Applications

Create and manage your authentication applications with full control over API keys, licenses, and security settings.

Overview

Applications are the foundation of Atlas Authentication. Each application represents a software product you want to protect with license-based authentication. Every application has its own unique API key, independent license pool, and configurable security settings.

Create Applications
Launch new applications with custom names and descriptions for your products.
API Key Management
Securely view and reset API keys with email verification protection.
Reseller Support
Grant granular permissions to other Atlas users for collaboration.
Data Control
Reset or permanently delete application data with safeguards.

Creating an Application

To create a new application:

  1. Click the Create Application button in the dashboard
  2. Enter a unique name for your application
  3. Add an optional description (visible only to you)
  4. Click Create to generate the application
  5. Your API key will be displayed once - copy and store it securely
API Key Security

API keys are shown only once during creation. Store them securely in your application's configuration. You cannot retrieve the same key again - you can only reset it to generate a new one.

Available Actions

Action Description Verification
View API Key Reveal the full API key for integration into your software Email Link
Reset API Key Generate a new API key (invalidates the previous key) Email Link
Rename Update application name and description None
Reset Application Delete all licenses, bans, and logs (preserves app, hashes, files) Email Link
Delete Application Permanently remove entire application and all associated data Email Link

Email Verification Process

Destructive actions require email verification for security:

  1. Click the action button (View API Key, Reset API Key, Reset Application, or Delete)
  2. A verification email is sent to your registered email address
  3. Open the email and click the verification link
  4. The action executes automatically upon clicking the link
  5. You receive confirmation in the dashboard
Link Expiration

Email verification links expire after a short period for security. If a link expires, simply request a new verification email by clicking the action button again.

Application Information Display

Each application card in your dashboard shows:

  • Application Name - Your chosen identifier for the application
  • Description - Optional details about the application purpose
  • API Key Hint - Last 4 characters of the API key (e.g., ••••-••••-••••-A1B2)
  • Creation Date - When the application was originally created
  • Reseller Tag - If the application is managed by a reseller, displays their organization name

Selecting an Application

Click any application card to select it as the active application. The selected application's data will populate all other dashboard tabs including Licenses, Bans, Logs, Monitor, and Settings. Only one application can be active at a time.

Application Scope

All dashboard tabs operate within the context of the currently selected application. Always verify you have the correct application selected before making changes.

Licenses

Generate, manage, and export license keys with advanced customization, bulk operations, and inline editing capabilities.

License Generation

Atlas provides comprehensive license generation with full control over format, duration, and access levels.

Basic Generation Process

  1. Click Create License in the Licenses tab
  2. Set the number of licenses to generate (1-10,000)
  3. Select duration type: Hours, Days, Weeks, Months, Years, or Lifetime
  4. Enter duration value (ignored for Lifetime licenses)
  5. Assign a level value (1-100) for permission tiers
  6. Add optional notes or descriptions
  7. Click Generate to create licenses

Advanced Customization

Feature Description Example
Custom Mask Define license key format using pattern characters KEY-****-####
ATLAS-***-***-***
Charset Select which characters to include in generation Uppercase (A-Z), Lowercase (a-z), Numbers (0-9), Special
Duration Time until license expires after first use 30 Days, 1 Year, Lifetime
Level Permission tier for feature gating 1 (Basic), 50 (Pro), 100 (Enterprise)
Notes Internal notes or customer information "Customer: John Doe", "Order #12345"
Quick Profiles

Save your generation settings to 5 profile slots for instant reuse. Ideal for creating standardized license tiers like Basic, Pro, and Enterprise with consistent formatting.

