STIG ID: OL07-00-010450 | SRG: SRG-OS-000480-GPOS-00229 | Severity: high | CCI: | Vulnerability Id: V-221695
Failure to restrict system access to authenticated users negatively impacts operating system security.
Configure the operating system not to allow an unrestricted account to log on to the system via a graphical user interface.
Note: If the system does not have GNOME installed, this requirement is Not Applicable.
Add or edit the line for the "TimedLoginEnable" parameter in the [daemon] section of the "/etc/gdm/custom.conf" file to "false":
[daemon]
TimedLoginEnable=false
Verify the operating system does not allow an unrestricted logon to the system via a graphical user interface.
Note: If the system does not have GNOME installed, this requirement is Not Applicable.
Check for the value of the "TimedLoginEnable" parameter in "/etc/gdm/custom.conf" file with the following command:
# grep -i timedloginenable /etc/gdm/custom.conf
TimedLoginEnable=false
If the value of "TimedLoginEnable" is not set to "false", this is a finding.