Providing credentials
Most critical vulnerabilities—IDORs, privilege escalations, logic bugs—live behind your login screen. To find them, Aikido’s AI Pentest agent needs access.
Unlike legacy tools that require complex Selenium scripts or proxy recordings, Aikido uses an LLM-driven approach. You simply tell the agent how to log in using natural language, just like you would explain it to a human QA tester.
Here is how to configure your authentication sets.
1. Create an Authentication Set
In the scan configuration or settings menu:
Click Add Authentication Set.
Name: Give this set a descriptive name (e.g.,
Admin Credentials,Read-Only User,Tenant A - Manager).
2. Provide Login Instructions
This is the most important step. In the Authentication instructions field, provide a step-by-step text description of your login flow.
The AI agent parses this to navigate your specific UI quirks. Be explicit.
Example format:
Navigate to
staging.app.com/loginClick on "Log in with Username"
Enter username:
pentest_adminEnter password:
super_secure_password_123Click the "Sign In" button
3. Handle 2FA (MFA)
If your staging environment enforces 2FA, or you simply want to include it in the pentest. Aikido supports TOTP (Time-based One-Time Password) generation.
In your application's security settings, generate a new TOTP setup key (the secret usually provided alongside a QR code).
Paste the OTPAuth URI into the 2FA field in Aikido.
Format:
otpauth://totp/myapp:[email protected]?secret=YOURSECRETKEYGOESHERE&issuer=MyApp
Magic Links & Email Verification (Beta)
Support for authentication flows that require email access (e.g., clicking a magic link or retrieving an email verification code) is currently in beta and not enabled by default.
If your application relies on this method, please reach out on Intercom to have this feature enabled for your workspace.
Best Practices
Don’t use Production Credentials: Always run pentests on a Staging or QA environment. The scanner performs intrusive tests that can corrupt data.
Create Dedicated Test Accounts: Do not use personal developer accounts. Create specific accounts for the scanner (e.g.,
[email protected]).Cover All Tenants: If your app is multi-tenant, add credentials for users in different tenants (e.g.,
User - Tenant A,User - Tenant B). This allows the AI to test for cross-tenant data leakage.
Troubleshooting
Authentication is verified during the preflight check immediately after launch. You can watch the agent's screen in real-time to see if it succeeds.
If the agent fails to log in:
You won't be charged: We do not deduct credits for failed authentication preflights. You can adjust your settings and retry immediately.
Inspect the failure: Check the agent's screenshots in the error log to see exactly where it got stuck.
Sanity check steps: Walk through your provided instructions manually in an incognito window. If you skipped a step or a button is unclear, the agent might struggle.
Check accessibility: Is the URL reachable from the public internet? (Check your IP whitelisting).
Account status: Ensure the test user hasn't been locked out.
Last updated
Was this helpful?