base ou=People,dc=thisdomain,dc=com
cli% setauthparam -f user-attr uid
cli% setauthparam -f group-obj groupofuniquenames
cli% setauthparam -f group-name-attr cn
cli% setauthparam -f member-attr uniqueMember
cli% setauthparam -f browse-map "*"
cli% setauthparam -f edit-map
cli% setauthparam -f service-map
cli% setauthparam -f super-map