Basic Authentication (Username & Password)
Basic auth is the simplest authentication type: email/username + password on a login form.
When to Use
- ✅ Traditional login forms (email + password)
- ✅ Email-based accounts
- ✅ No 2FA enabled
- ❌ For TOTP/MFA, use TOTP auth instead
- ❌ For OTP codes, use Email OTP instead
Setup Guide
1
Navigate to Personas
Go to Dashboard → Personas, or Settings → Personas tab
2
Click 'Create Persona'
Button in top-right corner
3
Fill Basic Information
Name (e.g., 'QA Admin'), Project, Email address
4
Select Auth Type
Choose 'Basic Auth' from the dropdown
5
Enter Credentials
Email and password (password is encrypted immediately)
6
Save Persona
Click 'Create'. Credentials are now encrypted at rest
Persona Fields
| Field | Required | Example | Notes |
|---|---|---|---|
| Name | ✓ | QA Admin | User-friendly name for reference |
| Project | ✓ | Acme E-commerce | Which project this persona belongs to |
| ✓ | qa-admin@example.com | Login email address | |
| Password | ✓ | SecurePass123! | Never shown after saving, encrypted |
| Login URL | Optional | https://app.example.com/login | Auto-filled if set |
| Description | Optional | Test admin account | What this persona is for |
Using in Tests
In Manual Tests
- Create a test case
- When running, select the persona from dropdown
- AI automatically logs in using the stored credentials
In AI-Generated Tests
Specify in the prompt:
"Generate tests for the admin dashboard. Use the QA Admin persona for login."In Test Plans
Tests in the plan inherit the persona selection:
Test Plan: Admin Workflow
├─ Use Persona: QA Admin
├─ Test 1: Admin can view user list
├─ Test 2: Admin can delete users
└─ Test 3: Admin can reset passwordsWhat Happens During Execution
When a test with a persona runs:
1. Test starts
2. AI sees login page
3. AI decrypts persona (AES-256)
4. AI fills email field: qa-admin@example.com
5. AI fills password field: (from encrypted storage)
6. AI clicks Sign In button
7. Page navigates to dashboard
8. Session cached for future runs
9. Test continues with authenticated stateResult: Login is 100% automated. No manual password entry.
Session Caching
After first login, the session (cookies + localStorage) is cached for 8 hours:
Run 1: Login takes ~5 seconds
Run 2: Session restored, login skipped (~1 second)To manually clear a cached session:
- Go to Personas
- Click the persona
- Click “Clear Session” button
- Next run will re-authenticate
Credentials Security
Your credentials are protected:
| Layer | Method |
|---|---|
| At Rest | AES-256-GCM encryption |
| In Transit | HTTPS/TLS |
| In Logs | Passwords never logged or exposed |
| Access | Only your organization; only visible on creation |
| Audit | All persona usage is logged |
Important
- Never reuse production passwords for test personas
- Create dedicated test accounts for each persona
- Use strong passwords (12+ chars, mixed case, numbers, symbols)
- Rotate passwords periodically
- Delete unused personas to reduce attack surface
Multi-Persona Testing
Test role-based features with multiple personas:
Test: "Admin can invite user, user can accept"
├─ Step 1: Login as Admin (Persona: QA Admin)
├─ Step 2: Send invite to user@example.com
├─ Step 3: Logout
├─ Step 4: Login as User (Persona: QA User)
├─ Step 5: Verify invitation in inbox
├─ Step 6: Accept invitation
└─ Result: ✓ PassEach persona maintains its own session.
Troubleshooting
”Login Failed” Error
Likely causes:
- Wrong email or password
- Account is locked (too many failed attempts)
- Account is disabled or deleted
- MFA enabled (use TOTP auth instead)
Fix:
- Verify credentials manually in your browser
- Check if account is active in admin panel
- Try resetting the account password
- Confirm MFA is not enabled
Session Expires Mid-Test
Sessions cache for 8 hours. If a test runs > 8 hours after login:
- Option 1: Disable caching (clear session after each test)
- Option 2: Re-login mid-test (“Add login step midway”)
- Option 3: Increase session TTL (contact support)
Multiple Users with Same Email
Not supported. Create separate test accounts with different emails:
❌ Don't do this:
Persona 1: admin@example.com (admin role)
Persona 2: admin@example.com (user role)
✓ Do this instead:
Persona 1: qa-admin@example.com
Persona 2: qa-user@example.comBest Practices
- Use dedicated test accounts — Don’t use real user accounts
- Strong passwords — 12+ chars, mix of upper/lower/numbers/symbols
- Avoid special characters — Some login forms don’t handle them well
- Test both success and failure — Valid AND invalid credentials
- Rotate credentials — Change passwords quarterly
- Document personas — Keep notes on which persona is which role
- Secure persona emails — Use test domain if available (qa@example.com)
Next Steps
- TOTP / MFA Testing — For 2FA flows
- Email OTP Testing — For passwordless flows
- Session Management — Advanced caching
- How-To: Test Authenticated Flows — Full walkthrough