License Management

Inline Editing

Edit license properties directly in the table without opening modal dialogs:

  • Expiry Date - Click to open date picker and modify expiration
  • Note - Double-click to edit description text
  • Level - Double-click to change permission level (1-100)

Individual License Actions

Action Function
Reset License Clear HWID and IP bindings, allowing the license to be used on new hardware or from a different location
Ban License Create a ban entry for this license key, immediately denying all authentication attempts
Pause/Suspend Temporarily disable the license. While suspended, all authentication attempts are denied. Toggle again to resume.
Delete Permanently remove the license from your application

Bulk Operations

Select multiple licenses using checkboxes to perform batch operations:

Bulk Delete
Remove multiple selected licenses in one action
Bulk Reset
Clear HWID and IP bindings for all selected licenses
Bulk Suspend
Pause multiple licenses simultaneously
Delete Expired
Remove all expired licenses with one click

Export System

Export license data in customizable formats for external use:

Column Selection

Choose which fields to include in your export:

  • License Key - The unique license identifier
  • Note - Internal notes or descriptions
  • Level - Permission tier (1-100)
  • Expiry Date - When the license expires
  • Hardware ID (HWID) - Bound device identifier
  • IP Address - Last connection IP
  • Location - Geographic location from IP
  • Last Login - Most recent authentication timestamp
  • Device - Device information string

Delimiter Options

Delimiter Format Use Case
Comma key1,note1,level1 Standard CSV format for spreadsheets
Newline key1\nkey2\nkey3 One key per line for simple lists
Semicolon key1;note1;level1 Alternative CSV for EU locales
Tab key1\tnote1\tlevel1 TSV format for easy spreadsheet import
Pipe key1|note1|level1 Pipe-delimited for data processing

Export Scope

  • Export Selected - Export only licenses with checked checkboxes
  • Export All - Export entire license list regardless of selection

License Table Columns

The license management table displays comprehensive information:

Column Information
License Key Unique identifier used for authentication
Note Internal notes, customer info, or order details (editable)
Level Permission level from 1-100 (editable)
Expiry Expiration date or "Never" for lifetime licenses (editable)
HWID Hardware ID if license is bound to specific hardware
Last IP Most recent connection IP address
Location Geographic location derived from IP geolocation
Last Login Timestamp of most recent successful authentication
Device Device information from last connection
Status Active, Expired, or Suspended indicator

Search and Filtering

Use the search box to instantly filter licenses by:

  • License key (partial or full match)
  • Hardware ID (HWID)
  • IP address
  • Notes or description text

Bans

Block user access using license keys, hardware IDs, IP addresses, or advanced deep hardware tracking with 9-component monitoring.

Ban Types

Atlas supports multiple ban mechanisms for comprehensive access control:

License Key Ban
Block specific license keys from authenticating
Hardware ID Ban
Ban individual hardware identifiers
IP Address Ban
Block connections from specific IP addresses
Deep Ban (Auto)
Security Engine tracks 9 hardware components for advanced evasion prevention

Creating Bans

Manual Ban Creation

  1. Click Add Ban in the Bans tab
  2. Enter identifier (license key, HWID, or IP address)
  3. System automatically detects the ban type
  4. Enter reason for the ban (required for record-keeping)
  5. Select duration:
    • Permanent - Ban never expires
    • Temporary - Set specific expiration date
  6. Click Create Ban to activate
Automatic Detection

The ban system intelligently identifies whether your input is a license key, HWID, or IP address without requiring manual type selection.

Quick Ban from Licenses

Ban directly from the Licenses table:

  1. Locate the license in the Licenses tab
  2. Click the ban icon button in the Actions column
  3. Confirm the action in the popup dialog
  4. Ban is created with reason "Manual ban from dashboard"

Ban Sources

Source Description
Manual Ban Created by administrator through dashboard interface
System Automatic ban triggered by system rules or alert conditions
Security Engine Cascade ban issued by security alert rules in Settings
Security Engine (Deep Ban) Advanced deep hardware tracking ban issued automatically

Deep Ban System

Deep bans provide advanced hardware component tracking to prevent ban evasion through HWID spoofing. The system monitors 9 distinct hardware components:

Component Tracked Information
GPU Graphics card unique identifier and serial number
Motherboard Mainboard serial number and manufacturer ID
RAM Memory module serial numbers and identifiers
CPU Processor unique ID and serial number
BIOS Firmware identifier and version signature
Disk Storage drive serial number
MAC Address Network adapter hardware address
Monitor Display device serial number and EDID
System UUID Unique system identifier from BIOS/UEFI
Deep Ban Behavior

Deep bans are automatically issued by the Security Engine when suspicious activity is detected. They track multiple hardware components simultaneously, making ban evasion through simple HWID spoofing ineffective.

Managing Bans

Individual Actions

  • Revoke/Remove - Delete the ban entry and restore access for the banned identifier

Bulk Operations

Select multiple bans using checkboxes:

  • Revoke Selected - Remove multiple bans simultaneously in one action

Search and Filter

Find bans using the search box by:

  • IP address (full or partial)
  • Hardware ID (HWID)
  • License key
  • Ban reason text

Ban Information Display

The bans table shows comprehensive ban details:

  • Issued By - Creator of the ban (username, System, Security Engine, etc.)
  • License Key - Banned license if applicable
  • HWID - Banned hardware ID if applicable
  • IP Address - Banned IP address if applicable
  • Reason - Explanation for why the ban was issued
  • Expiry - Expiration date or "Permanent"
  • Timestamp - When the ban was created

Logs

View detailed authentication events, system activities, and security alerts with real-time filtering and search capabilities.

Log Event Types

Atlas tracks 9 distinct event types across your authentication system:

Type Description
SUCCESS Authentication succeeded - user logged in successfully
AUTH_SUCCESS Alternative success event type for authentication completion
DENY Connection denied - authentication failed or was blocked by security rules
BAN User banned - ban was issued during authentication attempt
ERROR System error occurred during authentication process
WARNING Security warning or suspicious activity detected
INFO Informational event or system message
ADMIN Administrative action performed through dashboard
SYSTEM System-level event or internal operation

Log Entry Information

Each log entry contains comprehensive event details:

Field Content
Timestamp Exact date and time when the event occurred
Type Event category (SUCCESS, DENY, ERROR, etc.)
Message Detailed description of what happened during the event
License Key License involved in the authentication attempt (if applicable)
IP Address Connection source IP address
Location Geographic location derived from IP geolocation
Hardware ID Device HWID used in authentication (if applicable)
Device Device information string and platform details
App Hash Executable SHA-256 hash with description (if hash validation enabled)
Verdict Final authentication result (Allowed, Denied, Banned, etc.)

Filtering and Search

Type Filter

Filter logs by specific event type using the dropdown selector:

  • All - Display all log types
  • SUCCESS - Only successful authentications
  • DENY - Only denied connection attempts
  • ADMIN - Only administrative actions
  • BAN - Only ban-related events
  • INFO - Only informational messages
  • ERROR - Only system errors
  • WARNING - Only security warnings

Text Search

Use the search box to filter logs by:

  • Message content (partial or full text match)
  • License key
  • IP address

Log Management Features

Real-time Streaming
Logs appear automatically as events occur in your application
Auto-scroll
Toggle automatic scrolling to latest log entries
Manual Refresh
Click refresh button to manually update log display
Clear Logs
Delete old log entries to maintain dashboard performance

Clearing Logs

Remove old logs to keep your dashboard clean and performant. This action permanently deletes log entries and cannot be undone.

Log Retention

Logs are retained according to your account plan tier. Free accounts have limited retention periods, while paid plans offer extended log history for compliance and analysis.

Monitor

Track active sessions in real-time, view application statistics, and manage connected users with session control.

