STIGhubSTIGhub
STIGsRMF ControlsCompare

STIGhub

A free tool to search and browse the entire DISA STIG library. Saves up to 75% in security compliance research time.

Navigation

  • Browse STIGs
  • Search
  • RMF Controls
  • Compare Versions

Resources

  • About
  • Release Notes
  • VPAT
  • DISA STIG Library
STIGs updated 1 hour ago
Powered by Pylon
© 2026 Beacon Cloud Solutions, Inc. All rights reserved.
← Back to Ivanti MobileIron Sentry 9.x ALG Security Technical Implementation Guide

V-251028

CAT II (Medium)

The Sentry providing PKI-based mobile device authentication intermediary services must map authenticated identities to the mobile device account.

Rule ID

SV-251028r802306_rule

STIG

Ivanti MobileIron Sentry 9.x ALG Security Technical Implementation Guide

Version

V1R1

CCIs

CCI-000187

Discussion

Authorization for access to any network element requires an approved and assigned individual account identifier. To ensure only the assigned individual is using the account, the account must be bound to a user certificate when PKI-based authentication is implemented. This requirement applies to ALGs that provide user authentication intermediary services (e.g., authentication gateway or TLS gateway). This does not apply to authentication for the purpose of configuring the device itself (device management).

Check Content

Verify the Sentry is configured with certificate-based authentication with the appropriate certificate field user mappings.
 
1. In the MobileIron Core Portal, select Services >> Sentry.
2. Click the "Edit" icon for the Standalone Sentry entry.
3. In the "Device Authentication Configuration" section, verify certificate mappings are configured in the "certificate mapping" field.

If Sentry is not configured to map authenticated identities to the user accounts, this is a finding.

Fix Text

If PKI-based user authentication intermediary services are provided, configure the Sentry to map the authenticated identities to the user account.

1. In the MobileIron Core Portal, select Services >> Sentry.
2. Click the "Edit" icon the Standalone Sentry entry.
3. In the "Device Authentication Configuration" section, configure certificate mappings in the "certificate mapping" field (i.e., User UPN = Subject Alternative Name: NT Principal Name).
4. Click "Save".