UCF STIG Viewer Logo
Changes are coming to https://stigviewer.com. Take our survey to help us understand your usage and how we can better serve you in the future.
Take Survey

The Ivanti MobileIron Core server must be configured to use a DoD Central Directory Service to provide multifactor authentication for network access to privileged and non-privileged accounts.


Overview

Finding ID Version Rule ID IA Controls Severity
V-251406 IMIC-11-004200 SV-251406r960972_rule Medium
Description
A comprehensive account management process that includes automation helps to ensure the accounts designated as requiring attention are consistently and promptly addressed. If an attacker compromises an account, the entire MDM server infrastructure is at risk. Providing automated support functions for the management of accounts will ensure only active accounts will be granted access with the proper authorization levels. These objectives are best achieved by configuring the MDM server to leverage an enterprise authentication mechanism (e.g., Microsoft Active Directory Kerberos). Satisfies: FIA Reference: PP-MDM-414003
STIG Date
Ivanti MobileIron Core MDM Server Security Technical Implementation Guide 2024-05-23

Details

Check Text ( C-54841r806348_chk )
On the MDM console, do the following:
1. Log in to the MobileIron Core Server administrator portal as a user with the security configuration administrator role using a web browser.
2. Select "Services" on the web page.
3. Select "LDAP" on the web page.
4. Click the edit icon on an existing LDAP configuration to be tested.
5. Select "Test" on the LDAP server configuration dialog.
6. Enter a valid LDAP user ID and select "Submit".
7. Verify the LDAP query is successful and shows user attributes in a dialog box.

Note: All administrator accounts must be configured for LDAP authentication unless a select number of local accounts have been approved by the AO. Verify AO approval if local accounts (not using LDAP authentication) are configured on the Core server.

If the MDM server does not leverage the MDM platform user accounts and groups for MDM server user identification and authentication, this is a finding.
Fix Text (F-54794r806349_fix)
Configure the MDM server to leverage the MDM platform user accounts and groups for MDM server user identification and authentication.

On the MDM console, do the following:
1. Log in to the MobileIron Core Server administrator portal as a user with the security configuration administrator role using a web browser.
2. Select "Services" on the web page.
3. Select "LDAP" on the web page.
4. Select "Add New" (or click the edit icon on an existing LDAP configuration).
5. Complete the LDAP configuration dialog providing the URL for the LDAP server, alternate URL if there is a backup LDAP server, user ID and password for the LDAP server, and for additional settings see "Configuring LDAP Servers" section in the On-Premise Installation Guide.
6. Select "Save" to save the LDAP configuration.

Note: All administrator accounts will be configured to use LDAP-based authentication, unless there is an operational need for a select number of local accounts, with the approval of the AO.