Real-time Statistics

The Monitor tab displays 7 key metrics, automatically refreshed every 5 seconds:

Total Licenses
Total number of licenses created in your application
Active Now
Number of users currently connected and authenticated
Today's Logins
Successful authentication attempts today
Today's Denials
Blocked authentication attempts today
Total Bans
Active ban count across all ban types
Active Users
Unique users with active sessions
Resellers
Number of active reseller accounts

Active Session Information

View comprehensive details about connected users:

Field Information
License Key License being used in this session
Session ID Unique identifier for the active session
Status Online indicator showing real-time connection state
IP Address Connection source IP address
Hardware ID Device HWID used for authentication
Device Device information string and platform
Username User identifier if provided by application
Connected Timestamp when session was established
Last Seen Most recent activity timestamp from this session

Session Management

Individual Session Actions

Action Function
Kill Session Immediately terminate a specific user's active session. User is disconnected but can reconnect unless banned or suspended.
Message Session Send a message to a specific connected user. Message appears in their client application.

Bulk Actions

Action Function
Message All Active Sessions Broadcast a message to all currently connected users simultaneously
Terminate All Active Sessions Force disconnect all users at once. Useful for maintenance windows or emergency shutdowns.
Session Termination

When you terminate a session, the user is immediately disconnected. They can reconnect unless their license is suspended or banned. To permanently prevent access, suspend the license or create a ban.

Messaging System

Individual Messages

  1. Locate the session in the active sessions table
  2. Click Message Session button
  3. Enter your message in the dialog
  4. Click Send
  5. Message is delivered to the user's client application

Broadcast Messages

  1. Click Message All Active Sessions
  2. Enter your broadcast message
  3. Click Send to All
  4. All connected users receive the message simultaneously
Automatic Refresh

The Monitor tab automatically refreshes every 5 seconds when active, providing real-time session data without manual intervention. You can also manually refresh at any time using the Refresh button.

Manual Refresh

Click Refresh Monitor to immediately update session data and statistics, bypassing the automatic 5-second refresh cycle.

Settings - General

Configure application status, webhooks, file management, and reseller permissions for your application.

Application Information

View your current role and access level:

  • Logged in as - Your role (Administrator or Reseller)
  • Permissions - Your granted permissions for this application

Application Status

Control global authentication for your entire application with a single toggle:

State Behavior
Enabled All authentication requests are processed normally according to your security rules
Disabled ALL authentication requests are immediately denied - no user can authenticate
Emergency Shutdown

When disabled, NO users can authenticate regardless of license validity. Use this for emergency shutdowns, maintenance windows, or when you need to immediately prevent all access.

Webhook Configuration

Receive real-time HTTP POST notifications when specific events occur in your application.

Adding a Webhook

  1. Click Add Webhook
  2. Enter your HTTPS URL endpoint (HTTP not supported)
  3. Select which events to monitor from the list below
  4. Click Save to activate the webhook

Available Webhook Events

Event Trigger Condition
DENY Authentication denied or blocked by security rules
ERROR System error occurred during authentication
SYSTEM System-level event or internal operation
WARNING Security warning or suspicious activity detected
BAN User banned during authentication attempt
AUTH_SUCCESS Authentication succeeded - user logged in

Managing Webhooks

  • Edit - Modify webhook URL or change event subscriptions
  • Delete - Remove webhook configuration entirely
  • Multiple Webhooks - Add unlimited webhooks for different services
HTTPS Requirement

Webhook URLs must use HTTPS for security. HTTP URLs are rejected. Self-signed certificates are not supported.

File Slots Management

Upload files to 6 available slots for client download through the Atlas SDK.

File Upload Process

  1. Select an empty slot (1-6)
  2. Click Upload File
  3. Choose your file from disk
  4. Toggle Authentication Required:
    • ON - Requires active authenticated session to download
    • OFF - Public access without authentication
  5. Click Upload to transfer the file

File Operations

Action Function
Upload Add a new file to an empty slot
Replace Upload a new file to an existing slot (overwrites current file)
Download Download the file to verify upload integrity
Toggle Auth Switch between authenticated and public access modes
Delete Remove file from slot (slot becomes empty)

File Information Display

Each file slot shows:

  • Slot number (1-6)
  • File name
  • File size in bytes/KB/MB
  • Upload timestamp
  • Authentication requirement status
Free Tier Limitation

FREE accounts can only use slots 1-3. Upgrade your account to access all 6 file slots.

