UCF STIG Viewer Logo

The DBMS must ensure that PKI-based authentication maps the authenticated identity to the user account.


Overview

Finding ID Version Rule ID IA Controls Severity
V-32478 SRG-APP-000177-DB-000069 SV-42815r1_rule Medium
Description
The cornerstone of the PKI is the private key used to encrypt or digitally sign information. The key by itself is a cryptographic value that does not contain specific user information. When including the DBMS in the Private Key Infrastructure, the authenticated user must map directly to a user account in the DBMS. If the user account is not directly tied to the authenticated identity there is no way to know which, if any, database user account has been authorized.
STIG Date
Database Security Requirements Guide 2012-07-02

Details

Check Text ( C-40915r1_chk )
Review DBMS configuration to verify DBMS user accounts are being mapped directly to authenticated identity information being passed via the PKI. If user accounts are not being mapped to authenticated identity information being passed via the PKI, this is a finding.
Fix Text (F-36392r1_fix)
Configure the DBMS to map the authenticated identity directly to the DBMS user account.