UCF STIG Viewer Logo
Changes are coming to https://stigviewer.com. Take our survey to help us understand your usage and how we can better serve you in the future.
Take Survey

The vRealize Operations server must use an enterprise user management system to uniquely identify and authenticate users (or processes acting on behalf of organizational users).


Overview

Finding ID Version Rule ID IA Controls Severity
V-239840 VROM-AP-000195 SV-239840r879589_rule Medium
Description
To assure accountability and prevent unauthorized access, application server users must be uniquely identified and authenticated. This is typically accomplished via the use of a user store that is either local (OS-based) or centralized (LDAP) in nature. To ensure support to the enterprise, the authentication must utilize an enterprise solution.
STIG Date
VMware vRealize Operations Manager 6.x Application Security Technical Implementation Guide 2023-09-12

Details

Check Text ( C-43073r664012_chk )
Obtain the site configuration control policy from the ISSO.

Review site procedures to determine if an enterprise management system is used to uniquely identify and authenticate users.

If an enterprise management solution is not used, this is a finding.
Fix Text (F-43032r664013_fix)
Configure vROps to use an enterprise user management system and document this in the site configuration control policy.