TOC & Recently Viewed

Recently Viewed Topics

User Accounts

Path: Users > Users

The Users page displays the user accounts on SecurityCenter. You can sort the columns or apply filters to locate specific user accounts. You can also Add a User or Delete a User.

More than one Administrator can be created per SecurityCenter, and multiple Security Managers may be created per organization. It is recommended to make at least one TNS-authenticated Administrator and Security Manger user per organization. If the LDAP service becomes unavailable, you can still log in.

User Account Options

When adding a new user, the Add User page is different for Administrators and Security Managers and the options you see depend on your selections within other options.

Option Description
Role

The role assigned to the user. For more information, see User Roles.

A user may only create new users with permissions that the creating user currently has. For example, if a user is an Auditor, they can create new Auditors or lesser roles.

Note: Administrator users can create Administrator or Security Manager user accounts. All other users can create user accounts at their own privilege level or lower. For example, if a Custom Role user has the Create Policies privilege enabled and Update Feeds privilege disabled, that user can create users with the Create Policies privilege, but not the Update feeds privilege.

Group

The group where you want to assign the user account. A user's group determines their access to SecurityCenter resources.

Organization The organization where you want to assign the user account.
First Name / Last Name (Optional) The given first name and last name for the user.
Username / Password (TNS only)

The username and password for the user account.

When selecting a username, it is sometimes easier to focus on the person’s real name as a convention (e.g., Bob Smith would become bsmith). However, it may also be useful to assign names based on role, such as “auditNY”.

Note: The username value is case-sensitive.

Tip:Tenable™ recommends using passwords that meet stringent length and complexity requirements.

Type

The type of authentication you want to perform on the user:

  • Tenable Network Security (TNS)
  • Lightweight Directory Access Protocol (LDAP)

If no LDAP server is configured within your organization, the Type option is hidden and TNS authentication is performed.

User Must Change Password (TNS only)

When enabled, the user is prompted to change their password after initial login.

LDAP Server (LDAP only) The server you want to use to authenticate the user.
Search String (LDAP only)

The LDAP search string you want to use to filter your user search. Use the format: “attribute=<filter text>”. Wildcards are permitted and the option accepts up to 1024 characters.

Examples

sAMAccountName=*

mail=a*

displayName=C*

LDAP Users Found (LDAP-only)

A filtered list of LDAP user accounts retrieved by the Search String. Your selection in this option populates the Username option.

Username (LDAP-only)

The username, populated by your LDAP Users Found selection. This username must match a user on the LDAP server in order to authenticate successfully.

Time Zone The time zone for the user.
Enable Cached Fetching

(Optional) When enabled, SecurityCenter caches plugin policy information and performs plugin policy downloads once per page load.

Group

This sets the default permissions the user gets assigned when added to a new group.

If both Manage Objects and Manage Users is enabled, the user will have those permissions for all subsequent groups to which they are assigned.

If one or both are disabled, each subsequent group will be added by default with those permissions and the permissions may be modified on a group by group basis.

Asset

(Optional) Assigns a user to an asset list for which the user is responsible for. Assigning a user to an asset list makes it easier to determine who in a Group or Organization should be assigned tickets, notifications, and other tasks to resolve particular issues. Selecting an asset updates the User Responsibility Summary in the Vulnerability Analysis section.

Contact Information (Optional) The contact information for the user.

Copyright 2017 Tenable, Inc. All rights reserved. Tenable Network Security, Nessus, SecurityCenter, SecurityCenter Continuous View and Log Correlation Engine are registered trademarks of Tenable, Inc.  Tenable, Tenable.io, Assure, and The Cyber Exposure Company are trademarks of Tenable, Inc.  All other products or services are trademarks of their respective owners.