Skip to main content

Admin and Settings

The Admin module provides platform-wide configuration, user management, security controls, and integration settings. It is split into two sidebar sections: Admin (admin-only) and Settings (available to all authenticated users).

Admin Section (Admin-Only)​

Identity and Access​

PagePathDescription
User Management/admin/usersCreate, edit, disable, and delete users. Role assignment from RBAC v2 roles (admin, analyst, viewer, manager, security_analyst, scanner_admin, compliance_officer, plus module-specific roles). Seat availability is enforced per license.
SSO Config/admin/ssoConfigure SAML/SSO integration with identity providers. Manage SSO entity IDs, assertion consumer URLs, and certificate configuration.

Platform Config​

PagePathDescription
System Settings/admin/settingsCore platform settings including severity mapping, sync intervals, data retention periods, and display preferences.
Feature Toggles/admin/feature-flagsEnable or disable platform features per tenant (AI, scanning, specific modules). Acts as an operator-level kill switch independent of license gating.

Data and Storage​

PagePathDescription
Data Retention/admin/data-retentionConfigure automatic cleanup policies for old vulnerabilities, findings, scan results, and audit logs.
Data Archives/admin/archivesBrowse and restore archived data snapshots. Archives are created during bulk operations and data retention cleanup.

Integrations and APIs​

PagePathDescription
API Config/admin/api-configConfigure the Tenable.io API connection (access key, secret key, cloud URL). Test connectivity.
API Sync/admin/syncTrigger manual syncs, view sync history, and monitor chunk progress for asset and vulnerability imports.
Integrations/admin/integrationsConfigure outbound integrations: Jira, ServiceNow, Slack, Teams, PagerDuty, email (SMTP), and custom webhooks.

Security​

PagePathDescription
Security Audit/admin/securityView security audit logs, API access logs, and event audit trail. Monitor for suspicious activity.

Additional Admin Pages​

PagePathDescription
Scan History/admin/scan-historyHistorical import management for Tenable scan data.
WeaverScan/admin/scannerScanner device management and enrollment token generation.
Intelligence/admin/intelligenceThreat intelligence feed configuration and sync status.

Settings Section (All Users)​

PagePathDescription
Profile/settings/profileUpdate display name, email, and avatar.
Preferences/settings/preferencesUI preferences: theme, default dashboard, notification settings.
Security/settings/securityChange password, manage MFA, view active sessions.
Notifications/settings/notificationsConfigure notification channels and alert thresholds.
License/settings/licenseView current license status, modules, seat usage, and expiration.
Proxy and Network/settings/proxyConfigure HTTP proxy settings for outbound API calls.

Backend Services​

The admin routes (/api/admin, 48 endpoints) integrate with these backend services:

ServicePurpose
settingsServiceReads and writes system settings with validation
archiveServiceCreates and manages data archives
syncServiceOrchestrates Tenable.io data synchronization
quarantineServiceManages quarantined findings and assets
aggregationServiceRecomputes KPIs and dashboard metrics on demand
rateLimitServiceManages API rate limiting configuration
historicalImportServiceImports historical scan data from Tenable
licenseServiceValidates and decodes JWT license tokens
securityAuditServiceLogs and queries security audit events
eventAuditServiceRecords admin actions for compliance audit trail

Multi-Tenant Architecture​

Admin operations are tenant-scoped. The getTenantRepository utility ensures all database queries are filtered by the current tenant. User creation enforces seat limits via checkSeatAvailability. Role assignment is restricted to the ALLOWED_ROLES list to prevent privilege escalation.

Limitations​

  • No self-service tenant provisioning -- New tenants must be created by a platform administrator; there is no public sign-up flow
  • SSO is SAML-only -- OAuth2 / OIDC federation is not currently supported for SSO; only SAML 2.0 identity providers are integrated
  • No built-in backup/restore -- Data archives capture snapshots, but full database backup and restore must be managed at the infrastructure level (PostgreSQL pg_dump)
  • Audit log retention -- Audit logs follow the data retention policy; once cleaned, they cannot be recovered from within ThreatWeaver
  • Feature flags are tenant-global -- Feature toggles apply to all users within a tenant; per-user or per-role feature flags are not supported
  • No MFA enforcement policy -- MFA can be enabled per user but there is no tenant-wide enforcement toggle to require MFA for all accounts
Entity / TableDescription
UserPlatform user with role, email, MFA status, and tenant association
RoleRBAC v2 role definition with permission sets
SettingKey-value system configuration entries
AuditLogSecurity and admin action audit trail
LicenseJWT-encoded tenant license with module entitlements
IntegrationConfigured outbound integration (Jira, Slack, webhooks, etc.)

Deep Dives​

  • Integrations Guide -- How to set up Jira, Slack, webhooks, and other outbound integrations