Many websites require authentication before allowing access to protected content or actions. Browserbase provides flexible methods for handling authentication in automated sessions, ensuring seamless logins while maintaining security and efficiency.Why Authentication Matters in Automation
Ensures access to restricted content without manual intervention.
Reduces session expiration issues by persisting login states.
Prevents bot detection and account lockouts with stealth techniques.
Handling authentication in automation requires maintaining session state, avoiding bot detection, and resolving challenges like CAPTCHAs or multi-factor authentication (MFA). Browserbase provides several strategies to help you authenticate reliably while ensuring security and efficiency.
Create a session with context, proxies, and fingerprinting.
Use the Session Live View to log into the website.
Use the context ID to persist the authentication state across future sessions.
For authentication workflows, the best practice is to log in manually once using Session Live View, then persist the authentication state across future sessions using contexts. This approach ensures secure, repeatable logins without needing manual input every time.
Start a new session and retrieve the Session Live View URL.
Open the Live View in your browser to interact with the session in real time.
Once logged in, the session’s authentication data (cookies, session tokens) is stored.
Save the session context id so future sessions can reuse the authentication state without logging in again.
Use the context ID to persist the authentication state across future sessions
After logging in once, you can reuse the authentication state by storing it in a context. This allows future sessions to bypass the login process, maintaining access to authenticated pages without needing manual input.Now, any session using this context.id will start already logged in, eliminating the need to authenticate again. By persisting authentication with contexts, you can ensure seamless automation, reduce login failures, and improve session continuity.
Two-step verification (via authenticator apps or SMS) or magic links usually require human intervention in the loop. There are 2 main strategies to manage 2FA:
If a two-step verification mechanism cannot be bypassed or disabled, consider handing back control to the end user by leveraging the Session Live URLs.
Accessing an authentication flow with Stealth Mode
Many authentication flows implement mechanisms to prevent web automation:
IP addresses restrictions
User agent filtering
Captchas
Rate limiting
When running your browser session, dealing with these impediments may require setting up IP
rotations with proxies along with captcha solving and fingerprint generators.By automating with Browserbase, you get opt-in proxies, automatic, fully configurable
fingerprinting, and captcha solving—without any coding:
Some websites or web apps rely on cookies-based Sessions, which can be easily retrieved and reused to speed up your automation.The code examples below showcases how to retrieve and set cookies to avoid your automation to go through the authentication flow at each run:
Playwright
Copy
Ask AI
import Browserbase from "@browserbasehq/sdk";import { chromium } from "playwright-core";import storage from "./storage.js";async function authenticate(page, context) { const session = await storage.getSession(); if (session) { await context.addCookies([session]); // try to access a protected page await page.goto("https://www.browserbase.com/overview"); if (page.url === "https://www.browserbase.com/overview") { // no redirect -> we are authenticated, let's skip the authentication flow return; } } await page.goto("https://www.browserbase.com/sign-in"); // ... sign-in ... // retrieve User Session Cookie const cookies = await context.cookies(); const sessionCookie = cookies.find((c) => c.name === "session_id"); await storage.storeSession(sessionCookie);}(async () => { const bb = new Browserbase({ apiKey: process.env.BROWSERBASE_API_KEY }); const session = await bb.sessions.create({ projectId: process.env.BROWSERBASE_PROJECT_ID, proxies: true }); const browser = await chromium.connectOverCDP(session.connectUrl); // Getting the default context to ensure the sessions are recorded. const defaultContext = browser.contexts()[0]; const page = defaultContext.pages()[0]; await authenticate(page, defaultContext); // ... interact with page ... await page.close(); await browser.close();})().catch((error) => console.error(error.message));
Passkeys are a modern authentication method that can present challenges for automation since they typically require user interaction. When automating sites that use passkeys, you’ll often want to disable or bypass them since the required user interactions aren’t supported in automated sessions.
To prevent passkey prompts from appearing and potentially blocking your automation, you can disable them using the Chrome DevTools Protocol (CDP). Here’s how to do it:
Adds a virtual authenticator that prevents real passkey prompts
By setting up this virtual authenticator, you prevent the browser from prompting for actual passkey authentication, allowing your automation to proceed with other authentication methods like username/password.
When passkeys are enabled on a site, there’s usually an alternative authentication method available (like username/password). After disabling passkeys, look for these alternative methods: