End User authenticator management is the responsibility of the deployer. Intra-platform authenticator management is the responsibility of BOSH and Tanzu Operations Manager and CredHub. Rotating intra-system authenticators in Tanzu Application Service is a supported procedure. It is not yet fully automated, but may be accomplished through manual intervention.
it is a deployer responsibility to align organizational policy and operational procedures to supplement native Tanzu Application Service capabilities if and as needed.
Validation of end user PKI credentials is delegated to the enterprise IdM. Validation of intra-platform PKI credentials uses the deployer-configured CA trust chain. However, there is no OCSP or CRL checking for intra-platform PKI credentials. The strategy for avoiding reliance on a compromised credential is based upon based upon frequent rotation of short lived credentials.
The organization manages information system authenticators by:
Individual authenticators include, for example, passwords, tokens, biometrics, PKI certificates, and key cards. Initial authenticator content is the actual content (e.g., the initial password) as opposed to requirements about authenticator content (e.g., minimum password length). In many cases, developers ship information system components with factory default authentication credentials to allow for initial installation and configuration. Default authentication credentials are often well known, easily discoverable, and present a significant security risk. The requirement to protect individual authenticators may be implemented via control PL-4 or PS-6 for authenticators in the possession of individuals and by controls AC-3, AC-6, and SC-28 for authenticators stored within organizational information systems (e.g., passwords stored in hashed or encrypted formats, files containing encrypted or hashed passwords accessible with administrator privileges). Information systems support individual authenticator management by organization-defined settings and restrictions for various authenticator characteristics including, for example, minimum password length, password composition, validation time window for time synchronous one-time tokens, and number of allowed rejections during the verification stage of biometric authentication. Specific actions that can be taken to safeguard authenticators include, for example, maintaining possession of individual authenticators, not loaning or sharing individual authenticators with others, and reporting lost, stolen, or compromised authenticators immediately. Authenticator management includes issuing and revoking, when no longer needed, authenticators for temporary access such as that required for remote maintenance. Device authenticators include, for example, certificates and passwords.