UCF STIG Viewer Logo
Changes are coming to https://stigviewer.com. Take our survey to help us understand your usage and how we can better serve you in the future.
Take Survey

The DataPower Gateway providing user access control intermediary services must be configured with a pre-established trust relationship and mechanisms with appropriate authorities (e.g., Active Directory or AAA server) which validate user account access authorizations and privileges.


Overview

Finding ID Version Rule ID IA Controls Severity
V-65217 WSDP-AG-000038 SV-79707r1_rule Medium
Description
User account and privilege validation must be centralized in order to prevent unauthorized access using changed or revoked privileges. ALGs can implement functions such as traffic filtering, authentication, access, and authorization functions based on computer and user privileges. However, the directory service (e.g., Active Directory or LDAP) must not be installed on the ALG, particularly if the gateway resides on the untrusted zone of the Enclave.
STIG Date
IBM DataPower ALG Security Technical Implementation Guide 2016-01-21

Details

Check Text ( C-65845r1_chk )
Using the appliance's WebGUI, navigate to DataPower Gateway's Configure AAA Policy (authentication, authorization, audit) at Objects >> XML Processing >> AAA Policy.

On the Resource extraction tab, confirm that the correct resource information categories are checked.

If these items are not configured, this is a finding.
Fix Text (F-71157r1_fix)
Using the appliance's WebGUI, navigate to DataPower Gateway's Configure AAA Policy (authentication, authorization, audit) at Objects >> XML Processing >> AAA Policy.

On the Resource extraction tab, specify the correct resource information categories.

If there is a requirement for resource mapping, on the Resource mapping tab, specify the appropriate method and associated information.

On the Authorization tab, specify the correct methods, associated information and caching parameters.