Create a user in the basic OpenVAS vulnerability scan tutorial

Source: Internet
Author: User
Tags openvas

Create a user in the basic OpenVAS vulnerability scan tutorial
How to create a user OpenVAS Management Service

By default, OpenVAS creates only one user named admin and is an administrator user (with the highest permissions ). If you want to log on to another client, you cannot access the client as an administrator. Otherwise, the server becomes messy and cannot be managed. Therefore, to facilitate the management of the OpenVAS service, users can create different levels of users and groups as needed. The following describes how to create a user, group, and modify a user role.

OpenVAS User Creation

(1) On the main interface of the OpenVAS service (as shown in 1.6), click Administration | Users to open the user interface, as shown in 1.7.


Fig 1.7 User Interface <喎?http: www.bkjia.com kf ware vc " target="_blank" class="keylink"> Vc3ryb25np1_vcd4kpha + CqOoMqOptNO4w73nw + a/strong + uniform + ahozwvcD4KPHA + CjxzdHJvbmc + pgltzybzcm9 "http://www.2cto.com/uploadfile/Collfiles/20150828/201508281003232.png" alt = "\">

Figure 1.8 create a user interface

(3) You can set the user name, password, role, group, and access permission on this interface. The meanings of each option in the interface are as follows:

  • Q Login Name: the Login Name, that is, the user Name.

  • Q Password: Password of the new user.

  • Q Roles: Set User Roles. By default, OpenVAS supports creating users with six roles: Admin, Guest, Info, Monitor, Observer, and User. The administrator can click the (plus sign) icon to assign multiple roles to the new user.

  • Q Groups: Set the user group. By default, no group is created. Here, you can leave this configuration item unspecified and add the user to the group when creating the group. The administrator can click the (plus sign) icon to add new users to different groups.

  • Q Host Access: This option is used to set the Host that is allowed to Access. Among them, Allow all and deny options allow all to reject a single host address, and enter the rejected host address in the text box; Deny all and Allow options deny all allow a single host address, enter the allowed host address in the text box.

  • Q Interface Access: This option is used to set the Interface for Access. This configuration item also provides two options: Allow all and deny all and allow. The two options have the same meaning as the options in Host Access, except that the Host interface is allowed and denied, rather than the IP address. Among them, Linux interfaces are usually eth0, eth1... and so on.

    The user information created in this example, as shown in Figure 1.9.


    Figure 1.9 new user information

    (4) you can see from this interface that a User named bob is created and the User role is User. Then, Click Create User to display the page shown in 1.10.


    Figure 1.10 new user information

    (5) This interface displays information about the newly created user bob, such as the role, access permission, ID, Creation Time, and modification time. Click the rightmost icon on the page to return to the user interface. The newly added user is displayed, as shown in Figure 1.11.


    Fig 1.11 user interface

    (6) you can see that a user named bob is added to the list. On this page, you can select the buttons in Actions to delete, edit, clone, and export the user information as XML. For example, when cloning a bob user, click the (icon) icon to clone the bob user. The interface shown in 1.12 is displayed.


    Figure 1.12 cloned user information

    (7) The cloned user name is bob_Clone_1. If you want to modify the user's settings, click the (edit) icon to display the interface shown in 1.13.


    Figure 1.13 edit user information

    (8) The interface displays the basic information of the cloned user. In this case, you can reset the user's name, password, role, group, and permissions. For example, modify the user name to alice. Then, click Save User to Save the settings. The page shown in 1.14 is displayed.


    Figure 1.14 cloned alice user information

    (9) Next, return to the user interface and you will see three users, as shown in Figure 1.15.


    Fig 1.15 user interface

    (10) you can see the newly created users bob and alice. To delete a user, click the icon.

    This article is selected from: OpenVAS basic vulnerability scan tutorial Ba internal information, reprinted please indicate the source, respect technology respect it people!

    ?

    Copyright Disclaimer: This article is an original article by the blogger and cannot be reproduced without the permission of the blogger.

Contact Us

The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion; products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the content of the page makes you feel confusing, please write us an email, we will handle the problem within 5 days after receiving your email.

If you find any instances of plagiarism from the community, please send an email to: info-contact@alibabacloud.com and provide relevant evidence. A staff member will contact you within 5 working days.

A Free Trial That Lets You Build Big!

Start building with 50+ products and up to 12 months usage for Elastic Compute Service

  • Sales Support

    1 on 1 presale consultation

  • After-Sales Support

    24/7 Technical Support 6 Free Tickets per Quarter Faster Response

  • Alibaba Cloud offers highly flexible support services tailored to meet your exact needs.