UCF STIG Viewer Logo
Changes are coming to https://stigviewer.com. Take our survey to help us understand your usage and how we can better serve you in the future.
Take Survey

The application must ensure each unique asserting party provides unique assertion ID references for each SAML assertion.


Overview

Finding ID Version Rule ID IA Controls Severity
V-69283 APSC-DV-000210 SV-83905r2_rule Medium
Description
SAML is a standard for exchanging authentication and authorization data between security domains. SAML uses security tokens containing assertions to pass information about a principal (usually an end user) between a SAML authority, (identity provider), and a SAML consumer, (service provider). SAML assertions are usually made about a subject, (user) represented by the <Subject> element. SAML assertion identifiers should be unique across a system implementation. Duplicate SAML assertion identifiers could lead to unauthorized access to a web service.
STIG Date
Application Security and Development Security Technical Implementation Guide 2017-12-18

Details

Check Text ( C-69691r1_chk )
Ask the application representative for the design document.

Review the design document for web services using SAML assertions.

If the application does not utilize SAML assertions, this check is not applicable.

Review the design document and verify SAML assertion identifiers are not reused by a single asserting party.

If the design document does not exist, or does not indicate SAML assertion identifiers which are unique for each asserting party, this is a finding.
Fix Text (F-75453r1_fix)
Design and configure each SAML assertion authority to use unique assertion identifiers.