Skip to content
ATO Pathways
Log In
Overview
Search
Catalogs
SCAP
OSCAL
Catalogs
Profiles
Documents
References
Knowledge Base
Platform Documentation
Compliance Dictionary
Platform Changelog
About
Catalogs
XCCDF
Guide to the Secure Configuration of Red Hat Enterprise Linux 7
System Settings
Account and Access Control
Protect Accounts by Restricting Password-Based Login
Set Account Expiration Parameters
Use Centralized and Automated Authentication
Use Centralized and Automated Authentication
An XCCDF Rule
Details
Profiles
Prose
Use Centralized and Automated Authentication
Medium Severity
Implement an automated system for managing user accounts that minimizes the risk of errors, either intentional or deliberate. This system should integrate with an existing enterprise user management system, such as one based on Identity Management tools such as Active Directory, Kerberos, Directory Server, etc.