SV-216888r612237_rule
V-216888
SRG-APP-000516
VCWN-65-000069
CAT II
10
From the vSphere Web Client go to Administration >> Single Sign-On >> Configuration.
Click the "Identity Sources" tab.
For each identity source that has been configured with a highly privileged AD account, highlight the item and click the pencil icon to open the edit dialog. Change the username and password to one with read only rights to the base DN and complete the dialog.
Note: This requirement is applicable for Active Directory over LDAP connections and Not Applicable when the vCenter or PSC server is joined to AD and using integrated windows authentication.
From the vSphere Web Client go to Administration >> Single Sign-On >> Configuration.
Click the "Identity Sources" tab.
For each identity source with of type "Active Directory", highlight the item and click the pencil icon to open the edit dialog.
If the account that is configured to bind to the LDAP server is not one with minimal privileges, this is a finding.
V-216888
False
VCWN-65-000069
Note: This requirement is applicable for Active Directory over LDAP connections and Not Applicable when the vCenter or PSC server is joined to AD and using integrated windows authentication.
From the vSphere Web Client go to Administration >> Single Sign-On >> Configuration.
Click the "Identity Sources" tab.
For each identity source with of type "Active Directory", highlight the item and click the pencil icon to open the edit dialog.
If the account that is configured to bind to the LDAP server is not one with minimal privileges, this is a finding.
M
4030