Applications
Create and manage your authentication applications with full control over API keys, licenses, and security settings.
Overview
Applications are the foundation of Atlas Authentication. Each application represents a software product you want to protect with license-based authentication. Every application has its own unique API key, independent license pool, and configurable security settings.
Creating an Application
To create a new application:
- Click the Create Application button in the dashboard
- Enter a unique name for your application
- Add an optional description (visible only to you)
- Click Create to generate the application
- Your API key will be displayed once - copy and store it securely
API keys are shown only once during creation. Store them securely in your application's configuration. You cannot retrieve the same key again - you can only reset it to generate a new one.
Available Actions
| Action | Description | Verification |
|---|---|---|
| View API Key | Reveal the full API key for integration into your software | Email Link |
| Reset API Key | Generate a new API key (invalidates the previous key) | Email Link |
| Rename | Update application name and description | None |
| Reset Application | Delete all licenses, bans, and logs (preserves app, hashes, files) | Email Link |
| Delete Application | Permanently remove entire application and all associated data | Email Link |
Email Verification Process
Destructive actions require email verification for security:
- Click the action button (View API Key, Reset API Key, Reset Application, or Delete)
- A verification email is sent to your registered email address
- Open the email and click the verification link
- The action executes automatically upon clicking the link
- You receive confirmation in the dashboard
Email verification links expire after a short period for security. If a link expires, simply request a new verification email by clicking the action button again.
Application Information Display
Each application card in your dashboard shows:
- Application Name - Your chosen identifier for the application
- Description - Optional details about the application purpose
- API Key Hint - Last 4 characters of the API key (e.g., ••••-••••-••••-A1B2)
- Creation Date - When the application was originally created
- Reseller Tag - If the application is managed by a reseller, displays their organization name
Selecting an Application
Click any application card to select it as the active application. The selected application's data will populate all other dashboard tabs including Licenses, Bans, Logs, Monitor, and Settings. Only one application can be active at a time.
All dashboard tabs operate within the context of the currently selected application. Always verify you have the correct application selected before making changes.
Licenses
Generate, manage, and export license keys with advanced customization, bulk operations, and inline editing capabilities.
License Generation
Atlas provides comprehensive license generation with full control over format, duration, and access levels.
Basic Generation Process
- Click Create License in the Licenses tab
- Set the number of licenses to generate (1-10,000)
- Select duration type: Hours, Days, Weeks, Months, Years, or Lifetime
- Enter duration value (ignored for Lifetime licenses)
- Assign a level value (1-100) for permission tiers
- Add optional notes or descriptions
- Click Generate to create licenses
Advanced Customization
| Feature | Description | Example |
|---|---|---|
| Custom Mask | Define license key format using pattern characters | KEY-****-####ATLAS-***-***-*** |
| Charset | Select which characters to include in generation | Uppercase (A-Z), Lowercase (a-z), Numbers (0-9), Special |
| Duration | Time until license expires after first use | 30 Days, 1 Year, Lifetime |
| Level | Permission tier for feature gating | 1 (Basic), 50 (Pro), 100 (Enterprise) |
| Notes | Internal notes or customer information | "Customer: John Doe", "Order #12345" |
Save your generation settings to 5 profile slots for instant reuse. Ideal for creating standardized license tiers like Basic, Pro, and Enterprise with consistent formatting.
