Authenticated Scanning
Configure authentication so APVISO can test pages and API endpoints behind login — supporting bearer tokens, cookies, API keys, and more.
Why Authenticated Scanning Matters
Many critical vulnerabilities — broken access control, privilege escalation, IDOR — only exist behind authenticated endpoints. Without credentials, APVISO can only test the unauthenticated attack surface. Authenticated scanning gives the agents a valid session so they can test the full application.
Supported Authentication Methods
Bearer Token
Provide a static bearer token (e.g., a long-lived JWT or API token). APVISO sends it in the Authorization: Bearer <token> header on every request.
Basic Auth
Supply a username and password. APVISO encodes them and sends the Authorization: Basic <encoded> header.
Cookie
Paste a session cookie string (e.g., session=abc123; csrf=xyz789). APVISO attaches it as the Cookie header. This is useful when your application uses cookie-based sessions.
API Key
Specify the header name and key value (e.g., header X-API-Key, value sk_live_...). APVISO includes this custom header on every request.
Custom Headers
Add one or more arbitrary request headers. Use this for non-standard authentication schemes or to pass additional context the application requires.
Login-Based Auth
For applications with a login form, you can configure:
- Login URL — the page containing the login form.
- Username and Password fields — the form field names and values.
- Success indicator — a URL pattern, cookie name, or response string that confirms a successful login.
APVISO's agents will submit the login form, capture the resulting session, and use it for the remainder of the scan.
Configuring Auth in the Dashboard
- Open the target detail page.
- Click the Authentication tab.
- Select your authentication method.
- Fill in the required fields.
- Click Save.
Credentials are encrypted at rest and only decrypted during the scan. They are never logged or included in reports.
Best Practices
- Use a dedicated test account with realistic but non-admin privileges for the initial scan. Run a separate scan with admin credentials if needed.
- Rotate or revoke credentials after scanning to limit exposure.
- Prefer token-based auth over login-based auth when possible — it is more reliable and does not depend on form rendering.
- Test that the credentials work before starting the scan by verifying you can access a protected page.