Reseller Management

Grant other Atlas users limited permissions to manage your application. Resellers can perform specific actions based on the permissions you assign.

Adding a Reseller

  1. Click Add Reseller
  2. Enter the reseller's Organization ID (found in their account settings)
  3. Select permissions using checkboxes from the 19 available options
  4. Click Save Reseller Permissions
  5. Reseller immediately gains access based on assigned permissions

19 Available Reseller Permissions

Permission Grants Access To
View Licenses See license list and details
Add Licenses Generate new licenses
Delete Licenses Permanently remove licenses
Edit Licenses Modify license properties (expiry, note, level)
Reset HWID Clear hardware ID bindings
Reset IP Clear IP address bindings
View Bans See ban list and details
Add Bans Create new bans
Delete Bans Revoke existing bans
Edit Bans Modify ban properties
Files Manage file slots (upload, delete, download, toggle auth)
Manage Lock Modes Configure HWID and IP binding security settings
View Logs Access authentication logs and events
View Stats See Monitor tab statistics and metrics
Manage Sessions Kill sessions and send messages to users
App Hash Add and delete authorized application hashes
Reset App Hash Clear application hash bindings
Time Modify license expiry dates
Resellers Manage other resellers (requires admin review)

Managing Resellers

  • Edit Permissions - Modify reseller access rights by changing checkbox selections
  • Delete Reseller - Revoke all permissions and remove reseller from your application
Permission Security

Exercise caution when granting permissions. Resellers with Delete permissions can permanently remove data. Always follow the principle of least privilege - grant only the minimum permissions needed.

Settings - Security Engine

Configure hardware binding, IP restrictions, anti-VPN protection, and authorized application hashes for executable verification.

Security Control Toggles

Enable or disable security features to control license validation behavior:

Hardware ID Binding

Lock licenses to specific hardware on first use:

Mode Behavior
BIND License permanently binds to first HWID used. User cannot authenticate from different hardware without reset.
IGNORE No hardware restriction. License works on any hardware. User can freely change devices.

IP Address Binding

Lock licenses to specific IP address on first use:

Mode Behavior
BIND License permanently binds to first IP address. User cannot authenticate from different IP without reset.
IGNORE No IP restriction. License works from any IP address. User can freely change locations.

Anti-VPN Protection

Block authentication from VPN, proxy, and datacenter IP addresses:

State Blocked Services
Enabled
  • Commercial VPN services (NordVPN, ExpressVPN, etc.)
  • Proxy servers (HTTP, SOCKS, transparent)
  • Datacenter IP ranges (AWS, Azure, DigitalOcean)
  • Tor exit nodes
  • Known anonymization services
Disabled All IP types allowed including VPNs and proxies
Use Cases

HWID Binding: Prevent license sharing between users. IP Binding: Restrict access to specific locations or networks. Anti-VPN: Block anonymous users and prevent ban evasion.

Support Implications

Enabling HWID or IP binding increases support requests from legitimate users who need binding resets after hardware upgrades or relocations. Consider your support capacity before enabling strict binding modes.

Authorized Application Hashes

Whitelist SHA-256 hashes of legitimate executable builds to prevent modified, cracked, or tampered versions from authenticating.

