1. Home
  2. Security Hardening
  3. DISA STIG VMware vSphere 6.7 ESXi V1R1
  4. ESXI-67-000037 – The ESXi host must use Active Directory for local user authentication.

ESXI-67-000037 – The ESXi host must use Active Directory for local user authentication.

Details

Join ESXi hosts to an Active Directory (AD) domain to eliminate the need to create and maintain multiple local user accounts. Using AD for user authentication simplifies the ESXi host configuration, ensures password complexity and reuse policies are enforced, and reduces the risk of security breaches and unauthorized access.

Note: If the AD group ‘ESX Admins’ (default) exists, then all users and groups that are assigned as members to this group will have full administrative access to all ESXi hosts the domain.

Satisfies: SRG-OS-000104-VMM-000500, SRG-OS-000109-VMM-000550, SRG-OS-000112-VMM-000560, SRG-OS-000113-VMM-000570

NOTE: Nessus has not performed this check. Please review the benchmark to ensure target compliance.

Solution

From the vSphere Client, select the ESXi host and go to Configure >> System >> Authentication Services.

Click ‘Join Domain’ and enter the AD domain to join. Select the ‘Using credentials’ radio button, enter the credentials of an account with permissions to join machines to AD (use UPN naming – [email protected]), and then click ‘OK’.

or

From a PowerCLI command prompt while connected to the ESXi host, run the following command:

Get-VMHost | Get-VMHostAuthentication | Set-VMHostAuthentication -JoinDomain -Domain ‘domain name’ -User ‘username’ -Password ‘password’

Supportive Information

The following resource is also helpful.

This security hardening control applies to the following category of controls within NIST 800-53: Identification and Authentication.This control applies to the following type of system VMware.

References

Source

Updated on July 16, 2022
Was this article helpful?

Related Articles