You are here: Scans > About Scans > Credentials > Plaintext Authentication

Plaintext Authentication

Caution: Using plaintext credentials is not recommended. Use encrypted authentication methods when possible.

If a secure method of performing credentialed checks is not available, users can force Tenable.io to try to perform checks over unsecure protocols; use the Plaintext Authentication options.

This menu allows the Tenable.io scanner to use credentials when testing HTTP, NNTP, FTP, POP2, POP3, IMAP, IPMI, SNMPv1/v2c, and telnet/rsh/rexec.

By supplying credentials, Tenable.io may have the ability to do more extensive checks to determine vulnerabilities. HTTP credentials supplied are used for Basic and Digest authentication only.

Credentials for FTP, IPMI, NNTP, POP2, and POP3 require only a username and password.

Copyright © 2017. Tenable Network Security, Inc. All rights reserved. Tenable Network Security, Nessus, SecurityCenter Continuous View, Passive Vulnerability Scanner, and Log Correlation Engine are registered trademarks of Tenable Network Security, Inc. All other products or services are trademarks of their respective owners.