Manage User Access Authorizations

Users can access Tenable Vulnerability Management using the following methods:

  • Username and password login.
  • Single sign-on (SSO). For more information, see SAML.
  • Tenable Vulnerability Management REST API with API keys. For more information, see Generate Another User's API Keys.

When you create a new user, all access methods are authorized by default. Depending on your organization's security policies, you may need to disable certain access methods, for example, disable username and password login to enforce SSO.

Use the Tenable Vulnerability Management Platform API to view, grant, and revoke access authorizations for a user. For more information, see Get User Authorizations and Update User Authorizations in the Tenable Developer Portal.