JBOS-AS-000035 - The JBoss server must be configured with Role Based Access Controls.

Information

By default, the JBoss server is not configured to utilize role based access controls (RBAC). RBAC provides the capability to restrict user access to their designated management role, thereby limiting access to only the JBoss functionality that they are supposed to have. Without RBAC, the JBoss server is not able to enforce authorized access according to role.

Solution

Run the following command.
<JBOSS_HOME>/bin/jboss-cli.sh -c -> connect -> cd /core-service=management/access-authorization :write-attribute(name=provider, value=rbac)

Restart JBoss.

Map users to roles by running the following command. Uppercase words are variables.

role-mapping=ROLENAME/include=ALIAS:add(name-USERNAME, type=USER ROLE)

See Also

https://dl.dod.cyber.mil/wp-content/uploads/stigs/zip/U_JBoss_EAP_6-3_V2R5_STIG.zip

Item Details

Category: ACCESS CONTROL

References: 800-53|AC-3, CAT|I, CCI|CCI-000213, Rule-ID|SV-213498r1028281_rule, STIG-ID|JBOS-AS-000035, STIG-Legacy|SV-76717, STIG-Legacy|V-62227, Vuln-ID|V-213498

Plugin: Unix

Control ID: 563a864701beff3c398d893e966aba5d8b24d24d74cdbd11f7f6accf30883446