STIGhub
STIGs
RMF Controls
Compare
← IA-8 (2) — Identification and Authentication (Non-Organizational Users)
CCI-004083
Definition
Accept only external credentials that are NIST compliant.
Parent Control
IA-8 (2)
Identification and Authentication (Non-Organizational Users)
Identification and Authentication
Linked STIG Checks (9)
V-222559
CAT II
The application must accept Federal Identity, Credential, and Access Management (FICAM)-approved third-party credentials.
Application Security and Development Security Technical Implementation Guide
V-204808
CAT II
The application server must accept Federal Identity, Credential, and Access Management (FICAM)-approved third-party credentials.
Application Server Security Requirements Guide
V-276012
CAT I
Ax-OS must have no local accounts for the user interface.
Axonius Federal Systems Ax-OS Security Technical Implementation Guide
V-263657
CAT II
The operating system must accept only external credentials that are NIST-compliant.
General Purpose Operating System Security Requirements Guide
V-205576
CAT II
The Mainframe Product must accept Federal Identity, Credential, and Access Management (FICAM)-approved third-party credentials.
Mainframe Product Security Requirements Guide
V-279443
CAT II
Nutanix AOS must accept Federal Identity, Credential, and Access Management (FICAM)-approved third-party credentials.
Nutanix Acropolis Application Server Security Technical Implementation Guide
V-282768
CAT II
TOSS 5 must accept only external credentials that are NIST compliant.
Tri-Lab Operating System Stack (TOSS) 5 Security Technical Implementation Guide
V-264322
CAT II
The VMM must accept only external credentials that are NIST-compliant.
Virtual Machine Manager Security Requirements Guide
V-269574
CAT I
Xylok Security Suite must use a centralized user management solution.
Xylok Security Suite 20.x Security Technical Implementation Guide