STIGhubSTIGhub
STIGsRMF ControlsCompare

STIGhub

A free tool to search and browse the entire DISA STIG library. Saves up to 75% in security compliance research time.

Navigation

  • Browse STIGs
  • Search
  • RMF Controls
  • Compare Versions

Resources

  • About
  • Release Notes
  • VPAT
  • DISA STIG Library
STIGs updated 4 hours ago
Powered by Pylon
© 2026 Beacon Cloud Solutions, Inc. All rights reserved.
← Back to Solaris 11 SPARC Security Technical Implementation Guide

V-216427

CAT II (Medium)

Duplicate UIDs must not exist for multiple non-organizational users.

Rule ID

SV-216427r958504_rule

STIG

Solaris 11 SPARC Security Technical Implementation Guide

Version

V3R5

CCIs

CCI-000804

Discussion

Non-organizational users must be assigned unique UIDs for accountability and to ensure appropriate access protections.

Check Content

The root role is required.

Check that there are no duplicate UIDs.

# logins -d

If output is produced, this is a finding.

Fix Text

The root role is required.

Determine if there exists any users who share a common UID, and work with those users to determine the best course of action in accordance with site policy.
Change user account names and UID or delete accounts, so each account has a unique name and UID.