Configure PAM in SSSD Services
An XCCDF Rule
Description
SSSD should be configured to run SSSDpam
services.
To configure SSSD to known SSH hosts, add pam
to services
under the [sssd]
section in
/etc/sssd/sssd.conf
. For example:
[sssd] services = sudo, autofs, pam
Rationale
Using an authentication device, such as a CAC or token that is separate from the information system, ensures that even if the information system is compromised, that compromise will not affect credentials stored on the authentication device.
- ID
- xccdf_org.ssgproject.content_rule_sssd_enable_pam_services
- Severity
- Medium
- References
- Updated
Remediation Templates
An Ansible Snippet
- name: Gather the package facts
package_facts:
manager: auto
tags:
- NIST-800-53-CM-6(a)
- NIST-800-53-IA-2(1)
A Shell Script
# Remediation is applicable only in certain platforms
if rpm --quiet -q sssd-common; then
# sssd configuration files must be created with 600 permissions if they don't exist
# otherwise the sssd module fails to start
OLD_UMASK=$(umask)
umask u=rw,go=