Skip to content
This repository has been archived by the owner on Jul 9, 2023. It is now read-only.

Set authentication credentials for requests from Titanium #800

Open
melanchall opened this issue Sep 23, 2020 · 5 comments
Open

Set authentication credentials for requests from Titanium #800

melanchall opened this issue Sep 23, 2020 · 5 comments

Comments

@melanchall
Copy link

Hi,

Is it possible to set authentication credentials that will be used with each request? To understand what I mean, look please at Fiddler and its ability to specify X-AutoAuth parameter: https://docs.telerik.com/fiddler/Configure-Fiddler/Tasks/AuthenticateWithCBT. From the mentioned article:

To use creds other than your Windows login credentials, set X-AutoAuth to "domain\username:password"

Is it possible to specify desired creds with Titanium?

@honfika
Copy link
Collaborator

honfika commented Sep 23, 2020

You can do it manually in the BeforeResponse event if you know how to set this authentication headers for windows. (I don't know)

@melanchall
Copy link
Author

I need to set custom credentials for NTLM/Negotiate authentication. From the docs I see:

EnableWinAuth
Enable disable Windows Authentication (NTLM/Kerberos). Note: NTLM/Kerberos will always send local credentials of current user running the proxy process. This is because a man in middle attack with Windows domain authentication is not currently supported. Defaults to false.

So right now there is no way to set arbitrary credentials with Titanium?

@honfika
Copy link
Collaborator

honfika commented Sep 24, 2020

It is not possbile with an easy property setting.
You can do it only manually.

@melanchall
Copy link
Author

Are there any plans to provide simple way of doing it like Fiddler provides?

@honfika
Copy link
Collaborator

honfika commented Sep 24, 2020

No, sorry... but we are accepting pull request.. so if you implement it, it will be included:)

Sign up for free to subscribe to this conversation on GitHub. Already have an account? Sign in.
Projects
None yet
Development

No branches or pull requests

3 participants