UCF STIG Viewer Logo

The operating system, for PKI-based authentication must map the authenticated identity to the user account.


Overview

Finding ID Version Rule ID IA Controls Severity
V-29098 SRG-OS-000068 SV-37091r1_rule Medium
Description
The cornerstone of the PKI is the private key used to encrypt or digitally sign information. The key by itself is a cryptographic value that does not contain specific user information. The authenticated identity must be mapped to an account for access and authorization decisions.
STIG Date
Operating System Security Requirements Guide 2013-03-28

Details

Check Text ( None )
None
Fix Text (None)
None