UCF STIG Viewer Logo
Changes are coming to https://stigviewer.com. Take our survey to help us understand your usage and how we can better serve you in the future.
Take Survey

Forms-based Authentication must not be enabled.


Overview

Finding ID Version Rule ID IA Controls Severity
V-33588 Exch-1-205 SV-44008r1_rule ECSC-1 Medium
Description
Identification and Authentication provide the foundation for access control. Access to email services applications in the DoD require authentication using DoD Public Key Infrastructure (PKI) certificates. Authentication for Outlook Web App (OWA) is used to enable web access to user email mailboxes and should assume that certificate-based authentication has been configured. This setting controls whether forms-based login should be used by the OWA web site. Because the DoD requires Common Access Card (CAC)-based authentication to applications, OWA access must be brokered through an application proxy or other pre-authenticator, which performs CAC authentication prior to arrival at the CA server. The authenticated request is then forwarded directly to OWA, where authentication is repeated without requiring the user to repeat authentication steps. For this scenario to work, the Application Proxy server must have forms-based authentication enabled, and Exchange must have forms-based Authentication disabled. If forms-based Authentication is enabled on the Exchange CA server, it is evidence that the application proxy server is either not correctly configured, or it may be missing.
STIG Date
Exchange 2010 Client Access Server STIG 2014-03-11

Details

Check Text ( C-41693r1_chk )
Open the Exchange Management Shell and enter the following command:

Get-OwaVirtualDirectory | Select Name, Identity, FormsAuthentication

If the value of 'FormsAuthentication' is not set to 'False', this is a finding.
Fix Text (F-37479r1_fix)
Open the Exchange Management Shell and enter the following command:

Set-OwaVirtualDirectory -Identity <'IdentityName'> -FormsAuthentication $false