UCF STIG Viewer Logo

The DNS implementation must map the authenticated identity to the user account for PKI-based authentication.


Overview

Finding ID Version Rule ID IA Controls Severity
V-34117 SRG-NET-000166-DNS-000105 SV-44570r1_rule Medium
Description
The cornerstone of the PKI is the private key used to encrypt or digitally sign information. The key by itself is a cryptographic value that does not contain specific user information. The authenticated identity must be mapped to a corresponding user account for access and authorization decisions. If an account is not mapped appropriately, the validity of the authentication process is in question.
STIG Date
Domain Name System (DNS) Security Requirements Guide 2012-10-24

Details

Check Text ( C-42077r1_chk )
Review DNS PKI configuration to verify DNS user accounts are being mapped directly to authenticated identity information being passed via the PKI. If user accounts are not being mapped to authenticated identity information being passed via the PKI, this is a finding.
Fix Text (F-38027r1_fix)
Configure the DNS PKI implementation to map the authenticated identity to the user account.