UCF STIG Viewer Logo
Changes are coming to https://stigviewer.com. Take our survey to help us understand your usage and how we can better serve you in the future.
Take Survey

The vCenter Server must use a limited privilege account when adding a Lightweight Directory Access Protocol (LDAP) identity source.


Overview

Finding ID Version Rule ID IA Controls Severity
V-256369 VCSA-70-000289 SV-256369r885718_rule Medium
Description
When adding an LDAP identity source to vSphere Single Sign-On (SSO), the account used to bind to Active Directory must be minimally privileged. This account only requires read rights to the base domain name specified. Any other permissions inside or outside of that organizational unit are unnecessary and violate least privilege.
STIG Date
VMware vSphere 7.0 vCenter Security Technical Implementation Guide 2023-03-01

Details

Check Text ( C-60044r885716_chk )
From the vSphere Client, go to Administration >> Single Sign On >> Configuration >> Identity Provider.

Click the "Identity Sources" tab.

For each identity source with a type of "Active Directory over LDAP", highlight the item and click "Edit".

If the account that is configured to bind to the LDAP server is not one with minimal privileges, this is a finding.
Fix Text (F-59987r885717_fix)
From the vSphere Client, go to Administration >> Single Sign On >> Configuration >> Identity Provider.

Click the "Identity Sources" tab.

For each identity source that has been configured with a highly privileged Active Directory account, highlight the item and click "Edit".

Change the username and password to one with read-only rights to the base DN and complete the dialog.