Set Up Unix Authentication

Configure Unix records to allow our service to authenticate to your Unix hosts at scan time. Now you can configure a single authentication record that supports better integration with third party vaults, and let you define a variety of private keys and root delegation tools.

 

 

How do I get started?
Using Private Keys / Certificates

Quick Links

Why use host authentication

Unix login credentials

F5 Load Balancer authentication

Supported Private Keys/Certificates

OPatch Checks

Cisco CUCM

How to prevent BASH history file from filling up

Unix Auth PDF Icon

NetScaler Auth PDF Icon

A10 Auth PDF Icon

IBM VIOS Auth PDF Icon

Private Keys / Certificates

OpenSSH-encoded private keys

PEM-encoded private keys

OpenSSH certificates

PEM-encoded certificates

From the Community

*NIX Authenticated Scan Process and Commands