The vCenter Server must disable Username/Password and Windows Integrated Authentication.
Overview
| Finding ID | Version | Rule ID | IA Controls | Severity |
| V-258950 | VCSA-80-000283 | SV-258950r961863_rule | CCI-000366 | medium |
| Description | ||||
| All forms of authentication other than Common Access Card (CAC) must be disabled. Password authentication can be temporarily reenabled for emergency access to the local Single Sign-On (SSO) accounts or Active Directory user/pass accounts, but it must be disabled as soon as CAC authentication is functional. | ||||
| STIG | Date | |||
| VMware vSphere 8.0 vCenter Security Technical Implementation Guide | 2025-06-09 | |||
Details
Check Text (C-258950r961863_chk)
If a federated identity provider is configured and used for an identity source, this is not applicable.
From the vSphere Client, go to Administration >> Single Sign On >> Configuration >> Identity Provider >> Smart Card Authentication.
Under "Authentication method", examine the allowed methods.
If "Smart card authentication" is not enabled and "Password and windows session authentication" is not disabled, this is a finding.
Fix Text (F-62599r934507_fix)
From the vSphere Client, go to Administration >> Single Sign On >> Configuration >> Identity Provider >> Smart Card Authentication.
Next to "Authentication method", click "Edit".
Select to radio button to "Enable smart card authentication".
Click "Save".
To re-enable password authentication for troubleshooting purposes, run the following command on the vCenter Server Appliance:
# /opt/vmware/bin/sso-config.sh -set_authn_policy -pwdAuthn true -winAuthn false -certAuthn false -securIDAuthn false -t vsphere.local