Phase 1: Platform Initialization
Platform Initialization is the first phase of your Tenable One adoption. This phase focuses on bringing the platform online and establishing the core security, access, and structural settings for a functional and accessible environment.
Expected Outcomes
During this phase, you successfully bring the platform online with the core access settings in place. This includes:
-
Validating that your platform is active and in the correct region. For more information, see Tenable Cloud Region Availability.
-
Confirming administrator login credentials and configuring multi-factor authentication (MFA) and/or single sign-on (SSO) via SAML. For more information, see Configure Two-Factor Authentication and SAML.
-
Creating and testing your user groups and role-based access control (RBAC) structure (for example, Admins, Analyst, Read-Only). For more information, see User Groups.
-
Ensuring all licensed components (for example, Tenable Vulnerability Management, Tenable Cloud Security) are accessible under the Workspace. For more information, see View the Workspace Page.
Why This Is Important
Completing this phase ensures that your Tenable One environment is secure from the start, that user access is correctly governed by roles, and that your licensed components are visible and ready for configuration. This foundation is essential before ingesting data.
Verification
You can verify the success of this phase by confirming the following:
-
At least one administrator and one standard user can successfully log in. For more information, see Log In to Tenable and Create a User Account.
-
The License Information page reflects your expected asset allocation and deployed region. For more information, see License Information.
-
Your expected components are visible under the Workspace. For more information, see View the Workspace Page.
Note: Tenable OT Security and Tenable Identity Exposure require additional configuration before they are accessible in the Workspace. For more information, see Configure SAML Integration for Tenable One (Tenable OT Security and Access the Workspace (Tenable Identity Exposure).
What to do next:
Proceed to Phase 2: Component Deployment.