UCF STIG Viewer Logo

The VMM must accept Personal Identity Verification (PIV) credentials.


Overview

Finding ID Version Rule ID IA Controls Severity
V-63771 ESXI-06-100040 SV-78261r2_rule Low
Description
To assure accountability and prevent unauthenticated access, privileged users must utilize multifactor authentication to prevent potential misuse and compromise of the system.
STIG Date
VMware vSphere ESXi 6.0 Security Technical Implementation Guide 2019-01-04

Details

Check Text ( C-64521r2_chk )
From the vSphere Web Client, select the ESXi Host and go to Manage >> Authentication Services.

View the Smart Card Authentication status.

If "Enable Smart Card Authentication" is checked, the system requires smart cards to authenticate to an Active Directory Domain.

For systems that have no local user accounts, other than root, dcui, and/or vpxuser, this is Not Applicable.

For environments that do not use vCenter server to manage ESXi, this is Not Applicable.

For systems that do not use smart cards with Active Directory and do have local user accounts, other than root, dcui, and/or vpxuser, this is a finding.
Fix Text (F-69699r2_fix)
The following are pre-requisites to configuration smart card authentication for the ESXi DCUI:
-Active Directory domain that supports smart card authentication, smart card readers, and smart cards.
-ESXi joined to an Active Directory domain.
-Trusted certificates for root and intermediary certificate authorities.

From the vSphere Web Client, select the ESXi Host and go to Manage >> Authentication Services.

Edit the "Smart Card Authentication" configuration to add trusted certificate authority certificates.

Select "Enable Smart Card Authentication".

Click OK.

For more information see the vSphere 6.0 documentation on VMware's website.