UCF STIG Viewer Logo
Changes are coming to https://stigviewer.com. Take our survey to help us understand your usage and how we can better serve you in the future.
Take Survey

The CA API Gateway must prohibit the use of cached authenticators after an organization-defined time period.


Overview

Finding ID Version Rule ID IA Controls Severity
V-71435 CAGW-GW-000630 SV-86059r1_rule Medium
Description
If the cached authenticator information is out of date, the validity of the authentication information may be questionable. This requirement applies to all ALGs that may cache user authenticators for use throughout a session. This requirement also applies to ALGs that provide user authentication intermediary services (e.g., authentication gateway or TLS gateway). This does not apply to authentication for the purpose of configuring the device itself (device management). The CA API Gateway must be configured to use an organization-defined value for determining the expiration of cached data from an identity provider or third party, such as a SAML Token Service.
STIG Date
CA API Gateway ALG Security Technical Implementation Guide 2017-04-07

Details

Check Text ( C-71825r1_chk )
Open the CA API Gateway - Policy Manager and select the "Identity Provider" tab.

Verify the "Cache Size" and "Cache Maximum Age" are set in accordance with organization-defined requirements.

If the values are not set or are not set in accordance with organizational requirements, this is a finding.
Fix Text (F-77753r1_fix)
Open the CA API Gateway - Policy Manager and select the "Identity Provider" tab.

Update the "Cache Size" and "Cache Maximum Age" in accordance with organization-defined requirements.