Set Up Unix Authentication

Configure Unix records to allow our service to authenticate to your Unix hosts at scan time. Now you can configure a single authentication record that supports better integration with third party vaults, and let you define a variety of private keys and root delegation tools.



How do I get started?
Using Private Keys / Certificates

Quick Links

Why use host authentication

Unix login credentials

Junos OS authentication

F5 Load Balancer authentication

Supported Private Keys/Certificates

OPatch Checks

Cisco CUCM

How to prevent BASH history file from filling up

Unix Auth PDF Icon

NetScaler Auth PDF Icon

A10 Auth PDF Icon


Private Keys / Certificates

OpenSSH-encoded private keys

PEM-encoded private keys

OpenSSH certificates

PEM-encoded certificates

From the Community

*NIX Authenticated Scan Process and Commands