[Doc] Exceptions for LDAP SSL/TLS checks

The current version of the RHEL 7 STIG refers to pam_ldap, which is no
longer recommended as the method for authenticating to LDAP servers.
This patch adds exception documentation that explains sssd to deployers
and provides configuration advice.

Altering these values via programmatic methods could take an entire
environment offline.

Implements: blueprint security-rhel7-stig
Change-Id: If410d477590f8cb53f279396ba4edf63c5222b78
This commit is contained in:
Major Hayden 2016-11-15 11:03:37 -06:00
parent 3c0cc41969
commit 1435ce5d17
3 changed files with 47 additions and 9 deletions

View File

@ -1,7 +1,13 @@
---
id: RHEL-07-040180
status: not implemented
tag: misc
status: exception - manual intervention
tag: auth
---
This STIG requirement is not yet implemented.
Deployers are strongly urged to utilize ``sssd`` for systems that authenticate
against LDAP or Active Directory (AD) servers.
The ldap connector for ``sssd`` connects only to LDAP servers over
encrypted connections. Review the man page for
`sssd-ldap <https://linux.die.net/man/5/sssd-ldap>`_ for more details on this
requirement.

View File

@ -1,7 +1,23 @@
---
id: RHEL-07-040181
status: not implemented
tag: misc
status: exception - manual intervention
tag: auth
---
This STIG requirement is not yet implemented.
Deployers are strongly urged to utilize ``sssd`` for systems that authenticate
against LDAP or Active Directory (AD) servers.
To meet this control, deployers must ensure that ``ldap_tls_cacert`` or
``ldap_tls_cacertdir`` are set in the ``/etc/sssd/sssd.conf`` file. The
``ldap_tls_cacert`` directive specifies a single certificate while
``ldap_tls_cacertdir`` specifies a directory where ``sssd`` can find CA
certificates.
.. warning::
Use caution when adjusting these settings. If the correct CA certificates
are not already deployed to the servers that perform LDAP authentication,
their attempts to authenticate users might fail.
Consult with administrators of the LDAP system and test all changes on
a non-production system first.

View File

@ -1,7 +1,23 @@
---
id: RHEL-07-040182
status: not implemented
tag: misc
status: exception - manual intervention
tag: auth
---
This STIG requirement is not yet implemented.
Deployers are strongly urged to utilize ``sssd`` for systems that authenticate
against LDAP or Active Directory (AD) servers.
To meet this control, deployers must ensure that ``ldap_tls_cacert`` or
``ldap_tls_cacertdir`` are set in the ``/etc/sssd/sssd.conf`` file. The
``ldap_tls_cacert`` directive specifies a single certificate while
``ldap_tls_cacertdir`` specifies a directory where ``sssd`` can find CA
certificates.
.. warning::
Use caution when adjusting these settings. If the correct CA certificates
are not already deployed to the servers that perform LDAP authentication,
their attempts to authenticate users might fail.
Consult with administrators of the LDAP system and test all changes on
a non-production system first.