The Weak Authentication scan checks your authorization method against a number of standard rules for authorization security.
If the scan does not reveal any information about possible vulnerabilities, it passes successfully.
If the scan has Failed, that may indicate your service uses inefficient authorization schemes and is vulnerable to impersonation and other authentication-based security breaches.
How it works
The Weak Authentication scan uses assertions to validate requests and responses and check if they include any information about potential vulnerabilities.
If all assertions pass successfully,
PASS will be logged for that response. If any assertion fails,
FAIL will be logged.
|If you have not applied any assertions to the scan,
Response SLA – Verifies that your service responds within expected time even after receiving unexpected input.
Use the following options to configure the scan Strategy:
|Apply to Failed Test Steps||Select to run the scan even if the target test step fails.|
|Run only once||Select to run the scan only once for each test step, even if ReadyAPI runs that step several times for a test case.|