Skip to content

The vCenter Server must use a limited privilege account when adding a Lightweight Directory Access Protocol (LDAP) identity source.

An XCCDF Rule

Description

<VulnDiscussion>When adding an LDAP identity source to vSphere Single Sign-On (SSO), the account used to bind to Active Directory must be minimally privileged. This account only requires read rights to the base domain name specified. Any other permissions inside or outside of that organizational unit are unnecessary and violate least privilege.</VulnDiscussion><FalsePositives></FalsePositives><FalseNegatives></FalseNegatives><Documentable>false</Documentable><Mitigations></Mitigations><SeverityOverrideGuidance></SeverityOverrideGuidance><PotentialImpacts></PotentialImpacts><ThirdPartyTools></ThirdPartyTools><MitigationControl></MitigationControl><Responsibility></Responsibility><IAControls></IAControls>

ID
SV-256369r885718_rule
Severity
Medium
References
Updated



Remediation - Manual Procedure

From the vSphere Client, go to Administration >> Single Sign On >> Configuration >> Identity Provider.

Click the "Identity Sources" tab.

For each identity source that has been configured with a highly privileged Active Directory account, highlight the item and click "Edit".