Tenable.io provides an option for BeyondTrust Windows integration. Complete the following steps to configure Tenable.io with BeyondTrust in SSH.
- Tenable.io account
- BeyondTrust account
Required User Role: Standard, Scan Manager, or Administrator
To configure Tenable.io for BeyondTrustSSH:
- Log in to Tenable.io.
In the upper-left corner, click the button.
The left navigation plane appears.
In the left navigation plane, click Settings.
The Settings page appears.
Click the Credentials widget.
The Credentials page appears. The credentials table lists the managed credentials you have permission to view.
Click the button next to the Credentials title.
The credential form plane appears.
In the Host section, click SSH.
The selected credential options appear.
In the Authentication Method drop-down, select BeyondTrust.
The BeyondTrust options appear.
Configure the BeyondTrust credentials.
Option Description Required
The username to log in to the hosts you want to scan.
The BeyondTrust IP address or DNS address.
The port on which BeyondTrust listens.
BeyondTrust API user
The API user provided by BeyondTrust.
BeyondTrust API key
The API key provided by BeyondTrust.
The length of time, in minutes, that you want to keep credentials checked out in BeyondTrust. Configure the Checkout duration to exceed the typical duration of your Tenable.io scans. If a password from a previous scan is still checked out when a new scan begins, the new scan fails.
Note: Configure the password change interval in BeyondTrust so that password changes do not disrupt your Tenable.io scans. If BeyondTrust changes a password during a scan, the scan fails.
When enabled, Tenable.io uses SSL through IIS for secure communications. You must configure SSL through IIS in BeyondTrust before enabling this option.
Verify SSL certificate
When enabled, Tenable.io validates the SSL certificate. You must configure SSL through IIS in BeyondTrust before enabling this option.
Use private key
When enabled, Tenable.io uses private key-based authentication for SSH connections instead of password authentication. If it fails, the password is requested.
Use privilege escalation
When enabled, BeyondTrust uses the configured privilege escalation command. If it returns something, it will use it for the scan.
Custom password prompt The password prompt used by the target host. Only use this setting when an interactive SSH session fails due to Tenable.io receiving an unrecognized password prompt on the target host's interactive SSH shell.
What to do next:
To verify the integration is working: