Insomnia logo
  • Documentation
  • Get Started for Free
    • Introduction to Insomnia
    • Install Insomnia
      • Create your first Collection
      • Send your first request
      • Add a pre-request script
      • Import an OpenAPI Spec
      • Generate a Collection
      • Add a pre-request script
      • Write your first test
      • Import data from another API client
      • Allowlist for Insomnia
      • Configure a proxy server
    • Insomnia Accounts
    • Forgotten Passphrase
    • Managing E2EE (End-to-End Encryption)
    • Organizations
    • Enable Enterprise membership
    • Configuring EE SSO
    • Integrating Insomnia Enterprise with Okta SAML 2.0
    • Integrating Insomnia Enterprise with Microsoft Azure/Entra ID SAML 2.0
    • Transfer enterprise organizations and license
    • Insomnia Subscriptions
    • Insomnia Subscription Management
    • Scratch Pad Tutorial
    • Requests
    • Responses
    • Request Collections
    • Request Timeouts
    • Chaining Requests
    • Post CSV Data
    • Environment Variables
    • Global Environments
    • SOAP Requests
    • gRPC
    • WebSocket Support
    • Get Started with Documents
    • Design Documents
    • Linting
    • GraphQL for OpenAPI
    • Migrate from Designer
    • Unit Testing
    • Stress Testing
    • Insomnia Storage Options Guide
    • Sync with Insomnia Cloud
    • Sync with Git
    • Key Security Features
    • Security Standards
    • Signup and Authentication
    • Analytics Collected
    • End to End Data Encryption
    • Software Bill of Materials
    • Verifying Build Provenance for Signed Insomnia Binaries
    • Authentication
    • Client Certificates
    • Generate Code Snippet
    • Cookie Management
    • Encoding
    • GraphQL Queries
    • Run in Insomnia Button
    • Key Maps
    • Proxy
    • Folder-level settings
    • Introduction to Plugins
    • Context Object Reference
    • Template Tags
    • Hooks and Actions
    • Custom Themes
    • FAQ
    • Application Data
    • SSL Validation
    • Password Recovery
    • Introduction to Inso CLI
    • Install Inso CLI
    • CLI Command Reference
      • inso run test
      • inso lint spec
      • inso export spec
      • inso script
      • Using Custom Linting with Inso CLI
    • Configuration
    • Inso CLI on Docker
    • Software Bill of Materials
    • Verifying Signatures for Signed Inso CLI Images
    • Verifying Inso CLI Build Provenance
      • Verifying Build Provenance for Signed Inso CLI Images
      • Verifying Build Provenance for Signed Inso CLI Binaries
    • Continuous Integration
    • Insomnia Pre-request Script Overview
    • Insomnia After-Response Script Overview
    • Insomnia API Mocking Overview

Authentication

Insomnia provides a number of authentication helpers to make it trivial to interface with the most common authentication standards. Choose your standard, fill in the prompted fields, and Insomnia will take care of the rest.

Authentication Basics

To set up authentication for a given request, select the desired authentication type from the Auth dropdown. Then, fill out the required fields.

The Auth dropdown menu shows all of the built-in authentication types. Select your authentication type from the Auth dropdown menu.

Supported Authentication Types

Currently, Insomnia supports the following authentication standards.

Basic Auth

Basic authentication is one of the most basic ways to authenticate an HTTP request and is commonly used for passing API keys to authenticate popular APIs such as Stripe.

Digest Auth

Digest is sometimes confused with Basic because it also uses a username and password, but it is much more complicated. To authenticate with a Digest endpoint, the client must send two requests instead of one. The first request sent to the server receives a nonce value, which is then used to produce a one-time-use hash key to authenticate the request.

OAuth 1.0

OAuth 1.0 provides a method for clients to access server resources on behalf of a resource owner. OAuth 1.0 is used for many popular application APIs such as Twitter.

OAuth 2.0

The OAuth 2.0 authorization framework enables applications to obtain limited access to an HTTP service, usually on behalf of a resource owner. OAuth 2.0 is used for many popular application APIs such as GitHub, Facebook, Google, Dropbox, and many more.

Microsoft NTLM

NTLM is the authentication protocol used on networks that include systems running the Windows operating system and on stand-alone systems. Learn more by visiting the Microsoft NTLM Documentation.

AWS IAM v4

AWS IAM v4 is the mechanism used to authenticate with the AWS API. Read more in the AWS Docs Signature Version 4 documentation.

Bearer Token

The bearer token mechanism is commonly used within the OAuth 2.0 protocol and is outlined in RFC6750. When this authentication type is selected, the interface will provide three fields:

  • [Checkbox] ENABLED: Check or un-check this box to send your credentials in the Authorization header. This provides a useful way to keep your credentials in the interface, but not send them.

  • TOKEN: The token that will be provided in the Authorization header.

  • PREFIX: The prefix for your token. If omitted, the prefix will default to Bearer . Note that there currently is no way to completely remove the prefix from the header.

The header will be submitted like this:

> Authorization: PREFIX TOKEN

HawK

Hawk is an HTTP authentication scheme using a message authentication code (MAC) algorithm to provide partial HTTP request cryptographic verification. Learn more via the Hawk GitHub project.

Atlassian ASAP

Learn more about Atlassian S2S Authentication Protocol Specification.

Netrc file

The .netrc file contains login and initialization information used by the auto-login process. Learn more via the GNU documentation.

This authentication type requires no user input. The .netrc file on your computer will be located and used automatically.

Edit this page
Report an issue
    COMPANY
  • Insomnia
  • Blog
  • Changelog
  • Pricing
  • Careers
    PRODUCTS
  • Insomnia
  • Inso (CLI)
    RESOURCES
  • Sign In
  • Documentation
  • Support
    LEGAL
  • Privacy Policy
  • Terms & Conditions
© Kong Inc. 2021