STIGhubSTIGhub
STIGsRMF ControlsCompare

STIGhub

A free tool to search and browse the entire DISA STIG library. Saves up to 75% in security compliance research time.

Navigation

  • Browse STIGs
  • Search
  • RMF Controls
  • Compare Versions

Resources

  • About
  • Release Notes
  • VPAT
  • DISA STIG Library
STIGs updated 3 hours ago
Powered by Pylon
© 2026 Beacon Cloud Solutions, Inc. All rights reserved.
← Back to VMware vRealize Automation 7.x tc Server Security Technical Implementation Guide

V-240803

CAT II (Medium)

tc Server VCAC must encrypt passwords during transmission.

Rule ID

SV-240803r879609_rule

STIG

VMware vRealize Automation 7.x tc Server Security Technical Implementation Guide

Version

V2R3

CCIs

CCI-000197

Discussion

Data used to authenticate, especially passwords, needs to be protected at all times, and encryption is the standard method for protecting authentication data during transmission. Data used to authenticate can be passed to and from the web server for many reasons. Examples include data passed from a user to the web server through an HTTPS connection for authentication, the web server authenticating to a backend database for data retrieval and posting, and the web server authenticating to a clustered web server manager for an update. HTTP connections in tc Server are managed through the Connector object. Setting the Connector's SSLEnabled flag, SSL handshake/encryption/decryption is enabled.

Check Content

Navigate to and open /etc/vcac/server.xml.

Navigate to the <Connector> node.

If the value of "SSLEnabled" is not set to "true" or is missing, this is a finding.

Fix Text

Navigate to and open /etc/vcac/server.xml.

Navigate to the <Connector> node.

Configure each <Connector> node with the value 'SSLEnabled="true"'.