This guide walks you through creating a Tenable Vulnerability Management integration.
Once logged in, click the Settings gear in the top right corner and go to Access Control.
- Here, you can either use the logged-in user account or
- Create a service user account (with an email not tied to an employee), which we recommend for production environments.
- Assign the new account the minimal role of Basic User.
- Log out of the current user, and then log in using the newly created account.
Click on the profile avatar for the logged-in user and navigate to the user's My Profile.
- In the left-side navigation, select API KEYS.
- In the bottom-right, click the Generate button. A warning in the top-right will appear, stating that this operation will overwrite any previously generated keys. Click Continue.
- You will be provided with two keys: access key and secret key. Copy and store these in a secure vault for later use.
Create your integration by supplying all configuration values.
Secret:accessKey=access-key;secretKey=secret-key
(copy the keys from Step 2 above)