User Accounts
The Users page displays the user accounts on
You can create one or more administrator accounts on
Linked User Accounts
You can create linked user accounts to allow an Administrator user to switch to one or more Security Manager accounts without logging out and logging back in to
API Keys
You can generate API keys to authenticate as a specific user for Tenable.sc API requests. For more information, see API Key Authentication.
User Options
Option | Authentication Type | Description |
---|---|---|
Role |
All |
The role assigned to the user. For more information, see User Roles. Administrator users can create Administrator or Security Manager user accounts. Organizational users can create Auditor, Credential Manager, Executive, No Role, Security Analyst, Security Manager, or Vulnerability Analyst accounts at their own privilege level or lower. For example:
|
Organization |
All |
The organization where you want to assign the user account. |
First Name / Last Name |
All |
(Optional) The given first name and last name for the user. |
Type |
All |
The type of authentication you want to perform on the user:
You must configure an LDAP server |
Username / Password | TNS |
The username and password for the user account. When selecting a username, it is sometimes easier to focus on the person’s real name as a convention (e.g., Bob Smith would become bsmith). However, it may also be useful to assign names based on role, such as auditNY. Note: The username value is case-sensitive. Tip:Tenable recommends using passwords that meet stringent length and complexity requirements. For information about |
Username | SAML |
The user's SAML username. Type the username exactly as it appears in your identity provider SAML configuration for this user. |
User Must Change Password | TNS |
When enabled, the user must change their password upon initial login. |
LDAP Server | LDAP | The server you want to use to authenticate the user. |
Search String | LDAP |
The LDAP search string you want to use to filter your user search. Use the format: attribute=<filter text>. You can use wildcards, and the option accepts up to 1024 characters. Examples sAMAccountName=* mail=a* displayName=C* |
LDAP Users Found | LDAP |
A filtered list of LDAP user accounts retrieved by the Search String. Your selection in this option populates the Username option. |
Username | LDAP |
The username, populated by your LDAP Users Found selection. This username must match a user on the LDAP server in order to authenticate successfully. |
Time Zone |
All |
The time zone for the user. |
Scan Result Default Timeframe |
All |
The default Completion Time filter applied when the user accesses or refreshes the scan results page. |
All |
(Optional) When enabled, |
|
Group |
All |
The group where you want to assign the user account. A user's group determines their access to To grant a user limited privileges to other groups' resources, see Custom Group Permissions. |
Asset |
All |
(Optional) Assigns a user to an asset list for which the user is responsible. Assigning a user to an asset list makes it easier to determine who in a group or organization should be assigned tickets, notifications, and other tasks to resolve particular issues. Selecting an asset updates the User Responsibility Summary in the Vulnerability Analysis section. |
Contact Information |
All |
(Optional) The contact information for the user. |