
The STIG requires that all GIDs in `/etc/passwd` are present in `/etc/group` and this patch adds a check for that condition. Documentation is included. Implements: blueprint security-rhel7-stig Change-Id: If6657bd91b5f77c2a7da534d763d3f4c5dc8e0cf
266 B
266 B
---id: RHEL-07-020300 status: implemented tag: auth ---
If any users are found with invalid GIDs, those users are printed in
the Ansible output. Deployers should review the list and ensure all
users are assigned to a valid group that is defined in
/etc/group
.