Connecting to Tenable.sc

Concept Information

ACCESSDATA command

Tenable.sc is a security and vulnerability management solution for network and IT infrastructure. You can use the Tenable.sc data connector to import your organization's Tenable.sc data.

Before you start

To connect to Tenable.sc, you must gather the following:

  • the host name of the Tenable.sc instance
  • the correct connection port for the Tenable.sc instance
  • the correct authentication method to connect to the instance
  • the user credentials to connect to the instance

For help gathering the connection prerequisites, contact the Tenable.sc administrator in your organization. If your administrator cannot help you, you or your administrator should contact Tenable.sc Support.

Create a Tenable.sc connection

  1. From the Analytics main menu, select Import > Database and application.
  2. From the New Connections tab, in the ACL Connectors section, select Tenable.sc.

    Tip

    You can filter the list of available connectors by entering a search string in the Filter connections box. Connectors are listed alphabetically.

  3. In the Data Connection Settings panel, enter the connection settings and at the bottom of the panel, click Save and Connect.

    You can accept the default Connection Name, or enter a new one.

The connection for Tenable.sc is saved to the Existing Connections tab. In the future, you can reconnect to Tenable.sc from the saved connection.

Once the connection is established, the Data Access window opens to the Staging Area and you can begin importing data. For help importing data from Tenable.sc, see Working with the Data Access window.

Connection settings

Basic settings

Setting Description Example
Host The host name or IP address of the instance running Tenable.sc. https://sc.tenable.online/
Port The port for the Tenable.sc instance. 443
Authentication Method

The authentication method to connect to the Tenable.sc instance. The options available are:

  • API Keys - Use Access Key and Secret Key for authentication.

  • UserName/Password - Provide username and password for authentication.

Note

To use API key authorization, your organization must have Tenable.sc 5.13.x or later vesion.

API Keys
User The Tenable.sc user account to authenticate against the Tenable.sc instance.  
Password The password used to authenticate the user with the Tenable.sc instance.  
Access Key The API Access Key to authenticate on the Tenable.sc instance.  
Secret Key The API secret key to authenticate on the Tenable.sc instance.  

Advanced settings

Setting Description Example
Limit Key Size The maximum length of a primary key column. 255
Map To Long Varchar This property controls whether a column is returned as SQL_LONGVARCHAR or not. -1
Map To WVarchar This property controls whether string types map to SQL_WVARCHAR instead of SQL_VARCHAR.  
Pseudo Columns

This property indicates whether to include pseudo columns as columns to the table.

The value of this connection setting is of the format "Table1=Column1, Table1=Column2, Table2=Column3".

 
SSL Server Certificate

The certificate that must be accepted from the server when connecting using SSL.

You can provide any of the following:

  • a full PEM certificate
  • path to a local file containing the certificate
  • public key
  • MD5 or SHA1 thumbprint (hex values can also be either space or colon separated)

Any other certificate that is not trusted by the machine is rejected.

 
Convert Datetime To GMT

Converts datetime fields to GMT time zone during import. If this option is disabled, the datetime value is converted to the operating system time zone of the system running Analytics.

 
Proxy Authentication Scheme

Specifies the authentication scheme to authenticate to the Proxy Server. The options available are as follows:

  • BASIC - The driver performs HTTP BASIC authentication.
  • DIGEST - The driver performs HTTP DIGEST authentication.
  • NEGOIATE - The driver retrieves an NTLM or Kerberos token, based on the protocol set for authentication.
  • PROPRIETARY - The driver does not generate an NTLM or Kerberos token. You must supply this token in the Authorization header of the HTTP request.
BASIC
Proxy Auto Detect Specifies whether to use the system proxy settings or not. The value set for this option takes precedence over other proxy settings. So, if you want to use custom proxy settings, disable this option.  
Proxy User The user name to authenticate to the Proxy Server.  
Proxy Password The password to be used with the Proxy User to authenticate to the Proxy Server.  
Proxy Server The hostname or IP address of a proxy to route HTTP traffic through.  
Proxy Port The TCP port the Proxy Server is running on.  
Proxy SSL Type

The SSL type to use when connecting to the ProxyServer proxy. The options available are as follows:

  • AUTO - If the URL is an HTTPS URL, the driver will use the TUNNEL option. If the URL is an HTTP URL, the component will use the NEVER option.
  • ALWAYS - The connection is always SSL enabled.
  • NEVER - The connection is not SSL enabled.
  • TUNNEL - The connection is through a tunneling proxy.

This option is enabled only when you provide the value for the Proxy Server.

AUTO