Follow

Can vulnerability scanning credentials be defined based on an SSH key versus username and password? | Scanning FAQ

Vulnerability scanning credentials are defined based on username and password. All UNIX and Linux authenticated scanning is performed with SSH access using a standard username and password, not an SSH key. There are currently no plans to support SSH key authentication.

For more information on credentialed scanning, refer to our Authenticated Scanning documentation.

Was this article helpful?
0 out of 0 found this helpful
Have more questions? Submit a request

0 Comments

Please sign in to leave a comment.