Specifications

Copyright © 2015. Tenable Network Security, Inc. All rights reserved. Tenable Network Security and Nessus are registered trademarks of Tenable Network Security, Inc.
70
Windows Vista and later:
C:\> copy \ProgramData\Tenable\Nessus\nessus\CA\cacert.pem
C:\ProgramData\Tenable\Nessus\nessus\CA\ORIGcacert.pem
3. If the certificates to be used for authentication are created by a CA other than the Nessus server, the CA
certificate must be installed on the Nessus server:
Linux/Unix:
Copy the organization’s CA certificate to /opt/nessus/com/nessus/CA/cacert.pem
Windows 7 and later:
Copy the organization’s CA certificate to C:\ProgramData\Tenable\Nessus\nessus\CA\cacert.pem
4. Configure the Nessus server for certificate authentication. Once certificate authentication is enabled, login using a
username and password is disabled.
Linux/Unix:
# /opt/nessus/sbin/nessuscli fix --set force_pubkey_auth=yes
Windows:
C:\> \program files\Tenable\Nessus\nessuscli fix --set force_pubkey_auth=yes
5. Once the CA is in place and the force_pubkey_auth setting is enabled, restart the Nessus services with the
service nessusd restart command.
After Nessus has been configured with the proper CA certificate(s), users may log in to Nessus using SSL client
certificates, Smart Cards, and CACs.
Create Nessus SSL Certificates for Login
To log in to a Nessus server with SSL certificates, the certificates must be created with the proper utility. For this process,
the nessuscli mkcert-client command-line utility is used on the system. The six questions asked are to set
defaults for the creation of users during the current session. These include certificate lifetime, country, state, location,
organization, and organizational unit. The defaults for these options may be changed during the actual user creation if
desired. The user(s) will then be created one at a time as prompted. At the end of the process the certificates are copied
appropriately and are used to log in to the Nessus server.
1. On the Nessus server, run the nessuscli mkcert-client command.
Linux/Unix:
# /opt/nessus/sbin/nessuscli mkcert-client
Windows (Run as a local Administrator user):
C:\> \Program Files\Tenable\Nessus\nessuscli mkcert-client
2. Fill in the fields as prompted. The process is identical on a Linux/Unix or Windows server.
Do you want to register the users in the Nessus server as soon as you create their
certificates ? [n]: y
-------------------------------------------------------------------------------
Creation Nessus SSL client Certificate
-------------------------------------------------------------------------------
This script will now ask you the relevant information to create the SSL
client certificates for Nessus.
Client certificate life time in days [365]: