Configuring the connector

As an administrator, you can configure the connector to integrate Automation Console with is a comprehensive vulnerability management solution that provides complete visibility of the security risks across your IT infrastructure. With this integration, Automation Console can retrieve the vulnerability scan results from multiple instances and process the vulnerabilities to map the remediation content. You can then create operations to remediate vulnerabilities. 

After you configure and run this connector, the scan files containing the assets and vulnerabilities are automatically imported into Automation Console.

Before you begin

Make sure that the following prerequisites are met:

  • One or more configured instances are running in your environment.
  • The API keys are generated for your user account in The connector uses these keys to authenticate APIs. For more information, see Generate API keys. Open link
  • Before running the connector, ensure that the connector is installed and run on Windows or Linux operating systems that match the following criteria:
    • AdoptOpenJDK Runtime Environment 18.9 (build 11.0.19+7) is installed on the connector host.
    • Port requirements as below -









      HAC SaaS and Internet




      Connector Server



      HTTPS Server 



      • Connector's Outbound port 443 should be opened for ifm url mentioned in creds.json available in <connectorDirectory>/config/ folder. e.g.

        "endpoints": {        "ifm": "https://<url>"

Configuring the connector

  1. Login to BMC Helix Automation Console.
  2. From Briefcase , click Connectors.
  3. On the Manage Connectors page, click the  option on the Connector widget and click Edit Add Configuration.
  4. On the Add configuration page, provide the following details:
    1. In the Connector details section, specify a unique name and an optional description for configuration.
    2. In the Tenable Configuration section, do the following:
      1. In the Endpoint URL field, specify the URL to connect to
      2. (optional) In the Admin Security Group field, specify one or more admin security groups (comma separated list) that can access the scan results. If no security group is specified, all the admin security groups can access the scan files imported from


        If you have both TrueSight Server Automation and TrueSight Network Automation endpoints, specify the name of the appropriate security group. If you specify a non-admin security group, Automation Console does not fetch any data from

      3. In the Fetch Data From field, specify the number of days for which you want to fetch the scan results.

        Automation Console retrieves the vulnerability data for the specified days during the first import. If you do not specify any value, Automation Console retrieves all the reported vulnerabilities from the instances.

        For all the imports during the next schedules, Automation Console fetches only those vulnerabilities and assets that were scanned and available in after the last sync date.

    3. In the Authentication Details section, specify the access and secret keys to authenticate with the API.
    4. In the Tenable Query ID field, provide the ID that you generated in the Tenable scanner to filter data. You can also specify the Tenable queries along with the ID (comma separated values). For example, the query Type = Vulnerability and Tool = Vulnerability List. We recommend creating a separate configuration for each query ID.
      For more information, see  Queries Open link

    5. (optional) If the server is configured to use the SSL certificate authentication, provide the certificate name (.pfx only) and the certificate export password in the Client Certificate Authentication Details section. 

      Ensure that the certificate is present at the following location:


      The connector checks this location for the certificate while communicating with the server.
    6. In the Auto-close vulnerabilities section, select the Enable Auto-close check box to enable the system to automatically close vulnerabilities that were fixed in the previous scan and are no longer present in the subsequent scan.
  5. Save the changes.
    The newly added configuration is listed in the Configurations table.
  6. If you have multiple Tenable scanners in your environment, repeat steps 3 to 7.
  7. Click Continue and download the connector zip file on a local host. 
  8. On the server where the connector file is downloaded and extracted, go to the connector location, and run the following command to install and start the connector: 
    • Windows: run.bat
    • Linux:

    The connector starts running successfully. You can view the connector status on the Connectors page.

  9. In the Configuration Schedule section, specify a frequency at which you want to run the connector, and save the schedule.


    Minimum duration for data collection between the consecutive schedules is 10 minutes.

Vulnerability scan files are created with the specified configuration names. Automation Console processes each configuration sequentially.

Updating the connector

To make changes to the connector, do the following:

  1. On the Manage Connectors page, click the option against the connector and click Disable.
  2. Click Edit. The available configurations are displayed. To quickly locate the required configuration, use search or sort the configurations by the various columns, such as Status and Queryid.
  3. Make the changes based on your requirement and click Save.

Enabling debug mode

BMC recommends that you do not modify any other configuration files available in the /config directory. However, you can enable the debug mode on the connector to obtain detailed logging information.

Do this:

  1. Press CTRL+C twice to stop the connector, if its already running
  2. Go to <ConnectorLocation>/config, open the file, add the following parameter and set it to debug, save the file

    #Logging related Properties
  3. Restart the connector.


If you encounter any issues while fetching data from, the Connector tile on the Manage Connectors page shows the name of the configuration with error and the related exceptions are logged in the log file. For the troubleshooting the issues, see Troubleshooting connectors.

Was this page helpful? Yes No Submitting... Thank you