Authenticating to the Platform
Access your private platform instance by navigating to the URL provided: https://dashboard.MASKED.binarly.cloud/ Where MASKED would be your individual assigned instance name. This is a randomly generated URL to ensure security. We recommend creating a browser bookmark for ease of use. You will be redirected to the authentication provider page, where you can log in using your email. Accounts will be provisioned along with the dashboard instance. These will be the primary points of contact and will be provided to your account team during onboarding. Adding additional accounts to the platform, can be performed by a user defined as an organization admin within the platform. Lost passwords and password resets can be performed by clicking the âForgot passwordâ link, contacting your organization admin, or simply by opening a ticket with the Binarly support team. By default, Multi-Factor Authentication and strong passwords are enforced. You will be prompted to configure this on your initial login. The platform will work with almost any multi-factor authentication application. Microsoft and Google Authenticator applications are popular choices.To configure Multi-Factor Authentication (MFA):
- Download an authenticator app such as Google Authenticator or Microsoft Authenticator on your mobile device.
- Scan the QR code displayed during the initial login.
- Enter the generated code to complete the MFA setup.
Note: If you face issues during setup, refer to the authenticator appâs user guide or contact Binarly Support.
Password Policy
The minimum password length for SaaS instances of the Binary Transparency Platform is 32 characters. Passwords must also meet complexity requirements, including at least one capital, alphanumeric, and special character. Due to these complex requirements, we strongly recommend utilizing a password vaulting solution and randomly generated passwords rather than manually entering strong passwords.Workflows
The Binarly Transparency Platform provides workflows designed specifically for user personas and functional applications of the solution. Common users include supply chain security teams, third-party vendor evaluators, firmware/BIOS developers, OEMs, and ODMs. These users typically utilize one of two primary workflows: project-based or validation (scan)-based. Automation capabilities are extensively employed in software development life cycles (SDLC) and Continuous Integration/Continuous Deployment (CI/CD) pipeline applications of the solution. In a project-based workflow, an OEM or device manufacturer typically incorporates the platform as part of their release validation process. This ensures that final compiled binaries are free of vulnerabilities prior to the release of software packages or updates. With its robust, REST API-based architecture, the Binarly Transparency Platform can seamlessly integrate into existing development or quality assurance workflows, offering flexibility and scalability. In a software supply chain or third-party vendor validation workflow, any third-party binaries can be submitted to the platform for assessment. This process provides deep insights into the contents and vulnerability posture of software at levels typically unattainable without source code access. The platform enables critical visibility into issues within components, dependencies (both static and transitive), cryptographic materials, embedded secrets, and adherence to secure-by-design principles. These capabilities ensure that vulnerabilities in binaries, whether currently deployed or being integrated into enterprise infrastructure, products, or environments, are identified and mitigated effectively.Platform Components
The Binarly Transparency Platform is organized into logical components that follow a clear and intuitive flow. This design ensures that usersâwhether analysts, administrators, or executivesâcan easily access the specific information relevant to their roles and use cases. Key Features of the Platform Components-
User-Centric Design:
-
Tailored to different personas, providing role-specific data and insights:
- Analysts: In-depth vulnerability and threat details.
- Administrators: Configuration and management tools.
- Executives: High-level overviews and trend analysis.
-
Tailored to different personas, providing role-specific data and insights:
-
Default Dashboard View:
- Upon login, users are presented with a cumulative dashboard, offering an aggregated overview of all data assessed by the platform.
- This dashboard acts as a central hub, summarizing key metrics, findings, and trends across the entire environment.
-
Logical Flow:
- The platform is structured to guide users seamlessly through workflows, ensuring they can efficiently analyze, prioritize, and act on findings.