Create, modify, and delete stored credential profiles used to run network vulnerability scans that require authentication.
Important
|
Procedure
- To securely store authentication information for reuse when creating vulnerability scans, create a new credential profile.
- In , click Credential Vault.
- Click Create credential profile.
- Specify a unique name for the credential profile.

Tip
Specifying a descriptive name allows other users to more easily find the correct credential profile to use when creating a scan. - Provide an optional description for the credential profile.
- Select an authentication method.
-
Secure Shell (SSH) with private key or password
-
Private keys can consist of up to a maximum of 4,096 characters.
-
-
SNMPv2c with community string and port
-
SNMPv3 with one of the following security levels:
-
Authentication and encryption
-
Encryption only
-
-
- Specify the additional information required for the authentication method.
- Click Save.The new credential profile appears in the Credential Vault.
- Click the name of an existing credential profile to view the credential profile details
and modify the credential profile authentication information.

Note
-
You can also view a list of scans that use the selected credential profile in the credential profile details.
-
Stored authentication information, including user names, keys, and passwords, is not viewable after the credential profile is created.
-
- Click the delete icon (
) to remove a credential profile.
Important
If you remove a credential profile that is currently associated with one or more scans, the associated scans will fail to run. To re-enable the scan, you must reconfigure the scan authentication credentials. - To use a saved credential profile in a vulnerability scan, select the credential profile when configuring the scan authentication credentials.
