Configure a Tenable Nessus Scan
Required User Role: Standard, Scan Manager, or Administrator
Before you begin:
-
You must create a CyberArk Secrets Manager workload with API key authentication which has read access to the secrets you plan to use.
To configure scans:
-
Log in to Tenable Nessus.
-
In the upper-right corner, click + New Scan.
The Scan Templates page appears.
-
Select a Scan Template.
The scan configuration page appears.
- In the Name box, type a name for the scan.
- In the Targets box, type an IP address, hostname, or range of IP addresses.
-
(Optional) Add a description, folder location, scanner location, and specify target groups.
-
Click the Credentials tab.
The Credentials pane appears.
-
Select a credential with support for CyberArk Secrets Manager as an authentication type. For example, SSH, Windows or SNMP (in the Host category), or Database, Nutanix Prism Central, VMware vCenter API or VMware ESXi SOAP API.
The Settings options appear.
-
In the Authentication Type drop-down box, click CyberArk Secrets Manager.
The CyberArk Secrets Manager options appear.
-
Configure each option for the CyberArk Secrets Manager authentication type.
Option Description Required CyberArk Secrets Manager Host
The CyberArk Secrets Manager IP address or DNS address.
Yes
CyberArk Secrets Manager Port
The port on which the CyberArk API communicates. By default, Tenable uses 443.
Yes
CyberArk Secrets Manager Login Name
The login name used to authenticate to CyberArk Secrets Manager.
For workload (host) authentication, it is the workload (host) ID with the prefix host/. For example, a host data/MyWorkload would use host/data/MyWorkload.
Yes
CyberArk Secrets Manager API Key The API key of the workload or login.
Yes
CyberArk Secrets Manager Authentication Base URL This value is combined with the login name to form the authentication API endpoint. The default value is /api/authn/conjur.
For example, a secret ID of MySecret and vault path of variable/data/vault/MyVault would result in the following request endpoint: /api/secrets/conjur/variable/data/vault/MyVault/MySecret
No
CyberArk Secrets Manager Kind
The kind of resource which contains the secret. In most configurations, this should be the literal string variable.
Yes
CyberArk Secrets Manager Credential ID
This is the unique identifier of the Secrets Manager variable which contains the credential. In most configurations, this value should begin with data/ It may include the path to the CyberArk Vault as well. For example, to retrieve a secret named MySecret from the vault named MyVault, use: data/vault/MyVault/MySecret
Yes
Domain
Windows Only: the domain to use for authentication.
Required if Kerberos is enabled.
Fetch Domain
Windows Only: pull the value of the Windows domain from the CyberArk Secrets Manager API.
No
Kerberos Target Authentication
If enabled, Kerberos authentication is used to log in to the specified target.
No
Key Distribution Center (KDC)
(Required if Kerberos Target Authentication is enabled.) This host supplies the session tickets for the user.
Yes
KDC Transport
The KDC uses TCP by default in Linux implementations. For UDP, change this option. If you need to change the KDC Transport value, you may also need to change the port as the KDC UDP uses either port 88 or 750 by default, depending on the implementation.
No
Realm (Required if Kerberos Target Authentication is enabled.) SSH Only: the realm to use for Kerberos authentication.
Yes SSL
Use SSL for secure communications.
Yes
Verify SSL Certificate
Validate the SSL certificate. Recommended.
No
- Click Save.