TOC & Recently Viewed

Recently Viewed Topics

Authorizing your app to use the Container Security API

To utilize the Container Security API, requests require authentication using Access and Secret keys sent with their headers.

API Keys

If desired, you can generate Access and Secret keys via the interface. Alternatively, these keys can be generated per account through session: keys or users: keys and can be used to authenticate without creating a session.

Add them to your request using the following HTTP header:

X-ApiKeys: accessKey={accessKey}; secretKey={secretKey};


curl -H "X-ApiKeys: accessKey={accessKey}; secretKey={secretKey}"<job_id>

In addition, it is possible to perform actions as if authenticated as a different user by adding an additional HTTP header:

X-Impersonate: username={username}


curl -H "X-Impersonate: username={username}" -H "X-ApiKeys: accessKey={accessKey}; secretKey={secretKey}"<job_id>

Copyright © 2017. Tenable Network Security, Inc. All rights reserved. Tenable Network Security, Nessus, SecurityCenter Continuous View, Passive Vulnerability Scanner, and Log Correlation Engine are registered trademarks of Tenable Network Security, Inc. All other products or services are trademarks of their respective owners.