Vulnerability scanning credentials are defined based on username and password. All UNIX and Linux authenticated scanning is performed with SSH access using a standard username and password, not an SSH key. There are currently no plans to support SSH key authentication.
For more information on credentialed scanning, refer to our Authenticated Scanning documentation.
Comments
0 comments
Please sign in to leave a comment.