SV-243123r719612_rule
V-243123
SRG-APP-000516
VCTR-67-000068
CAT II
10
From the vSphere Client, go to Administration >> Single Sign-On >> Configuration.
Click the "Identity Sources" tab.
For each identity source of type "Active Directory" where LDAPS is not configured, highlight the item and click "Edit".
Ensure the primary and secondary server URLs, if specified, are configured for "ldaps://".
At the bottom, click the "Browse" button, select the AD LDAP cert previously exported to the local computer, click "Open", and "Save" to complete modifications.
Note: With LDAPS, the server must be a specific domain controller and its specific certificate or the domain alias with a certificate that is valid for that URL.
From the vSphere Client, go to Administration >> Single Sign-On >> Configuration.
Click the "Identity Sources" tab.
For each identity source of type "Active Directory", if the "Server URL" does not indicate "ldaps://", this is a finding.
V-243123
False
VCTR-67-000068
From the vSphere Client, go to Administration >> Single Sign-On >> Configuration.
Click the "Identity Sources" tab.
For each identity source of type "Active Directory", if the "Server URL" does not indicate "ldaps://", this is a finding.
M
5399