STIGhubSTIGhub
STIGsSearchCompareAbout

STIGhub

A free tool to search and browse the entire DISA STIG library. Saves up to 75% in security compliance research time.

Navigation

  • Browse STIGs
  • Search
  • Compare Versions

Resources

  • About
  • VPAT
  • DISA STIG Library
STIGs updated 2 hours ago
Powered by Pylon
© 2026 Beacon Cloud Solutions, Inc. All rights reserved.
← Back to Application Layer Gateway Security Requirements Guide

V-204951

CAT II (Medium)

The ALG providing PKI-based user authentication intermediary services must map authenticated identities to the user account.

Rule ID

SV-204951r395988_rule

STIG

Application Layer Gateway Security Requirements Guide

Version

V2R3

CCIs

CCI-000187

Discussion

Authorization for access to any network element requires an approved and assigned individual account identifier. To ensure only the assigned individual is using the account, the account must be bound to a user certificate when PKI-based authentication is implemented. This requirement applies to ALGs that provide user authentication intermediary services (e.g., authentication gateway or TLS gateway). This does not apply to authentication for the purpose of configuring the device itself (device management).

Check Content

If the ALG does not provide PKI-based user authentication intermediary services, this is not applicable.

Verify the ALG maps the authenticated identity to the user account for PKI-based authentication.

If the ALG does not map the authenticated identity to the user account for PKI-based authentication, this is a finding.

Fix Text

If PKI-based user authentication intermediary services are provided, configure the ALG to map the authenticated identities to the user account.