[Doc] Exceptions for LDAP SSL/TLS checks
The current version of the RHEL 7 STIG refers to pam_ldap, which is no longer recommended as the method for authenticating to LDAP servers. This patch adds exception documentation that explains sssd to deployers and provides configuration advice. Altering these values via programmatic methods could take an entire environment offline. Implements: blueprint security-rhel7-stig Change-Id: If410d477590f8cb53f279396ba4edf63c5222b78
This commit is contained in:
parent
3c0cc41969
commit
1435ce5d17
@ -1,7 +1,13 @@
|
||||
---
|
||||
id: RHEL-07-040180
|
||||
status: not implemented
|
||||
tag: misc
|
||||
status: exception - manual intervention
|
||||
tag: auth
|
||||
---
|
||||
|
||||
This STIG requirement is not yet implemented.
|
||||
Deployers are strongly urged to utilize ``sssd`` for systems that authenticate
|
||||
against LDAP or Active Directory (AD) servers.
|
||||
|
||||
The ldap connector for ``sssd`` connects only to LDAP servers over
|
||||
encrypted connections. Review the man page for
|
||||
`sssd-ldap <https://linux.die.net/man/5/sssd-ldap>`_ for more details on this
|
||||
requirement.
|
||||
|
@ -1,7 +1,23 @@
|
||||
---
|
||||
id: RHEL-07-040181
|
||||
status: not implemented
|
||||
tag: misc
|
||||
status: exception - manual intervention
|
||||
tag: auth
|
||||
---
|
||||
|
||||
This STIG requirement is not yet implemented.
|
||||
Deployers are strongly urged to utilize ``sssd`` for systems that authenticate
|
||||
against LDAP or Active Directory (AD) servers.
|
||||
|
||||
To meet this control, deployers must ensure that ``ldap_tls_cacert`` or
|
||||
``ldap_tls_cacertdir`` are set in the ``/etc/sssd/sssd.conf`` file. The
|
||||
``ldap_tls_cacert`` directive specifies a single certificate while
|
||||
``ldap_tls_cacertdir`` specifies a directory where ``sssd`` can find CA
|
||||
certificates.
|
||||
|
||||
.. warning::
|
||||
|
||||
Use caution when adjusting these settings. If the correct CA certificates
|
||||
are not already deployed to the servers that perform LDAP authentication,
|
||||
their attempts to authenticate users might fail.
|
||||
|
||||
Consult with administrators of the LDAP system and test all changes on
|
||||
a non-production system first.
|
||||
|
@ -1,7 +1,23 @@
|
||||
---
|
||||
id: RHEL-07-040182
|
||||
status: not implemented
|
||||
tag: misc
|
||||
status: exception - manual intervention
|
||||
tag: auth
|
||||
---
|
||||
|
||||
This STIG requirement is not yet implemented.
|
||||
Deployers are strongly urged to utilize ``sssd`` for systems that authenticate
|
||||
against LDAP or Active Directory (AD) servers.
|
||||
|
||||
To meet this control, deployers must ensure that ``ldap_tls_cacert`` or
|
||||
``ldap_tls_cacertdir`` are set in the ``/etc/sssd/sssd.conf`` file. The
|
||||
``ldap_tls_cacert`` directive specifies a single certificate while
|
||||
``ldap_tls_cacertdir`` specifies a directory where ``sssd`` can find CA
|
||||
certificates.
|
||||
|
||||
.. warning::
|
||||
|
||||
Use caution when adjusting these settings. If the correct CA certificates
|
||||
are not already deployed to the servers that perform LDAP authentication,
|
||||
their attempts to authenticate users might fail.
|
||||
|
||||
Consult with administrators of the LDAP system and test all changes on
|
||||
a non-production system first.
|
||||
|
Loading…
x
Reference in New Issue
Block a user