STIGhubSTIGhub
STIGsRMF ControlsCompare

STIGhub

A free tool to search and browse the entire DISA STIG library. Saves up to 75% in security compliance research time.

Navigation

  • Browse STIGs
  • Search
  • RMF Controls
  • Compare Versions

Resources

  • About
  • Release Notes
  • VPAT
  • DISA STIG Library
STIGs updated 5 hours ago
Powered by Pylon
© 2026 Beacon Cloud Solutions, Inc. All rights reserved.
← Back to Axonius Federal Systems Ax-OS Security Technical Implementation Guide

V-276011

CAT I (High)

Ax-OS must use multifactor authentication for network access to nonprivileged accounts.

Rule ID

SV-276011r1123259_rule

STIG

Axonius Federal Systems Ax-OS Security Technical Implementation Guide

Version

V1R2

CCIs

CCI-000766

Discussion

To ensure accountability and prevent unauthenticated access, nonprivileged users must utilize multifactor authentication to prevent potential misuse and compromise of the system. Multifactor authentication uses two or more factors to achieve authentication. Factors include: (i) Something you know (e.g., password/PIN); (ii) Something you have (e.g., cryptographic identification device, token); or (iii) Something you are (e.g., biometric). A nonprivileged account is any information system account with authorizations of a nonprivileged user. Network access is any access to an application by a user (or process acting on behalf of a user) that is obtained through a network connection. Applications that integrate with the DOD Active Directory and use the DOD Common Access Card (CAC) are examples of compliant multifactor authentication solutions.

Check Content

Select the gear icon (System Settings) >> Access Management >> LDAP & SAML.

Under LDAP & SAML, if the slide bar for "Allow LDAP Logins" or "Allow SAML Logins" is not selected, this is a finding.

If the LDAP or SAML configuration does not point to an authentication source approved by the authorizing official (AO), this is a finding.

Fix Text

Select the gear icon (System Settings) >> Access Management >> LDAP & SAML.

Under LDAP & SAML, enable either the slide bar for "Allow LDAP Logins" or the slide bar for "Allow SAML Logins".

Configure the remaining fields for the environment.