Skip to content

Windows Server 2022 must be configured for name-based strong mappings for certificates.

An XCCDF Rule

Description

Weak mappings give rise to security vulnerabilities and demand hardening measures. Certificate names must be correctly mapped to the intended user account in Active Directory. A lack of strong name-based mappings allows certain weak certificate mappings, such as Issuer/Subject AltSecID and User Principal Names (UPN) mappings, to be treated as strong mappings.

ID
SV-271427r1059560_rule
Version
WN22-DC-000406
Severity
Medium
References
Updated

Remediation Templates

A Manual Procedure

Configure the policy value for Computer Configuration >> Administrative Template >> System >> KDC >> Allow name-based strong mappings for certificates to "Enabled".