Bug 2228442

Summary: scap results should be clear about what values are acceptable for "pam faillock deny" and "pam faillock interval". [rhel-8.6.0.z]
Product: Red Hat Enterprise Linux 8 Reporter: RHEL Program Management Team <pgm-rhel-tools>
Component: scap-security-guideAssignee: Vojtech Polasek <vpolasek>
Status: VERIFIED --- QA Contact: Milan Lysonek <mlysonek>
Severity: medium Docs Contact:
Priority: unspecified    
Version: 8.6CC: ggasparb, jcerny, maburgha, mhaicman, mlysonek, peter.vreman, suwu, wsato
Target Milestone: rcKeywords: AutoVerified, Triaged, ZStream
Target Release: ---   
Hardware: Unspecified   
OS: Linux   
Whiteboard:
Fixed In Version: scap-security-guide-0.1.69-1.el8_6 Doc Type: Bug Fix
Doc Text:
.Rules related to the PAM faillock option have clarified description Rules related to PAM faillock rules have contained description that was misaligned with some profile values.These rules have been modified so that XCCDF variable which is used in their checks and remediations is displayed in the description. Therefore, the descriptions are no longer misleading. This change is affecting the following rules: - accounts_passwords_pam_faillock_deny - accounts_passwords_pam_faillock_interval - accounts_passwords_pam_faillock_dir - accounts_passwords_pam_faillock_unlock_time
Story Points: ---
Clone Of: 2175882 Environment:
Last Closed: Type: ---
Regression: --- Mount Type: ---
Documentation: --- CRM:
Verified Versions: Category: ---
oVirt Team: --- RHEL 7.3 requirements from Atomic Host:
Cloudforms Team: --- Target Upstream Version:
Embargoed:
Bug Depends On: 2175882    
Bug Blocks: