STIGhubSTIGhub
STIGsRMF ControlsCompare

STIGhub

A free tool to search and browse the entire DISA STIG library. Saves up to 75% in security compliance research time.

Navigation

  • Browse STIGs
  • Search
  • RMF Controls
  • Compare Versions

Resources

  • About
  • Release Notes
  • VPAT
  • DISA STIG Library
STIGs updated 3 hours ago
Powered by Pylon
© 2026 Beacon Cloud Solutions, Inc. All rights reserved.
← Back to Cloud Linux AlmaLinux OS 9 Security Technical Implementation Guide

V-269409

CAT II (Medium)

AlmaLinux OS 9 must prohibit the use of cached authenticators after one day.

Rule ID

SV-269409r1050292_rule

STIG

Cloud Linux AlmaLinux OS 9 Security Technical Implementation Guide

Version

V1R6

CCIs

CCI-002007

Discussion

Password complexity, or strength, is a measure of the effectiveness of a password in resisting attempts at guessing and brute-force attacks. If the information system or application allows the user to consecutively reuse their password when that password has exceeded its defined lifetime, the end result is a password that is not changed as per policy requirements. If cached authentication information is out-of-date, the validity of the authentication information may be questionable.

Check Content

Note: If smart card authentication is not being used on the system, this requirement is Not Applicable.

Verify that the System Security Services Daemon (SSSD) prohibits the use of cached authentications after one day.

Check that SSSD allows cached authentications with the following command:

$  grep cache_credentials /etc/sssd/sssd.conf /etc/sssd/conf.d/*

/etc/sssd/conf.d/certificate_verification.conf:cache_credentials = true

If "cache_credentials" is set to "false" or missing from the configuration, this is not a finding and no further checks are required.

If "cache_credentials" is set to "true", check that SSSD prohibits the use of cached authentications after one day with the following command:

$ grep offline_credentials_expiration /etc/sssd/sssd.conf /etc/sssd/conf.d/

/etc/sssd/conf.d/certificate_verification.conf:offline_credentials_expiration = 1

If "offline_credentials_expiration" is not set to a value of "1", this is a finding.

Fix Text

Configure the SSSD to prohibit the use of cached authentications after one day.

Add/modify the following line in "/etc/sssd/sssd.conf" (or a conf file in /etc/sssd/conf.d/) just below the line [pam]:

offline_credentials_expiration = 1