UCF STIG Viewer Logo
Changes are coming to https://stigviewer.com. Take our survey to help us understand your usage and how we can better serve you in the future.
Take Survey

tc Server ALL must be configured to the correct user authentication source.


Overview

Finding ID Version Rule ID IA Controls Severity
V-241697 VROM-TC-000735 SV-241697r879692_rule High
Description
Remote access to the web server is any access that communicates through an external, non-organization-controlled network. Remote access can be used to access hosted applications or to perform management functions. A web server can be accessed remotely and must be able to enforce remote access policy requirements or work in conjunction with enterprise tools designed to enforce policy requirements. vRealize Operations can be configured with a variety of authentication sources. Site policies and procedures will dictate the appropriate authentication mechanism.
STIG Date
VMware vRealize Operations Manager 6.x tc Server Security Technical Implementation Guide 2023-09-12

Details

Check Text ( C-44973r854906_chk )
Obtain the correct configuration data for the Authentication Source from the ISSO.

Open a web browser, and put in the vROps URL.

1. Log into the Administration Portal
2. Click on Administration >> Authentication Sources
3. Click on Authentication Source
4. Verify that User Authentication is configured correctly

If the Authentication Source is not configured in accordance with site policy, this is a finding.
Fix Text (F-44932r683952_fix)
Document the correct configuration data for the Authentication Source and provide to the ISSO.

Open a web browser, and put in the vROps URL.

1. Log into the Administration Portal
2. Click on Administration >> Authentication Sources
3. Click on Authentication Source
4. Ensure that that User Authentication is configured correctly