Tenable Nessus for BeyondTrust (SSH)

Nessus provides an option forBeyondTrust SSH integration. Complete the following steps to configure Nessus with BeyondTrust in SSH.


  • Nessus Manager account
  • BeyondTrust account

Required User Role: Standard, Administrator, or System administrator

To configure Nessus for BeyondTrust SSH:

  1. Log in to Nessus.

  2. Click Scans.

    The My Scans page appears.

  3. Click + New Scan.

    The Scan Templates page appears.

  4. Select a scan template.

    The selected scan template Settings page appears.

  1. In the Name box, type a name for the scan.

  2. In the Targets box, type an IP address, hostname, or range of IP addresses.
  3. (Optional) Add a description, folder location, scanner location, and specify target groups.
  4. Click the Credentials tab.

    The Credentials options appear.

  5. In the left-hand menu, click the SSH option.

    The SSH section appears.

  6. In the Windows section, click the Authentication method drop-down box.

    The Authentication method drop-down box options appear.

  7. Select BeyondTrust.

    The BeyondTrust options appear.

  8. Configure each field for SSH authentication.

    Option Description Required


    The username to log in to the hosts you want to scan.


    BeyondTrust host

    The BeyondTrust IP address or DNS address.


    BeyondTrust port

    The port on which BeyondTrust listens.


    BeyondTrust API user

    The API user provided by BeyondTrust.


    BeyondTrust API key

    The API key provided by BeyondTrust.


    Checkout duration

    The length of time, in minutes, that you want to keep credentials checked out in BeyondTrust. Configure the Checkout duration to exceed the typical duration of your Nessus scans. If a password from a previous scan is still checked out when a new scan begins, the new scan fails.

    Note: Configure the password change interval in BeyondTrust so that password changes do not disrupt your Nessus scans. If BeyondTrust changes a password during a scan, the scan fails.


    Use SSL

    If enabled, Nessus uses SSL through IIS for secure communications. You must configure SSL through IIS in BeyondTrust before enabling this option.


    Verify SSL certificate

    If enabled, Nessus validates the SSL certificate. You must configure SSL through IIS in BeyondTrust before enabling this option.


    Use private key

    If enabled, Nessus uses private key-based authentication for SSH connections instead of password authentication. If it fails, the password is requested.


    Use privilege escalation

    If enabled, BeyondTrust uses the configured privilege escalation command. If it returns something, it will use it for the scan.


    Custom password prompt The password prompt used by the target host. Only use this setting when an interactive SSH session fails due to Nessus receiving an unrecognized password prompt on the target host's interactive SSH shell.


  9. Click Save.

What to do next:

To verify the integration is working:

  1. On the My Scans page, click the Launch button to initiate an on-demand scan.

  2. Once the scan completes, click the scan.

    The scan details appear.

    Look for the following message - OS Identification and Installed Software Enumeration over SSH: 97993. This validates that authentication was successful.