UCF STIG Viewer Logo

The WebSphere Application Server must use signer for DoD-issued certificates.


Overview

Finding ID Version Rule ID IA Controls Severity
V-81361 WBSP-AS-001260 SV-96075r1_rule Medium
Description
The cornerstone of PKI is the private key used to encrypt or digitally sign information. The key by itself is a cryptographic value that does not contain specific user information, but the key can be mapped to a user. Without mapping the certificate used to authenticate to the user account, the ability to determine the identity of the individual user or group will not be available for forensic analysis. Application servers must provide the capability to utilize and meet requirements of the DoD Enterprise PKI infrastructure for application authentication.
STIG Date
IBM WebSphere Traditional V9.x Security Technical Implementation Guide 2018-08-24

Details

Check Text ( C-81069r3_chk )
Navigate to Security >> SSl certificate and key management >> SSL Configurations >> CellDefaultSSLSettings >> KeyStores and certificates.

Click on cell default trust store.

Click on "Signer Certificates".

If no DoD root or intermediate certificates are present, this is a finding.
Fix Text (F-88147r2_fix)
Obtain the signer certificate either as Base 64 encoded ASCII file, or as binary DER data.

Navigate to Security >> SSl certificate and key management >> SSL Configurations >> CellDefaultSSLSettings >> key stores and certificates.

Click on cell default trust store.

Click on "Signer Certificates".

Click "Add".

Enter a new alias for the signer, and the location of the file that stores signer certificate.

For "Data type", choose the type appropriate for the file, either Base64-encoded ASCII data file, or binary DER data.

Click "OK".