This guide walks you through the configuration process for Astra’s vulnerability scanner on web applications — from setting the scan scope to enabling login authentication. Proper configuration ensures maximum vulnerability coverage with minimal noise.
Security engineers, DevOps, and developers setting up web application scans. Access to the Astra dashboard and knowledge of your app's architecture and authentication are required.
Accurate configuration allows the scanner to explore the entire attack surface, including authenticated areas, and reduces false positives by targeting only what matters.
Before starting the setup, ensure the following details are available :
Scope URL
Share a non-production environment URL (preferably QA or Staging) for testing.
User Roles & Credentials
Provide login credentials for all relevant user roles (e.g., admin
, user
, etc.).
It’s recommended to create temporary accounts, as test data may be added.
Requirements for the Automated Scanner
Astra’s automated scanner is the first step in your Pentest journey. As soon as the scan begins, results start appearing in real time. You can refer to the step-by-step guide below to set it up.
OTP / Authenticator Flows
For apps using OTPs, magic links, or authenticator apps:
Ideally, provide a static OTP or a bypass mechanism.
This ensures seamless authenticated scanning.
API Integration (If Applicable)
Base URL of your API
OpenAPI Specification (JSON/YAML) to improve crawl coverage (optional but highly recommended)
Go to the Targets page on the Astra dashboard.
Click on the Setup Target button next to the target you wish to configure.
You'll now enter the setup wizard where you define your scan configuration.
To avoid scanning unnecessary third-party services, specify the scope precisely.
Target URL: The base domain or path (e.g., https://app.example.com
)
Scope: Limits the scan to certain subdomains or URI paths
Learn how to configure scope
Choosing between production vs staging environments
Decide how much of your domain tree should be explored:
All Subdomains: Includes app.example.com
, api.example.com
, etc.
Target Subdomains Only: Restricts to the exact domain/subdomain you enter
Starting with URI: Limits crawl to paths starting with e.g., /admin
If your app uses other hostnames (CDNs, microservices, external APIs), add them here so they’re included in the scan.
Enhance scanner coverage by:
Allowing it to crawl APIs and subdomains
Uploading an OpenAPI Spec (JSON/YAML) for deeper and faster endpoint discovery
If your application requires login:
Create accounts for each user role (e.g., Admin, User, Manager)
Provide the credentials during setup
Create temporary accounts to avoid unwanted data in production
Use Chrome DevTools Recorder to capture the login process:
Helps the scanner authenticate into your app
Set session timeout (in seconds) so it reauthenticates as needed
Select technologies your app uses to:
Improve vulnerability detection accuracy
Reduce false positives
Speed up scan duration
Supported stack options include frameworks (React, Django), languages, CMSs, etc.
Give a brief overview of your app’s purpose and key features:
Example: A SaaS app for booking appointments online. Users can view availability, schedule, and pay through the portal. Built with Vue.js frontend and Node.js backend.
This context helps Astra create business logic test cases during manual testing.
Customize the scan further:
HTTP Headers: Add custom headers if needed (e.g., tokens, cookies)
Exclude URLs: Use keyword match or regex to skip sensitive or irrelevant pages
Review your configuration. Once satisfied, click Complete Setup.
⚠ Any config changes made mid-scan will only apply to the next scan.
Reach out to our support team via the dashboard or submit a ticket if you face issues during setup.