Help us improve your experience.

Let us know what you think.

Do you have time for a two-minute survey?

 

Centralized Credential Sets

 

When you run authenticated scans, you can use a central list that stores the login credentials for your Linux, UNIX, or Windows operating systems. Your system administrator must configure the list of credentials.

An administrator can specify credentials for SNMP network devices and Linux, UNIX, or Windows operating systems. Therefore, a user who is responsible for configuring a scan profile does not need to know the credentials of each asset that is scanned. Also, if the credentials of an asset change, the credentials can be modified centrally rather than updating the scan profile.

Configuring a Credential Set

In JSA Vulnerability Manager, you can create a credential set for the assets in your network. During a scan, if a scan tool requires the credentials for a Linux, UNIX, or Windows operating system, the credentials are automatically passed to the scan tool from the credential set.

  1. On the navigation menu, click Admin to open the admin tab.
  2. In the System Configuration pane, click Centralized Credentials.
  3. In the Centralized Credentials window, on the toolbar, click Add.

    To configure a credential set, the only mandatory field in the Credential Set window is the Name field.

  4. In the Credential Set window, click the Assets tab.
  5. Type a CIDR range for the assets that you want to specify credentials for and click Add.

    Users must have network access permissions that are granted in their security profile for an IP address or CIDR address range that they use or create credentials for in Centralized Credentials.

  6. Click the Linux/Unix, Windows, or Network Devices (SNMP) tabs, then type your credentials.
  7. Click Save.