Automated Authentication with Bytebot

Bytebot can handle authentication automatically - including passwords, 2FA, and even complex multi-step authentication flows - when you set up a password manager extension.
Important: Password manager extensions are not enabled by default. You need to install them manually using the desktop view.

How It Works

Bytebot comes with 1Password built-in and supports any browser-based password manager extension. It can:
  • Automatically fill passwords from the password manager
  • Handle 2FA codes (TOTP/authenticator apps)
  • Manage multiple accounts across different systems
  • Work with SSO and federated authentication
  • Store and use API keys and tokens

Setting Up Password Management

1

Install 1Password Extension

  1. Go to the Desktop tab in Bytebot UI
  2. Open Firefox
  3. Install the 1Password extension from the Firefox Add-ons store
  4. Sign in to your 1Password account (or create a dedicated one for Bytebot)
2

Configure Vaults

In your 1Password admin panel:
  1. Create a vault called “Bytebot Automation”
  2. Add the credentials Bytebot needs
  3. Share the vault with Bytebot’s account
  4. Set appropriate permissions (read-only recommended)
3

Enable Auto-fill

The 1Password extension will automatically:
  • Detect login forms
  • Fill credentials
  • Handle 2FA codes
  • Submit forms

Option 2: Other Password Managers

You can use any browser-based password manager by installing it through the Desktop view:
  1. Open Desktop tab
  2. Launch Firefox
  3. Install Bitwarden extension from Firefox Add-ons
  4. Log in to your Bitwarden account
  5. Configure auto-fill settings in Bitwarden preferences

Handling Different Authentication Types

Standard Username/Password

# Task description
Task: "Log into our CRM system and export the customer list"

# Bytebot automatically:
1. Navigates to login page
2. Password manager detects form
3. Auto-fills credentials
4. Submits login
5. Proceeds with task

Time-based 2FA (TOTP)

# Task description  
Task: "Access the banking portal and download statements"

# Bytebot handles:
1. Enters username/password from password manager
2. When 2FA prompt appears
3. Password manager provides TOTP code
4. Enters code automatically
5. Completes authentication

Complex Multi-Step Auth

# Task description
Task: "Log into the government portal (uses email verification)"

# Bytebot can:
1. Fill initial credentials
2. Handle "send code to email" flows
3. Access webmail account (also in password manager)
4. Retrieve verification code from webmail
5. Complete authentication

Enterprise Setup Guide

Centralized Credential Management

1

Create Service Accounts

Set up dedicated service accounts for Bytebot:
- [email protected] (banking portals)
- [email protected] (HR systems)
- [email protected] (operational tools)
2

Organize Password Vaults

Structure your password manager:
Bytebot Vaults/
├── Financial Systems/
│   ├── Banking Portal A
│   ├── Banking Portal B
│   └── Payment Processor
├── Internal Tools/
│   ├── ERP System
│   ├── CRM Platform
│   └── HR Portal
└── External Services/
    ├── Vendor Portal 1
    ├── Government Site
    └── Partner System
3

Set Rotation Policies

Configure automatic password rotation:
// Example automation for password rotation
{
  "schedule": "monthly",
  "task": "For each credential in 'Rotation Required' vault, 
           update password in the system and save new password"
}

Security Best Practices

Least Privilege

Only share credentials Bytebot needs for specific tasks

Audit Logging

Enable password manager audit logs to track access

Vault Isolation

Separate vaults by sensitivity level and department

Regular Reviews

Audit Bytebot’s credential access monthly

Common Authentication Scenarios

Banking and Financial Systems

Scenario: Daily bank reconciliation across 5 banks

Setup:
- Each bank credential in password manager
- 2FA seeds stored for TOTP generation
- Bytebot's IP whitelisted at banks

Task: "Log into each bank account, download yesterday's 
       transactions, and consolidate into daily report"

Result: Fully automated, no human intervention needed

Government and Compliance Portals

Scenario: Weekly regulatory filings

Setup:
- Service account with 2FA enabled
- Password manager has TOTP seed
- Security questions stored as notes

Task: "Log into state tax portal, file weekly sales tax 
       report using data from tax_data.csv"

Handles: Password, 2FA, security questions, CAPTCHAs

Multi-Tenant SaaS Platforms

Scenario: Managing multiple client accounts

Setup:
- Credentials for each tenant/client
- Organized in password manager by client
- Naming convention: client-platform-role

Task: "For each client in client_list.txt, log into their 
       Shopify account and export this month's orders"

Scales: Handles 100+ accounts seamlessly

Advanced Authentication Features

SSO and SAML Integration

# Bytebot can handle SSO flows
Task: "Log into Salesforce using Okta SSO"

Process:
1. Navigate to Salesforce
2. Click "Log in with SSO"
3. Redirect to Okta
4. Password manager fills Okta credentials
5. Handle any 2FA on Okta
6. Redirect back to Salesforce
7. Continue with task

API Key Management

# Store API keys in password manager
Password Entry: "OpenAI API Key"
- Username: "api"
- Password: "sk-proj-..."
- Notes: "Rate limit: 10000/day"

# Use in tasks
Task: "Configure the application to use our OpenAI API key 
       from the password manager"

Certificate-Based Auth

# For systems requiring certificates
Setup:
1. Store certificate password in manager
2. Mount certificate file to Bytebot
3. Configure browser to use certificate

Task: "Access the enterprise portal that requires 
       client certificate authentication"

Troubleshooting Authentication

Integration Examples

Finance Automation Script

# Example: Automated invoice collection
tasks = [
    {
        "description": "Log into vendor portal A and download all pending invoices",
        "credentials": "vault://Financial Systems/Vendor Portal A"
    },
    {
        "description": "Log into vendor portal B and download all pending invoices",  
        "credentials": "vault://Financial Systems/Vendor Portal B"
    },
    {
        "description": "Process all downloaded invoices through our AP system",
        "credentials": "vault://Internal Tools/AP System"
    }
]

# Bytebot handles all authentication automatically

Compliance Automation

Daily Compliance Check:
  Morning:
    - Log into regulatory portal (2FA enabled)
    - Download new compliance updates
    - Check our status
  
  If Non-Compliant:
    - Log into internal system
    - Create compliance ticket
    - Notify compliance team
  
  All credentials managed automatically

Best Practices Summary

DO:
  • Use dedicated service accounts for Bytebot
  • Organize credentials in logical vaults
  • Enable 2FA on all accounts (Bytebot handles it!)
  • Rotate passwords regularly
  • Monitor access logs
DON’T:
  • Share personal credentials with Bytebot
  • Store passwords in task descriptions
  • Disable 2FA for convenience
  • Use the same password across systems
  • Ignore authentication errors

Next Steps

Game Changer: With proper password manager setup, Bytebot can handle even the most complex authentication flows automatically. No more manual intervention for 2FA, no more sharing passwords insecurely, and no more authentication bottlenecks in your automation workflows!