Skip to main content

index

Set up authentication config from browser network logs

info

This feature is currently available only to selected organizations.

This document describes how to set up the "automatic login before diagnosis" feature in Shisho Cloud using a HAR file containing the network logs generated by the login operation.

Capture network logs from your browser

Steps for Google Chrome

Use incognito mode to perform the following steps.

Set up developer tools

  1. Open Developer Tools.
  2. Click the gear icon in the top right to open the settings. The gear icon is highlighted in the developer tools, opened in incognito mode.
  3. Scroll down to the "Network" section.
  4. Check the "Allow to generate HAR (with sensitive data)" box. The checkbox for "Allow to generate HAR (with sensitive data)" is checked.
  5. Close the settings.
info

You need to include sensitive data such as cookies in order to use this information to set up the "automatic login before diagnosis" feature.

Prepare for traffic capture

Before accessing the application to be diagnosed, please make the following preparations:

  1. Open the Network tab of Developer Tools in incognito mode.
  2. Check the Preserve log checkbox. The "Preserve log" checkbox is checked.

Access the application to be diagnosed and log in

  1. Open the login page.
  2. Enter your username, password, etc. and log in.

Save network logs

  1. Long-press the save button at the top right of the Network tab of Developer Tools to display two options: "Export HAR (sanitized)" and "Export HAR (with sensitive data)". The save button and options at the top right of the Network tab of Developer Tools are highlighted.
  2. Select "Export HAR (with sensitive data)".
  3. Save the file to the directory of your choice.

Upload HAR file

  1. In the Login Process Settings screen, import the downloaded HAR file. The import screen of the login process setting screen is highlighted.
  2. The authentication definitions will be automatically generated based on the network logs.
  3. Use the "Connectivity Check" function to verify that the login process can be reproduced correctly.
    • If the login is not successful, please modify the generated definition.
    • It is recommended to remove any unnecessary authentication steps. (This will allow for faster authentication.)