SV-225212r610901_rule
V-225212
SRG-OS-000105-GPOS-00052
AOSX-15-003020
CAT I
10
For non-directory-bound systems, this setting is enforced using the "Smart Card Policy" configuration profile.
Note: Before applying the "Smart Card Policy", consult the supplemental guidance provided with the STIG to ensure continued access to the operating system.
The following commands must be run to disable passcode based authentication for SSHD:
/usr/bin/sudo /usr/bin/sed -i.bak 's/^[\#]*ChallengeResponseAuthentication.*/ChallengeResponseAuthentication no/' /etc/ssh/sshd_config
/usr/bin/sudo /usr/bin/sed -i.bak 's/^[\#]*PasswordAuthentication.*/PasswordAuthentication no/' /etc/ssh/sshd_config
To verify that the system is configured to enforce multifactor authentication, run the following commands:
/usr/sbin/system_profiler SPConfigurationProfileDataType | /usr/bin/grep enforceSmartCard
If the results do not show the following, this is a finding:
"enforceSmartCard=1.
Run the following command to disable password based authentication in SSHD:
/usr/bin/grep -e ^[\#]*PasswordAuthentication.* -e ^[\#]*ChallengeResponseAuthentication.* /etc/ssh/sshd_config
If this command returns null, or anything other than exactly the following text, with no leading hash(#), this is a finding:
"PasswordAuthentication no
ChallengeResponseAuthentication no"
V-225212
False
AOSX-15-003020
To verify that the system is configured to enforce multifactor authentication, run the following commands:
/usr/sbin/system_profiler SPConfigurationProfileDataType | /usr/bin/grep enforceSmartCard
If the results do not show the following, this is a finding:
"enforceSmartCard=1.
Run the following command to disable password based authentication in SSHD:
/usr/bin/grep -e ^[\#]*PasswordAuthentication.* -e ^[\#]*ChallengeResponseAuthentication.* /etc/ssh/sshd_config
If this command returns null, or anything other than exactly the following text, with no leading hash(#), this is a finding:
"PasswordAuthentication no
ChallengeResponseAuthentication no"
M
4212