SV-90625r1_rule
V-75937
SRG-NET-000138-ALG-000088
CACT-AG-000006
CAT II
10
If user authentication service is provided by CounterACT, configure the use of a central directory service for user authentication.
Obtain configuration information for a directory service (e.g., Active Directory or LDAP) that validates user account access authorizations and privileges.
1. Connect to CounterACT’s Admin Console and log in.
2. Go to Tools >> Options >> User Directory.
3. Verify the User Directory configured for Authentication. Select the configured directory (or directories) and on the General Tab ensure the "Use for Authentication" radio button is selected.
If CounterACT does not provide user authentication intermediary services, this is not applicable.
Verify CounterACT is configured for NAC services authentication.
1. Connect to CounterACT’s Admin Console and log in.
2. Go to Tools >> Options >> User Directory.
3. Verify the User Directory configured for Authentication. Select the configured directory (or directories) and on the General Tab ensure the "Use for Authentication" radio button is selected.
Verify with site representatives that the directory service validates user account access authorizations and privileges.
If CounterACT does not use a central directory service to validate user account access authorizations and privileges, this is a finding.
V-75937
False
CACT-AG-000006
If CounterACT does not provide user authentication intermediary services, this is not applicable.
Verify CounterACT is configured for NAC services authentication.
1. Connect to CounterACT’s Admin Console and log in.
2. Go to Tools >> Options >> User Directory.
3. Verify the User Directory configured for Authentication. Select the configured directory (or directories) and on the General Tab ensure the "Use for Authentication" radio button is selected.
Verify with site representatives that the directory service validates user account access authorizations and privileges.
If CounterACT does not use a central directory service to validate user account access authorizations and privileges, this is a finding.
M
3223