Note: The Address field in the CyberArk Account Details for an account/host must contain a valid IP/FQDN and must be resolvable on your network. This value is vetted during the collection and discovery process. Address values that are null, or unresolvable, are not added to the scan.
Note: Privilege Escalation is available, but only using the SUDO method at this time. More research is needed to explore other escalation methods.
Note: SSH Key authentication is supported, but escalated privileges after SSH Key authentication is not available at this time.
To configure SSH auto-discovery:
Log in to Tenable Vulnerability Management.
The My Scans page appears.
Click + New Scan.
The Scan Templates page appears.
Select a Scan Template.
The scan configuration page appears.
- In the Name box, type a name for the scan.
- In the Targets box, type an IP address, hostname, or range of IP addresses.
(Optional) Add a description, folder location, scanner location, and specify target groups.
Click the Credentials tab.
The Credentials pane appears.
In the Select a Credential menu, select the Host drop-down..
From the Authentication Method drop-down, select CyberArk SSH Auto-Discovery.
The CyberArk SSH Auto-Discovery field options appear:
Configure each field for the SSH authentication.
Option Description Required
The IP address or FQDN name for the user’s CyberArk Instance.
The port on which the CyberArk API communicates. By default, Tenable uses 443.
The Application ID associated with the CyberArk API connection.
Users may optionally specify a Safe to gather account information and request passwords.
no AIM Web Service Authentication Type There are two authentication methods established in the feature. IIS Basic Authentication and Certificate Authentication. Certificate Authentication can be either encrypted or unencrypted.
CyberArk PVWA Web UI Login Name Username to log in to CyberArk web console. This is used to authenticate to the PVWA REST API and gather bulk account information.
CyberArk PVWA Web UI Login Password Password for the username to log in to CyberArk web console. This is used to authenticate to the PVWA REST API and gather bulk account information.
CyberArk Platform Search String
String used in the PVWA REST API query parameters to gather bulk account information. For example, the user can enter UnixSSH Admin TestSafe, to gather all UnixSSH platform accounts containing a username Admin in a Safe called TestSafe.
Note: This is a non-exact keyword search. A best practice would be to create a custom platform name in CyberArk and enter that value in this field to improve accuracy.
Elevate Privileges with
Users can only select Nothing or sudo at this time.
If enabled, the scanner uses SSL through IIS for secure communications. Enable this option if CyberArk is configured to support SSL through IIS.
Verify SSL Certificate
If enabled, the scanner validates the SSL certificate. Enable this option if CyberArk is configured to support SSL through IIS and you want to validate the certificate.
Caution: Tenable strongly recommends encrypting communication between your on-site scanner and the CyberArk AIM gateway using HTTPS and/or client certificates. For information on securing the connection, refer to the Tenable Vulnerability Management User Guide and the Central Credential Provider Implementation Guide located at cyberark.com (login required).
- Click Save.