SSH Integration

To configure SSH integration:

  1. Log in to
  2. Click Scans.
  3. Click + New Scan.

  4. Select a Scan Template.

    The scan configuration page appears.

  1. In the Name box, type a name for the scan.

  2. In the Targets box, type an IP address, hostname, or range of IP addresses.
  3. (Optional) Add a description, folder location, scanner location, and specify target groups.
  1. Click the Credentials tab.

    The Credentials options appear.

  2. In the Select a Credential menu, select the Host drop-down.
  3. Select SSH.

    The CyberArk field options appear.

  4. Configure each field for SSH authentication.

    Caution: Tenable strongly recommends encrypting communication between your on-site scanner and the CyberArk AIM gateway using HTTPS and/or client certificates. For information on securing the connection, refer to the User Guide and the Central Credential Provider Implementation Guide located at (login required).

    Option Description Required

    CyberArk Host

    The IP address or FQDN name for the CyberArk AIM Web Service. This can be the host, or the host with a custom URL added on in a single string.



    The port on which the CyberArk API communicates. By default, uses 443.



    The Application ID associated with the CyberArk API connection.


    Client Certificate The file that contains the PEM certificate used to communicate with the CyberArk host.


    Client Certificate Private Key The file that contains the PEM private key for the client certificate.


    Client Certificate Private Key Passphrase The passphrase for the private key, if required.

    yes, if private key requires

    Get credential by

    The method with which your CyberArk API credentials are retrieved. Can be Username, Identifier, or Address.

    Note: The frequency of queries for Username is one query per target. The frequency of queries for Identifier is one query per chunk. This feature requires all targets have the same identifier.

    Note: The Username option also adds the Address parameter of the API query and assigns the target IP of the resolved host to the Address parameter. This may lead to failure to fetch credentials if the CyberArk Account Details Address field contains a value other than the target IP address.


    (If Get credential by is Username) The username of the CyberArk user to request a password from.

    Domain (If Get credential by is Username) The domain to which the username belongs, if applicable. no

    (If Get credential by is either Username, Identifier, Address) The CyberArk safe the credential should be retrieved from.

    Account Name (If Get credential by is Identifier) The unique account name or identifier assigned to the CyberArk API credential. no

    Use SSL

    If enabled, the scanner uses SSL through IIS for secure communications. Enable this option if CyberArk is configured to support SSL through IIS.


    Verify SSL Certificate

    If enabled, the scanner validates the SSL certificate. Enable this option if CyberArk is configured to support SSL through IIS and you want to validate the certificate.


  1. Click Save.


  1. To verify the integration is working, click the launch button (highlighted below) to initiate an on-demand scan.

  2. Once the scan has completed, select the completed scan and look for Plugin ID 12634, which validates that authentication was successful. If the authentication is not successful, refer to the Debugging CyberArk Issues section of this document.