Configure Tenable Security Center for Centrify (SSH)

In Tenable Security Center, you can integrate with Centrify using SSH credentials. Complete the following steps to configure Tenable Security Center with Centrify using SSH.

Requirements

  • Tenable Security Center account
  • Centrify account

Required User Role: Standard, Administrator, or System administrator

To integrate Tenable Security Center with Centrify using SSH credentials:

  1. Log in to Tenable Security Center.
  1. Click Scans.

    The My Scans page appears.

  2. Click + New Scan.

    The Scan Templates page appears.

  3. Select a scan template.

    The selected scan template Settings page appears.

  4. In the Name box, type a name for the scan.

  5. In the Targets box, type an IP address, hostname, or range of IP addresses.
  6. (Optional) Add a description, folder location, scanner location, and specify target groups.
  7. Click the Credentials tab.

    The Credentials options appear. By default, the Categories drop-down box displays Host.

  8. In the left menu, selectSSH.

    The SSH settings appear.

  9. In the SSH settings, click the Authentication method drop-down box.

    The Authentication method drop-down box options appear.

  10. Select Centrify.

    The Centrify options appear.

  11. Configure the SSH credentials.

    Option Description
    Centrify Host

    (Required) The Centrify IP address or DNS address.

    Note: If your Centrify installation is in a subdirectory, you must include the subdirectory path. For example, type IP address or hostname/subdirectory path.

    Centrify Port (Required) The port on which Centrify listens. By default, Tenable Security CenterTenable Vulnerability Management uses port 443.
    API User (Required) The API user provided by Centrify.
    API Key (Required) The API key provided by Centrify.
    Tenant (Required) The Centrify tenant associated with the API. By default, Tenable Security CenterTenable Vulnerability Management uses centrify.
    Authentication URL (Required) The URL Tenable Security CenterTenable Vulnerability Management uses to access Centrify. By default, Tenable Security CenterTenable Vulnerability Management uses /Security.
    Password Query URL (Required) The URL Tenable Security CenterTenable Vulnerability Management uses to query the passwords in Centrify. By default, Tenable Security Center uses /RedRock.
    Password Engine URL

    (Required) The URL Tenable Security CenterTenable Vulnerability Management uses to access the passwords in Centrify. By default, Tenable Security CenterTenable Vulnerability Management uses /ServerManage.

    Username (Required) The username to log in to the hosts you want to scan.
    Checkout Duration

    (Required) The length of time, in minutes, that you want to keep credentials checked out in Centrify.

    Configure the Checkout Duration to exceed the typical duration of your Tenable Security Center scans so that password changes do not disrupt your Tenable Security CenterTenable Vulnerability Management scans. If Centrify changes a password during a scan, the scan fails. If a password from a previous scan is still checked out when a new scan begins, the new scan fails.

    Use SSL When enabled, Tenable Security CenterTenable Vulnerability Management uses SSL through IIS for secure communications. You must configure SSL through IIS in Centrify before enabling this option.
    Verify SSL Certificate When enabled, Tenable Security CenterTenable Vulnerability Management validates the SSL certificate. You must configure SSL through IIS in Centrify before enabling this option.
  1. Click Save.

What to do next:

To verify the integration is working:

  1. On the My Scans page, click the Launch button to initiate an on-demand scan.

  2. Once the scan completes, select the completed scan and look for Plugin ID 97993 and the corresponding message - It was possible to log into the remote host via SSH using 'password' authentication. This result validates that authentication was successful.