System Operation

  1. You add SHA-256 hashes of your official executable builds to the whitelist
  2. During authentication, the client calculates and sends its executable hash
  3. Atlas verifies the hash against your authorized whitelist
  4. Only executables with matching hashes are allowed to authenticate
  5. Unrecognized or modified executables are denied immediately

Adding Authorized Hashes

Two methods are available for adding hashes:

Method 1: File Upload (Recommended)

  1. Click Add Hash
  2. Click Upload File button
  3. Select your .exe or .dll file
  4. SHA-256 hash is automatically calculated by the browser
  5. Add optional description (e.g., "v1.2.3 Release Build", "Steam Version")
  6. Click Save to add to whitelist

Method 2: Manual Hash Entry

  1. Calculate hash using command-line tools:
    • Windows: certutil -hashfile app.exe SHA256
    • Linux: sha256sum app.exe
    • macOS: shasum -a 256 app.exe
  2. Click Add Hash
  3. Paste the 64-character hexadecimal hash
  4. Add optional description
  5. Click Save
Automatic Calculation

The easiest method is to upload your executable file directly. Atlas automatically calculates the SHA-256 hash using browser cryptography APIs - no command-line tools or manual calculation needed.

Managing Hashes

The authorized hash list displays:

  • Hash Value - Full 64-character SHA-256 hash in hexadecimal
  • Description - Optional label for identification (version, build type, etc.)
  • Added Date - When the hash was added to whitelist
  • Delete Action - Remove hash from whitelist (executable immediately blocked)
Critical Warning

If hash validation is enabled with ZERO hashes in the whitelist, ALL authentication attempts will be denied. Always add at least one authorized hash before enabling this feature, or all users will be locked out.

When to Use Hash Validation

  • Prevent Cracks - Block modified executables with patched authentication
  • Version Control - Only allow specific application versions to authenticate
  • Distribution Security - Ensure users run official builds from authorized channels
  • Anti-Tamper - Detect and block executables modified by third parties

Multiple Hash Management

You can add multiple hashes to support:

  • Multiple concurrent application versions (v1.0, v1.1, v1.2)
  • Different build configurations (Debug, Release, Steam, Standalone)
  • Platform-specific executables (Windows x64, Windows x86, Linux)
  • Regional or localized builds

Saving Security Settings

After configuring security toggles (HWID Binding, IP Binding, Anti-VPN), click Save Security Settings to apply changes. Settings take effect immediately for all new authentication attempts.

Settings - Messages & Communication

Configure custom messages, error responses, and communication templates for your application users.

Development Status

Advanced message customization features are currently in development. This section will provide comprehensive control over user-facing messages and notifications.

Planned Features

Startup Messages

Display custom messages when users successfully authenticate:

  • Welcome messages with personalization
  • Important announcements and news
  • Update notifications for new versions
  • Terms of service acceptance reminders
  • Promotional messages and offers

Custom Error Messages

Personalize error responses for various authentication failure scenarios:

Error Scenario Customizable Message
License Expired Message shown when license has passed expiration date
HWID Mismatch Message shown when hardware ID doesn't match bound value
IP Mismatch Message shown when IP address doesn't match bound value
Ban Notification Message shown to banned users with optional reason display
Version Mismatch Message shown when executable hash doesn't match whitelist
Maintenance Mode Message shown when application is disabled
Invalid License Message shown for non-existent or malformed license keys

Message Templates

Create and manage reusable templates for common communications:

  • Session broadcast messages for announcements
  • Scheduled maintenance notifications
  • Security alert templates
  • License renewal reminder messages
  • Feature update announcements

Dynamic Variables

Use placeholder variables in messages for personalization:

Variable Replaced With
{license_key} User's license key
{expiry_date} License expiration date
{username} User's username if provided
{app_name} Application name
{level} License permission level
{hwid} Hardware ID
{ip_address} Connection IP address
Coming Soon

This feature is under active development and will be available in an upcoming update. Join our Discord server to receive announcements about new feature releases and participate in beta testing.

Example Use Cases

Once available, you'll be able to create messages like:

Welcome back, {username}!

Your license level: {level}
Expires: {expiry_date}

Check out our new features in the latest update!

Or custom error messages like:

License Expired

Your license ({license_key}) expired on {expiry_date}.

Please renew at https://your-store.com to continue using {app_name}.