Information
Using an authentication device, such as a Common Access Card (CAC) or token that is separate from the information system, ensures that even if the information system is compromised, that compromise will not affect credentials stored on the authentication device.
Multifactor solutions that require devices separate from information systems gaining access include, for example, hardware tokens providing time-based or challenge-response authenticators and smart cards such as the U.S. Government Personal Identity Verification card and the DOD CAC.
There are various methods of implementing multifactor authentication for OL 8. Some methods include a local system multifactor account mapping or joining the system to a domain and using an idM server or Microsoft Windows Active Directory server. Any of these methods will require that the client operating system handle the multifactor authentication correctly.
Satisfies: SRG-OS-000105-GPOS-00052, SRG-OS-000106-GPOS-00053, SRG-OS-000107-GPOS-00054, SRG-OS-000108-GPOS-00055
Solution
Configure OL 8 to use multifactor authentication for local access to accounts.
Add or update the 'pam_cert_auth' setting in the '/etc/sssd/sssd.conf' file to match the following line:
[pam]
pam_cert_auth = True
Add or update 'pam_sss.so' with 'try_cert_auth' or 'require_cert_auth' in the '/etc/pam.d/system-auth' and '/etc/pam.d/smartcard-auth' files based on the following examples:
/etc/pam.d/smartcard-auth:auth sufficient pam_sss.so try_cert_auth
/etc/pam.d/system-auth:auth [success=done authinfo_unavail=ignore ignore=ignore default=die] pam_sss.so try_cert_auth
The 'sssd' service must be restarted for the changes to take effect. To restart the 'sssd' service, run the following command:
$ sudo systemctl restart sssd.service
Item Details
Category: IDENTIFICATION AND AUTHENTICATION
References: 800-53|IA-2(1), 800-53|IA-2(2), 800-53|IA-2(3), 800-53|IA-2(4), CAT|II, CCI|CCI-000765, CCI|CCI-000766, CCI|CCI-000767, CCI|CCI-000768, CCI|CCI-004047, Rule-ID|SV-248702r1015060_rule, STIG-ID|OL08-00-020250, Vuln-ID|V-248702
Control ID: 5809d4ded45ce7eaac7af8f034a00e609b6fd1c9445e85692589630f09c08a99