Fluid Attacks requires your organization to provide credentials to access the repositories to be tested. Alternatively, your organization can allow access to repositories via Open Authorization (OAuth), eliminating the need to provide credentials. Both actual credentials (e.g., username and password pairs) and connections made with OAuth are registered in the Credentials section on Fluid Attacks' platform. From there, you can also begin the connection via OAuth to the supported providers, which are GitHub, GitLab, Bitbucket, and Azure.
View organization credentials table
Role required: User, Vulnerability Manager or User Manager
The table in the Credentials section shows the credentials stored for use across the organization, meaning that they are accessible to all groups within the organization.
The table provides the following information:
- Name: The unique identifier for the credential.
- Type: The authentication method, which can be one of the following:
- User and password: The classic combination of username and password
- SSH: A secure key used for accessing remote systems, similar to a password but more secure
- Access token: A Personal Access Token used for authentication with Azure DevOps
- AWSROLE: Allows Fluid Attacks to assume an Identity and Access Management (IAM) role in your AWS account
- OAUTH: Used for delegated authorization to grant Fluid Attacks access to your repositories on supported providers (GitHub, GitLab, Bitbucket, and Azure)
- Owner: The email of either the person who registered the credentials on the platform or the last person who edited them
- Status: Whether credentials are associated with repositories under evaluation by Fluid Attacks and, if so, which repositories
Add credentials
Role required: User Manager
Ensure that the provider (Azure, GitLab, GitHub, or Bitbucket) allows third-party applications (like Fluid Attacks platform) to access your repositories via OAuth.
If not going for OAuth this time, follow these steps to add new credentials to use across your organization:
- Go to the Credentials section.
- Click on Add credential.
- Choose Add manually.
- In the pop-up window, enter a unique credential name and select the credential type. (Read below what extra steps to follow if you are choosing an AWS role.)
- Provide the relevant credentials and click on Add. The new credentials are then added to the table.
In case you choose to grant Fluid Attacks access through cross-account IAM, you are asked for the Amazon Resource Name (ARN) of the role. Therefore, you need to follow these extra steps:
- In the pop-up window, copy the external ID provided by Fluid Attacks.
- Create an IAM role including the external ID. To learn how to do this, read the corresponding instructions in Set up an AWS integration.
Note: If your organization has multiple AWS accounts, you can create the IAM role in each account and provide the corresponding ARN when adding credentials.
Edit credentials
Role required: User Manager
Do the following to edit existing credentials:
- Go to the Credentials section.
- Select the credentials and click on Edit.
- In the pop-up window, make the desired changes and, if needed, turn on the toggle that says New secrets to enable editing them.
- Click Edit to apply the changes.
Note: If you edit credentials secrets, you are the new owner of the credentials in question.
Remove credentials
Role required: User Manager
Bear in mind the following considerations about removing credentials:
-
Removing credentials also removes them from all associated Git roots.
-
Removing a member from the organization removes their credentials from the organization.
These are the steps to delete credentials:
- Access the Credentials section.
- Select the credentials and click on Remove.
- Confirm the removal in the warning window.
Search the credentials table
Role required: User, Vulnerability Manager or User Manager
You can filter the credentials table by using the search bar. You can search by the contents of Name, Type, and Owner. Just type what you are looking for and only the rows whose content match your search are shown.
Free trial