UCF STIG Viewer Logo
Changes are coming to https://stigviewer.com. Take our survey to help us understand your usage and how we can better serve you in the future.
Take Survey

MarkLogic Server must prohibit the use of cached authenticators after an organization-defined time period.


Overview

Finding ID Version Rule ID IA Controls Severity
V-220385 ML09-00-008200 SV-220385r961521_rule Medium
Description
If cached authentication information is out-of-date, the validity of the authentication information may be questionable.
STIG Date
MarkLogic Server v9 Security Technical Implementation Guide 2024-06-12

Details

Check Text ( C-22100r401606_chk )
Review MarkLogic settings to determine whether the organization-defined limit for cached authentication is implemented.

Perform the check from the MarkLogic Server Admin Interface with a user that holds administrative-level privileges.

1. Click the Security icon.
2. Click the External Security icon.
3. Select each of the External Security providers.
4. For each of the providers inspect the cache timeout field, a value that does not match the organization-defined time limit is a finding.
Fix Text (F-22089r401607_fix)
Modify MarkLogic settings to implement the organization-defined limit on the lifetime of cached authenticators.

Perform the fix from the MarkLogic Server Admin Interface with a user that holds administrative-level privileges.

1. Click the Security icon.
2. Click the External Security icon.
3. Select each of the External Security providers.
4. For each of the providers set the cache timeout field to the organization-defined time limit.