1. Home
  2. Security Hardening
  3. DISA STIG VMware vSphere 6.x ESXi V1R5
  4. ESXI-06-000037 – The system must use Active Directory for local user authentication.

ESXI-06-000037 – The system must use Active Directory for local user authentication.

Details

Join ESXi hosts to an Active Directory (AD) domain to eliminate the need to create and maintain multiple local user accounts. Using AD for user authentication simplifies the ESXi host configuration, ensures password complexity and reuse policies are enforced and reduces the risk of security breaches and unauthorized access. Note: If the AD group ‘ESX Admins’ (default) exists then all users and groups that are assigned as members to this group will have full administrative access to all ESXi hosts the domain.

NOTE: Nessus has not performed this check. Please review the benchmark to ensure target compliance.

Solution

From the vSphere Client, select the ESXi Host and go to Configuration >> Authentication Services.

Click ‘Properties’.

Change the ‘Directory Service Type’ to ‘Active Directory’.

Enter the domain to join.

Check ‘Use vSphere Authentication Proxy’.

Enter the proxy server address.

Click ‘Join Domain’.

or

From a PowerCLI command prompt while connected to the ESXi host run the following command:

Get-VMHost | Get-VMHostAuthentication | Set-VMHostAuthentication -JoinDomain -Domain ‘domain name’ -User ‘username’ -Password ‘password’

Supportive Information

The following resource is also helpful.

This security hardening control applies to the following category of controls within NIST 800-53: Identification and Authentication.This control applies to the following type of system VMware.

References

Source

Updated on July 16, 2022
Was this article helpful?

Related Articles