Configure Nessus for Hashicorp Vault (Database)

In Nessus Manager, you can integrate with Hashicorp Vault using SSH credentials. Complete the following steps to configure Nessus Manager with Hashicorp Vault using SSH.

Enable Database Plugins in the scanner to display them in the output.


  • Nessus Manager account
  • Hashicorp Vault account

Note: Hashicorp Vault provides options for, both, KV v1 and v2. However, Tenable only supports integration with KV v1.

Required User Role: Standard, Administrator, or System Administrator

To integrate Nessus Manager with Hashicorp Vault using database credentials:

  1. (missing or bad snippet)
  2. (missing or bad snippet)
  3. (missing or bad snippet)

  4. Select a scan template.

    The selected scan template Settings page appears.

  5. In the Name box, type a name for the scan.

  6. In the Targets box, type an IP address, hostname, or range of IP addresses.
  7. (Optional) Add a description, folder location, scanner location, and specify target groups.
  8. (missing or bad snippet)
  9. In the Categories drop-down box, select Database.

    The Database options appear below.

  10. In the Categories list, click Database.

    The Database options appear.

  11. Click the Database Type drop-down box.

    The Database options appear.

  12. In the Database Type drop-down box, click Oracle.

  13. In the Auth Type drop-down box, click Hashicorp.

    The Hashicorp Vault options appear.

  14. Configure the Database credentials.

    Option Description


    Hashicorp Vault host

    The Hashicorp Vault IP address or DNS address.

    Note: If your Hashicorp Vault installation is in a subdirectory, you must include the subdirectory path. For example, type IP address or hostname / subdirectory path.

    Hashicorp Vault port The port on which Hashicorp Vault listens. no
    Authentication Type

    Specifies the authentication type for connecting to the instance: App Role or Certificates.

    If you select Certificates, additional options for Hashicorp Client Certificate( Required) and Hashicorp Client Certificate Private Key (Required) appear. Select the appropriate files for the client certificate and private key.

    Role ID The GUID provided by Hashicorp Vault when you configured your App Role. yes
    Role Secret ID

    The GUID generated by Hashicorp Vault when you configured your App Role.

    Authentication URL

    The URL Nessus Manager uses to access Hashicorp Vault.


    Username Source A drop-down box to specify if the username is input manually or pulled from Hashicorp Vault. no
    Username Key The key name in Hashicorp Vault that usernames are stored under. no
    Password Key The key name in Hashicorp Vault that passwords are stored under. no
    Secret Name The key secret you want to retrieve values for. no
    Use SSL If enabled, Nessus Manager uses SSL through IIS for secure communications. You must configure SSL through IIS in Hashicorp Vault before enabling this option. no
    Verify SSL Certificate If enabled, Nessus Manager validates the SSL certificate. You must configure SSL through IIS in Hashicorp Vault before enabling this option. no
    Database Port The port on which Nessus Manager communicates with the database. no
    Auth Type The authentication method for the database credentials.

    Oracle values include:

    • SYSDBA
    • NORMAL

    Service Type (Oracle databases only) Valid values include: SID and SERVICE_NAME. no
    Service (Oracle database only) A specific field for the configuration for the database. yes
  15. Click Save.