SV-230839r599842_rule
V-230839
SRG-OS-000480-GPOS-00227
APPL-11-003050
CAT II
10
Make a backup of the PAM LOGIN settings using the following command:
sudo cp /etc/pam.d/login /etc/pam.d/login_backup_`date "+%Y-%m-%d_%H:%M"`
Replace the contents of "/etc/pam.d/login" with the following:
# login: auth account password session
auth sufficient pam_smartcard.so
auth optional pam_krb5.so use_kcminit
auth optional pam_ntlm.so try_first_pass
auth optional pam_mount.so try_first_pass
auth required pam_opendirectory.so try_first_pass
auth required pam_deny.so
account required pam_nologin.so
account required pam_opendirectory.so
password required pam_opendirectory.so
session required pam_launchd.so
session required pam_uwtmp.so
session optional pam_mount.so
For systems that are not utilizing smart card authentication, this is Not Applicable.
To verify that the "login" command has been configured to require smart card authentication, run the following command:
# cat /etc/pam.d/login | grep -i pam_smartcard.so
If the text that returns does not include the line, "auth sufficient pam_smartcard.so" at the TOP of the listing, this is a finding.
V-230839
False
APPL-11-003050
For systems that are not utilizing smart card authentication, this is Not Applicable.
To verify that the "login" command has been configured to require smart card authentication, run the following command:
# cat /etc/pam.d/login | grep -i pam_smartcard.so
If the text that returns does not include the line, "auth sufficient pam_smartcard.so" at the TOP of the listing, this is a finding.
M
5246