UCF STIG Viewer Logo

The Red Hat Enterprise Linux operating system must not allow an unrestricted logon to the system.


Overview

Finding ID Version Rule ID IA Controls Severity
V-204433 RHEL-07-010450 SV-204433r877377_rule High
Description
Failure to restrict system access to authenticated users negatively impacts operating system security.
STIG Date
Red Hat Enterprise Linux 7 Security Technical Implementation Guide 2022-12-06

Details

Check Text ( C-4557r88491_chk )
Verify the operating system does not allow an unrestricted logon to the system via a graphical user interface.

Note: If the system does not have GNOME installed, this requirement is Not Applicable.

Check for the value of the "TimedLoginEnable" parameter in "/etc/gdm/custom.conf" file with the following command:

# grep -i timedloginenable /etc/gdm/custom.conf
TimedLoginEnable=false

If the value of "TimedLoginEnable" is not set to "false", this is a finding.
Fix Text (F-4557r88492_fix)
Configure the operating system to not allow an unrestricted account to log on to the system via a graphical user interface.

Note: If the system does not have GNOME installed, this requirement is Not Applicable.

Add or edit the line for the "TimedLoginEnable" parameter in the [daemon] section of the "/etc/gdm/custom.conf" file to "false":

[daemon]
TimedLoginEnable=false