From 66ae1b615aefc06c67d80cfa84ad1b7c5b92b137 Mon Sep 17 00:00:00 2001 From: zapbot <12745184+zapbot@users.noreply.github.com> Date: Fri, 24 Jan 2025 17:42:13 +0000 Subject: [PATCH] Update site content From: zaproxy/zaproxy-website@053da222929c2b1ae8c6d6e779335541c389918e Signed-off-by: zapbot <12745184+zapbot@users.noreply.github.com> --- docs/getting-further/authentication/session-handling/index.html | 2 +- search/index.json | 2 +- 2 files changed, 2 insertions(+), 2 deletions(-) diff --git a/docs/getting-further/authentication/session-handling/index.html b/docs/getting-further/authentication/session-handling/index.html index d8867c171f..9d18099665 100644 --- a/docs/getting-further/authentication/session-handling/index.html +++ b/docs/getting-further/authentication/session-handling/index.html @@ -144,7 +144,7 @@
Session management configuration is part of a ZAP context.
ZAP supports Cookie and HTTP Authentication Session Management out of the box.
diff --git a/search/index.json b/search/index.json index 94bd5b7b0f..6f33001839 100644 --- a/search/index.json +++ b/search/index.json @@ -4973,7 +4973,7 @@ "keywords": ["-","authentication","guide","handling","session"], "tags": ["authentication","guide"], "summary": "\u003cp\u003e\u003cscript type=\"text/javascript\" async src=\"https://play.vidyard.com/embed/v4.js\"\u003e\u003c/script\u003e\n\nIf ZAP is handling authentication then it needs to handle sessions as well - logging in is of no use if ZAP does not maintain the session as the target app will just treat ZAP as being unauthenticated.\u003c/p\u003e\n\u003cp\u003e\u003ca href=\"/docs/desktop/start/features/sessionmanagement/\"\u003eSession management\u003c/a\u003e configuration is part of a ZAP context.\u003c/p\u003e", - "content": "zap handling authentication then needs handle sessions logging use does not maintain session target app will just treat being unauthenticated management configuration part context desktop configured via screen framework defined environment api endpoints underneath sessionmanagement component supports cookie http out box your uses another mechanism you can that using custom script applications may implement serverside clientside both sides difficult test isolation typically need also configure before should always try auto detection first works nearly handled by headers straightforward getting hold tokens put harder do know what type application authenticate manually while proxying through look responses from headerbased arbitrary number used conjunction browser based all cookies set cookiebased see any setcookie returned likely make request verification url authenticated open manual editor dialog check there header when send indicates logged case remove response longer other such which wwwauthenticate authorization above automatically performed making requests ajax spider dom xss scanner rule cannot reason inject into selenium scripts video explains demonstrates how up owasp juice shop: previous finding next methods " + "content": "zap handling authentication then needs handle sessions logging use does not maintain session target app will just treat being unauthenticated management configuration part context desktop configured via screen automation framework defined environment api endpoints underneath sessionmanagement component supports cookie http out box your uses another mechanism you can that using custom script applications may implement serverside clientside both sides difficult test isolation typically need also configure before should always try auto detection first works nearly handled by headers straightforward getting hold tokens put harder do know what type application authenticate manually while proxying through look responses from headerbased arbitrary number used conjunction browser based all cookies set cookiebased see any setcookie returned likely make request verification url authenticated open manual editor dialog check there header when send indicates logged case remove response longer other such which wwwauthenticate authorization above automatically performed making requests ajax spider dom xss scanner rule cannot reason inject into selenium scripts video explains demonstrates how up owasp juice shop: previous finding next methods " }, { "url": "/docs/alerts/10105-1/",