STIGhubSTIGhub
STIGsRMF ControlsCompare

STIGhub

A free tool to search and browse the entire DISA STIG library. Saves up to 75% in security compliance research time.

Navigation

  • Browse STIGs
  • Search
  • RMF Controls
  • Compare Versions

Resources

  • About
  • Release Notes
  • VPAT
  • DISA STIG Library
STIGs updated 2 hours ago
Powered by Pylon
© 2026 Beacon Cloud Solutions, Inc. All rights reserved.
← IA-8 (2) — Identification and Authentication (Non-Organizational Users)

CCI-004083

Definition

Accept only external credentials that are NIST compliant.

Parent Control

IA-8 (2)Identification and Authentication (Non-Organizational Users)Identification and Authentication

Linked STIG Checks (9)

V-222559CAT IIThe application must accept Federal Identity, Credential, and Access Management (FICAM)-approved third-party credentials.Application Security and Development Security Technical Implementation GuideV-204808CAT IIThe application server must accept Federal Identity, Credential, and Access Management (FICAM)-approved third-party credentials.Application Server Security Requirements GuideV-276012CAT IAx-OS must have no local accounts for the user interface.Axonius Federal Systems Ax-OS Security Technical Implementation GuideV-263657CAT IIThe operating system must accept only external credentials that are NIST-compliant.General Purpose Operating System Security Requirements GuideV-205576CAT IIThe Mainframe Product must accept Federal Identity, Credential, and Access Management (FICAM)-approved third-party credentials.Mainframe Product Security Requirements GuideV-279443CAT IINutanix AOS must accept Federal Identity, Credential, and Access Management (FICAM)-approved third-party credentials.Nutanix Acropolis Application Server Security Technical Implementation GuideV-282768CAT IITOSS 5 must accept only external credentials that are NIST compliant.Tri-Lab Operating System Stack (TOSS) 5 Security Technical Implementation GuideV-264322CAT IIThe VMM must accept only external credentials that are NIST-compliant.Virtual Machine Manager Security Requirements GuideV-269574CAT IXylok Security Suite must use a centralized user management solution.Xylok Security Suite 20.x Security Technical Implementation Guide