STIG ID: OL07-00-010440 | SRG: SRG-OS-000480-GPOS-00229 | Severity: high | CCI: | Vulnerability Id: V-221694
Failure to restrict system access to authenticated users negatively impacts operating system security.
Configure the operating system not to allow an unattended or automatic logon to the system via a graphical user interface.
Note: If the system does not have GNOME installed, this requirement is Not Applicable.
Add or edit the line for the "AutomaticLoginEnable" parameter in the [daemon] section of the "/etc/gdm/custom.conf" file to "false":
[daemon]
AutomaticLoginEnable=false
Verify the operating system does not allow an unattended or automatic logon to the system via a graphical user interface.
Note: If the system does not have GNOME installed, this requirement is Not Applicable.
Check for the value of the "AutomaticLoginEnable" in the "/etc/gdm/custom.conf" file with the following command:
# grep -i automaticloginenable /etc/gdm/custom.conf
AutomaticLoginEnable=false
If the value of "AutomaticLoginEnable" is not set to "false", this is a finding.