Configuration of vulnerability scans for APIs has the following steps:
- Step 1: Activating the Scan your API for vulnerabilities plan item.
- Step 2: Configuring the security controls of the target application.
- Step 3: Activating the Scan your APIs for vulnerabilities configurations security control.
There are two authentication modes:
- Without authentication, for black box testing.
- With authentication, highly recommended for deeper security scanning to identify more security risks.
- Slack integration to receive notifications.
- Deployment-based scanning to trigger runtime scanning tools when a new code deployment is detected.
Select Security Plans from the left menu, scroll to a plan that includes DAST scanning, and then click View Plan.
Scroll to Web Application Security and click Jit -012 Scan you API for vulnerabilities.
Click Activate to display the Configure Security Control dialog box.
To configure settings, click Activate and then click Configure to display the Configure Security Control dialog box.
|Name of the application that is scanned.
|Open API (Swagger) file URL
|The URL where the OpenAPI file file is hosted.
|(Optional) Exclude URLs
|URLs that are not scanned. For example, Logout. We recommend excluding Logout so that Jit scanning remains continually connected.
|The base URL where the API is hosted, serving as the entry point for making API requests.
|We recommend enabling this option for enhanced security scanning. See Configuration with authentication below.
|ZAP scans your application daily.
|Scan on deployment
|Jit scans your application when a deployment event is detected in your GitHub account.
|The environment defined in the deployment YAML on Github actions. Jit needs an exact match between the environment name defined in Jit and in Github Actions to trigger a scan. See Deployment-based Scanning.
Check Enable authentication. There are four types of authentication:
|Login URL for authentication.
|Username to be authenticated.
|Password to be authenticated.
|Enable Selectors Configuration
|Check to enable enhanced authentication using the username and password selectors that are derived from the source of the Login's web page. When unchecked, Jit searches for common selectors. See Configuring authentication using selectors below.
|Local Storage Item Key
|The specific identifier used in the Web Storage API for storing and retrieving data in the web browser's local storage.
|Local Storage Item Value
|The actual information that is stored and retrieved using a specific key.
|Name of the cookie used for authentication.
|Value of the cookie used for authentication.
|Bearer token header
|The value of the bearer token header consisting of the word Bearer followed by a space and then the actual token.
Configuring authentication using selectors**
- Check Enable Selectors Configuration.
- To complete the Username Field Selector and Password Field Selector fields, go to your application's website and open the Developer Tools and then use the Inspect Element to find the matching selectors for the Username and Password.
- Copy the text into the Username Field Selector and Password Field Selector fields.
Click Activate. Jit creates a header based on your configurations and shares the authentication information with ZAP. The header is integrated by ZAP and used to authenticate each page included in the scan. Jit then generates security findings.
Updated 24 days ago