UCF STIG Viewer Logo

Unattended or automatic logon via the OL 8 graphical user interface must not be allowed.


Overview

Finding ID Version Rule ID IA Controls Severity
V-248649 OL08-00-010820 SV-248649r877377_rule High
Description
Failure to restrict system access to authenticated users negatively impacts operating system security.
STIG Date
Oracle Linux 8 Security Technical Implementation Guide 2022-12-06

Details

Check Text ( C-52083r779511_chk )
Note: This requirement assumes the use of the OL 8 default graphical user interface, Gnome Shell. If the system does not have any graphical user interface installed, this requirement is Not Applicable.

Verify the operating system does not allow an unattended or automatic logon to the system via a graphical user interface.

Check for the value of "AutomaticLoginEnable" in the "/etc/gdm/custom.conf" file with the following command:

$ sudo grep -i automaticloginenable /etc/gdm/custom.conf

AutomaticLoginEnable=false

If the value of "AutomaticLoginEnable" is not set to "false", this is a finding.
Fix Text (F-52037r779512_fix)
Configure OL 8 to not allow an unattended or automatic logon to the system via a graphical user interface.

Add or edit the line for the "AutomaticLoginEnable" parameter in the [daemon] section of the "/etc/gdm/custom.conf" file to "false":

[daemon]
AutomaticLoginEnable=false