Database Credentials
The following topic describes the available Database credentials.
DB2
The following table describes the additional options to configure for DB2 credentials.
MySQL
The following table describes the additional options to configure for MySQL credentials.
Options | Description |
---|---|
|
The authentication method for providing the required credentials.
For descriptions of the options for your selected authentication type, see |
Username | The username for a user on the database. |
Password |
The password associated with the username you provided. |
|
The TCP port that the MySQL database instance listens on for communications from Tenable Vulnerability Management. The default is port 3306. |
Oracle
The following table describes the additional options to configure for Oracle credentials.
Options | Description |
---|---|
|
The authentication method for providing the required credentials.
For descriptions of the options for your selected authentication type, see |
|
The TCP port that the Oracle database instance listens on for communications from Tenable Vulnerability Management. The default is port 1521. |
|
The type of account you want Tenable Vulnerability Management to use to access the database instance:
|
Service Type | The Oracle parameter you want to use to specify the database instance: SID or SERVICE_NAME. |
Service |
The SID value or SERVICE_NAME value for your database instance. The Service value you enter must match your parameter selection for the Service Type option. |
PostgreSQL
The following table describes the additional options to configure for PostgreSQL credentials.
Options | Description |
---|---|
|
The authentication method for providing the required credentials.
For descriptions of the options for your selected authentication type, see |
|
The TCP port that the PostgreSQL database instance listens on for communications from Tenable Vulnerability Management. The default is port 5432. |
Database Name | The name for your database instance. |
SQL Server
The following table describes the additional options to configure for SQL Server credentials.
Options | Description |
---|---|
|
The authentication method for providing the required credentials.
For descriptions of the options for your selected authentication type, see |
Username | The username for a user on the database. |
Password |
The password associated with the username you provided. |
|
The TCP port that the SQL Server database instance listens on for communications from Tenable Vulnerability Management. The default is port 1433. |
AuthType |
The type of account you want Tenable Vulnerability Management to use to access the database instance: SQL or Windows. |
Instance Name | The name for your database instance. |
Sybase ASE
The following table describes the additional options to configure for Sybase ASE credentials.
Options | Description |
---|---|
|
The authentication method for providing the required credentials.
For descriptions of the options for your selected authentication type, see |
|
The TCP port that the Sybase ASE database instance listens on for communications from Tenable Vulnerability Management. The default is port 3638. |
Auth Type |
The type of authentication used by the Sybase ASE database: RSA or Plain Text. |
Cassandra
Option |
Description |
---|---|
|
The authentication method for providing the required credentials.
For descriptions of the options for your selected authentication type, see |
Port |
The port the database listens on. The default is port 9042. |
MongoDB
Option |
Description |
---|---|
|
The authentication method for providing the required credentials. Note: This option is only available for non-legacy versions of the MongoDB authentication method.
For descriptions of the options for your selected authentication type, see |
Username |
|
Password |
|
Database |
The name of the database to authenticate to. Tip: To authenticate via LDAP or saslauthd, type $external.
|
Port |
(Required) The TCP port that the MongoDB database instance listens on for communications from Tenable Vulnerability Management. |