Back to bug 2228465
| Who | When | What | Removed | Added |
|---|---|---|---|---|
| Red Hat Bugzilla | 2023-08-02 12:22:22 UTC | Pool ID | sst_security_compliance_rhel_8 | |
| Red Hat One Jira (issues.redhat.com) | 2023-08-02 12:23:25 UTC | Link ID | Red Hat Issue Tracker RHELPLAN-164141 | |
| Milan Lysonek | 2023-08-02 14:23:25 UTC | Doc Type | If docs needed, set a value | Bug Fix |
| Doc Text | .Faillock settings clarification in STIG profile Mapping of rule accounts_passwords_pam_faillock_interval has been clarified in the STIG profile. The rule now covers both RHEL-08-020012 and RHEL-08-020013.The reason for this change in that accounts_passwords_pam_faillock_interval checks for `faillock` configuration in both `/etc/pam.d/password-auth`, `/etc/pam.d/system-auth` and `/etc/security/faillock.conf`. |
|||
| Vojtech Polasek | 2023-08-04 07:25:32 UTC | Status | NEW | POST |
| Matěj Týč | 2023-08-11 12:29:56 UTC | Status | POST | MODIFIED |
| CC | matyc |
Back to bug 2228465