Finding ID | Version | Rule ID | IA Controls | Severity |
---|---|---|---|---|
V-62277 | JBOS-AS-000260 | SV-76767r1_rule | Medium |
Description |
---|
To assure accountability and prevent unauthorized access, application server users must be uniquely identified and authenticated. This is typically accomplished via the use of a user store that is either local (OS-based) or centralized (Active Directory/LDAP) in nature. It should be noted that JBoss does not specifically mention Active Directory since AD is LDAP aware. To ensure accountability and prevent unauthorized access, the JBoss Server must be configured to utilize a centralized authentication mechanism. |
STIG | Date |
---|---|
JBoss EAP 6.3 Security Technical Implementation Guide | 2017-03-20 |
Check Text ( C-63081r1_chk ) |
---|
Log on to the OS of the JBoss server with OS permissions that allow access to JBoss. Using the relevant OS commands and syntax, cd to the Run the jboss-cli script. Connect to the server and authenticate. To obtain the list of security realms run the command: "ls /core-service=management/security-realm=" Review each security realm using the command: "ls /core-service=management/security-realm= If this command does not return a security realm that uses LDAP for authentication, this is a finding. |
Fix Text (F-68197r1_fix) |
---|
Follow steps in section 11.8 - Management Interface Security in the JBoss_Enterprise_Application_Platform-6.3-Administration_and_Configuration_Guide-en-US document. 1. Create an outbound connection to the LDAP server. 2. Create an LDAP-enabled security realm. 3. Reference the new security domain in the Management Interface. |