UCF STIG Viewer Logo

The Oracle Linux operating system must not allow an unattended or automatic logon to the system via a graphical user interface.


Overview

Finding ID Version Rule ID IA Controls Severity
V-221694 OL07-00-010440 SV-221694r877377_rule High
Description
Failure to restrict system access to authenticated users negatively impacts operating system security.
STIG Date
Oracle Linux 7 Security Technical Implementation Guide 2022-12-06

Details

Check Text ( C-23409r419154_chk )
Verify the operating system does not allow an unattended or automatic logon to the system via a graphical user interface.

Note: If the system does not have GNOME installed, this requirement is Not Applicable.

Check for the value of the "AutomaticLoginEnable" in the "/etc/gdm/custom.conf" file with the following command:

# grep -i automaticloginenable /etc/gdm/custom.conf
AutomaticLoginEnable=false

If the value of "AutomaticLoginEnable" is not set to "false", this is a finding.
Fix Text (F-23398r419155_fix)
Configure the operating system not to allow an unattended or automatic logon to the system via a graphical user interface.

Note: If the system does not have GNOME installed, this requirement is Not Applicable.

Add or edit the line for the "AutomaticLoginEnable" parameter in the [daemon] section of the "/etc/gdm/custom.conf" file to "false":

[daemon]
AutomaticLoginEnable=false