UCF STIG Viewer Logo
Changes are coming to https://stigviewer.com. Take our survey to help us understand your usage and how we can better serve you in the future.
Take Survey

tc Server ALL must be configured to the correct user authentication source.


Overview

Finding ID Version Rule ID IA Controls Severity
V-240842 VRAU-TC-000710 SV-240842r674440_rule High
Description
Remote access to the web server is any access that communicates through an external, non-organization-controlled network. Remote access can be used to access hosted applications or to perform management functions. A web server can be accessed remotely and must be able to enforce remote access policy requirements or work in conjunction with enterprise tools designed to enforce policy requirements. vRealize Automation can be configured with a variety of authentication sources. Site policies and procedures will dictate the appropriate authentication mechanism.
STIG Date
VMware vRealize Automation 7.x tc Server Security Technical Implementation Guide 2021-06-23

Details

Check Text ( C-44075r674439_chk )
Obtain the correct configuration data for the Authentication Source from the ISSO.

Open a web browser, and type in the vRA URL.

1. Log on to the Tenant Administration Portal.
2. Click on Administration >> Directories Management.
3. Click on "Policies".
4. Click on the "Policy Set" link.
5. Verify that User Authentication is configured correctly.

If the Authentication Source is not configured in accordance with site policy, this is a finding.
Fix Text (F-44034r674269_fix)
Obtain the correct configuration data for the Authentication Source from the ISSO.

Open a web browser, and type in the vRA URL.

1. Log on to the Tenant Administration Portal.
2. Click on Administration >> Directories Management.
3. Click on "Policies".
4. Click on the "Policy Set" link.
5. Modify the Authentication Source in accordance with site policy.