Last updated: 2025-09-30
Purpose
This article describes how to set up basic credentials.
Introduction
Basic Credentials in the Outpost24 Portal enable secure authenticated scanning of web-based assets using standard HTTP Basic authentication, by configuring essential details such as roles, target URLs, usernames, and passwords within the Credentials management interface. This feature allows security teams to perform comprehensive vulnerability assessments on protected resources, ensuring scans can access and evaluate content behind authentication barriers for more accurate threat detection. By setting up Basic Credentials, organizations enhance the depth of their security scans, support compliance with industry standards for authenticated testing, and strengthen overall risk management by identifying vulnerabilities that would otherwise remain hidden in unauthenticated environments.
Adding Credentials
-
Log in to OUTSCAN. See the Logging in to the portal article on how to access the Portal.
-
In the Portal view, click the Account button in the upper right corner. Initials in the button may differ depending on the account name.
-
Select Credentials in the context menu.
-
Click the + Add credentials button to open the Add credentials form.
Set up Basic Credentials
-
In the drop-down menu select Basic.
-
Enter a Role.
-
Enter a URL.
-
Enter a Username.
-
Enter a Password.
-
Click blue Add button.
Related Articles
- Reports
- Log In Using LDAP
- Report Library
- Vulnerability Database
- Removing an Agent from Windows
- Delta
- Scan Blueprint
- Technical Specification
- Schedules
- Installing a Linux Agent
- Workflows
- Troubleshooting checklists
- User Management
- Check Connectivity to Agent Server
- Scan Scheduling Errors
- HIAB Deployment Guide
- Managing Tags
- Checking if Agent is Running
- Agent Installation Introduction
- Common Settings Panel
- Scanning Range
- Role Management
- Portal Icon List
- Agent Call Home
- Asset Discovery
- XML API Interface Technical Document
- Using the Agent Info Command
- Scheduled Reports
- Removing an Agent from Linux
- Solutions
- Identity and Access Management (IAM)
- Understanding Scanner and Scheduler
- Licensing Consumption
- Installing a macOS Agent
- Agent Introduction
- Setting Up an Agent Using System Proxy
- DNS Lookup in UI and in Console
- Supported Browsers
- HIAB Console
- Certificates
- Marking as False Positives
- Managing Agents
- Event Notification - Integration
- HIAB Distribution Settings
- Agent Latest Version
- Column Configuration
- PGP on User Accounts
- Event Notification - Use Cases
- Logging in to the Portal
- Firewall Rules
- Account
- Notification Settings
- Products Database
- Log In Using Single Sign-On (SSO)
- Scan Assessment Configuration
- View Templates
- Ports
- Installing a Windows Agent
- Generate Reports
- Basic Credentials
- Scan Stages
- Object Identifiers
- Subscriptions Overview
- Services
- REST API Interface Technical Document
- Getting Started with the Portal
- Scan Configuration Settings
- Scans View
- Retrieving a REST API Token From XMLAPI
- HIAB E-mail Whitelisting
- Scan Credentials
- API Examples
- Tags
- Accepting a Risk
- Importing Tags for AWS Discovery
- Discovery Scan Configuration
- Products
- Vulnerabilities
- Scan Policies
- Resource Group Management
- Download Agents
- Discussions and Commenting
- Filters
- Notifications
- 2FA on User Accounts
- Assets