TOC & Recently Viewed

Recently Viewed Topics

Configure Nessus for Hashicorp Vault (Database)

In Nessus Manager, you can integrate with Hashicorp Vault using SSH credentials. Complete the following steps to configure Nessus Manager with Hashicorp Vault using SSH.

Enable Database Plugins in the scanner to display them in the output.

Requirements

  • Nessus Manager account
  • Hashicorp Vault account

Required User Role: Standard, Administrator, or System Administrator

To integrate Nessus Manager with Hashicorp Vault using database credentials:

  1. Log in to Nessus Manager.

  2. Click Scans.

    The My Scans page appears.

  3. Click + New Scan.

    The Scan Templates page appears.

  4. Select a scan template.

    The selected scan template Settings page appears.

  5. In the Name box, type a name for the scan.

  6. In the Targets box, type an IP address, hostname, or range of IP addresses.
  7. (Optional) Add a description, folder location, scanner location, and specify target groups.
  8. Click the Credentials tab.

    The Credentials options appear. By default, the Categories drop-down box displays Host.

  9. In the Categories drop-down box, select Database.

    The Database options appear below.

  10. In the Categories list, click Database.

    The Database options appear.

  11. Click the Database Type drop-down box.

    The Database options appear.

  12. In the Database Type drop-down box, click Oracle.

  13. In the Auth Type drop-down box, click Hashicorp.

    The Hashicorp Vault options appear.

  14. Configure the Database credentials.

    Option Description

    Required

    Hashicorp Vault host

    The Hashicorp Vault IP address or DNS address.

    Note: If your Hashicorp Vault installation is in a subdirectory, you must include the subdirectory path. For example, type IP address or hostname / subdirectory path.

    yes
    Hashicorp Vault port The port on which Hashicorp Vault listens. no
    Authentication Type Specifies the authentication type for connecting to the instance: App Role or Certificates no
    Role ID The GUID provided by Hashicorp Vault when you configured your App Role. yes
    Role Secret ID

    The GUID generated by Hashicorp Vault when you configured your App Role.

    yes
    Authentication URL

    The URL Nessus Manager uses to access Hashicorp Vault.

    no

    Username Source A drop-down box to specify if the username is input manually or pulled from Hashicorp Vault. no
    Username Key The key name in Hashicorp Vault that usernames are stored under. no
    Password Key The key name in Hashicorp Vault that passwords are stored under. no
    Secret Name The key secret you want to retrieve values for. no
    Use SSL If enabled, Nessus Manager uses SSL through IIS for secure communications. You must configure SSL through IIS in Hashicorp Vault before enabling this option. no
    Verify SSL Certificate If enabled, Nessus Manager validates the SSL certificate. You must configure SSL through IIS in Hashicorp Vault before enabling this option. no
    Database Port The port on which Nessus Manager communicates with the database. no
    Auth Type The authentication method for the database credentials.

    Oracle values include:

    • SYSDBA
    • SYSOPER
    • NORMAL

    no
    Service Type (Oracle databases only) Valid values include: SID and SERVICE_NAME. no
    Service (Oracle database only) A specific field for the configuration for the database. yes
  15. Click Save.

Copyright © 2019 Tenable, Inc. All rights reserved. Tenable, Tenable.io, Tenable Network Security, Nessus, SecurityCenter, SecurityCenter Continuous View and Log Correlation Engine are registered trademarks of Tenable, Inc.. Tenable.sc, Lumin, Assure, and the Cyber Exposure Company are trademarks of Tenable, Inc. All other products or services are trademarks of their respective owners.