Check: F5BI-AP-000085
F5 BIG-IP Access Policy Manager STIG:
F5BI-AP-000085
(in versions v2 r3 through v1 r1)
Title
The BIG-IP APM module must map the authenticated identity to the user account for PKI-based authentication to virtual servers. (Cat II impact)
Discussion
Authorization for access to any network element requires an approved and assigned individual account identifier. To ensure only the assigned individual is using the account, the account must be bound to a user certificate when PKI-based authentication is implemented. This requirement applies to ALGs that provide user authentication intermediary services (e.g., authentication gateway or TLS gateway). This does not apply to authentication for the purpose of configuring the device itself (device management).
Check Content
If the BIG-IP APM module does not provide PKI-based, user authentication intermediary services, this is not applicable. Verify the BIG-IP APM module maps the authenticated identity to the user account for PKI-based authentication. Navigate to the BIG-IP System manager >> Access Policy >> Access Profiles. Click "Edit..." in the "Access Policy" column for an Access Profile used for PKI-based authentication. Verify the Access Profile is configured to map the authenticated identity to the user account for PKI-based authentication. If the BIG-IP APM module does not map the authenticated identity to the user account for PKI-based authentication, this is a finding.
Fix Text
If the BIG-IP APM module provides PKI-based, user authentication intermediary services, configure a profile in the BIG-IP APM module to map the authenticated identity to the user account for PKI-based authentication.
Additional Identifiers
Rule ID: SV-215722r557355_rule
Vulnerability ID: V-215722
Group Title: SRG-NET-000166-ALG-000101
Expert Comments
CCIs
Number | Definition |
---|---|
CCI-000187 |
The information system, for PKI-based authentication, maps the authenticated identity to the account of the individual or group. |
Controls
Number | Title |
---|---|
IA-5 (2) |
Pki-Based Authentication |