STIGhubSTIGhub
STIGsRMF ControlsCompare
STIGhub— A free STIG search and compliance tool·STIGs updated 3 days ago
Powered by Pylon·Privacy·Terms·© 2026 Beacon Cloud Solutions, Inc.
← Back to Red Hat Ansible Automation Controller Application Server Security Technical Implementation Guide

V-256906

CAT II (Medium)

Automation Controller must be configured to authenticate users individually, prior to using a group authenticator.

Rule ID

SV-256906r902288_rule

STIG

Red Hat Ansible Automation Controller Application Server Security Technical Implementation Guide

Version

V1R2

CCIs

CCI-000770

Discussion

Default superuser accounts, such as "root", are considered group authenticators. In the case of Automation Controller this is the "admin" account.

Check Content

Log in to the Automation Controller web console as an administrator and navigate to Access >> Users.

The only local user allowed is the default/breakglass "admin". All other users need to come from an external authentication source. If any other local users exist, this is a finding.

Fix Text

Log in to the Automation Controller web console as an administrator and navigate to Access >> Users.

Click the Username to be removed.

Select "Delete" and confirm.