License Management
Inline Editing
Edit license properties directly in the table without opening modal dialogs:
- Expiry Date - Click to open date picker and modify expiration
- Note - Double-click to edit description text
- Level - Double-click to change permission level (1-100)
Individual License Actions
| Action | Function |
|---|---|
| Reset License | Clear HWID and IP bindings, allowing the license to be used on new hardware or from a different location |
| Ban License | Create a ban entry for this license key, immediately denying all authentication attempts |
| Pause/Suspend | Temporarily disable the license. While suspended, all authentication attempts are denied. Toggle again to resume. |
| Delete | Permanently remove the license from your application |
Bulk Operations
Select multiple licenses using checkboxes to perform batch operations:
Export System
Export license data in customizable formats for external use:
Column Selection
Choose which fields to include in your export:
- License Key - The unique license identifier
- Note - Internal notes or descriptions
- Level - Permission tier (1-100)
- Expiry Date - When the license expires
- Hardware ID (HWID) - Bound device identifier
- IP Address - Last connection IP
- Location - Geographic location from IP
- Last Login - Most recent authentication timestamp
- Device - Device information string
Delimiter Options
| Delimiter | Format | Use Case |
|---|---|---|
| Comma | key1,note1,level1 |
Standard CSV format for spreadsheets |
| Newline | key1\nkey2\nkey3 |
One key per line for simple lists |
| Semicolon | key1;note1;level1 |
Alternative CSV for EU locales |
| Tab | key1\tnote1\tlevel1 |
TSV format for easy spreadsheet import |
| Pipe | key1|note1|level1 |
Pipe-delimited for data processing |
Export Scope
- Export Selected - Export only licenses with checked checkboxes
- Export All - Export entire license list regardless of selection
License Table Columns
The license management table displays comprehensive information:
| Column | Information |
|---|---|
| License Key | Unique identifier used for authentication |
| Note | Internal notes, customer info, or order details (editable) |
| Level | Permission level from 1-100 (editable) |
| Expiry | Expiration date or "Never" for lifetime licenses (editable) |
| HWID | Hardware ID if license is bound to specific hardware |
| Last IP | Most recent connection IP address |
| Location | Geographic location derived from IP geolocation |
| Last Login | Timestamp of most recent successful authentication |
| Device | Device information from last connection |
| Status | Active, Expired, or Suspended indicator |
Search and Filtering
Use the search box to instantly filter licenses by:
- License key (partial or full match)
- Hardware ID (HWID)
- IP address
- Notes or description text
Bans
Block user access using license keys, hardware IDs, IP addresses, or advanced deep hardware tracking with 9-component monitoring.
Ban Types
Atlas supports multiple ban mechanisms for comprehensive access control:
Creating Bans
Manual Ban Creation
- Click Add Ban in the Bans tab
- Enter identifier (license key, HWID, or IP address)
- System automatically detects the ban type
- Enter reason for the ban (required for record-keeping)
- Select duration:
- Permanent - Ban never expires
- Temporary - Set specific expiration date
- Click Create Ban to activate
The ban system intelligently identifies whether your input is a license key, HWID, or IP address without requiring manual type selection.
Quick Ban from Licenses
Ban directly from the Licenses table:
- Locate the license in the Licenses tab
- Click the ban icon button in the Actions column
- Confirm the action in the popup dialog
- Ban is created with reason "Manual ban from dashboard"
Ban Sources
| Source | Description |
|---|---|
| Manual Ban | Created by administrator through dashboard interface |
| System | Automatic ban triggered by system rules or alert conditions |
| Security Engine | Cascade ban issued by security alert rules in Settings |
| Security Engine (Deep Ban) | Advanced deep hardware tracking ban issued automatically |
Deep Ban System
Deep bans provide advanced hardware component tracking to prevent ban evasion through HWID spoofing. The system monitors 9 distinct hardware components:
| Component | Tracked Information |
|---|---|
| GPU | Graphics card unique identifier and serial number |
| Motherboard | Mainboard serial number and manufacturer ID |
| RAM | Memory module serial numbers and identifiers |
| CPU | Processor unique ID and serial number |
| BIOS | Firmware identifier and version signature |
| Disk | Storage drive serial number |
| MAC Address | Network adapter hardware address |
| Monitor | Display device serial number and EDID |
| System UUID | Unique system identifier from BIOS/UEFI |
Deep bans are automatically issued by the Security Engine when suspicious activity is detected. They track multiple hardware components simultaneously, making ban evasion through simple HWID spoofing ineffective.
Managing Bans
Individual Actions
- Revoke/Remove - Delete the ban entry and restore access for the banned identifier
Bulk Operations
Select multiple bans using checkboxes:
- Revoke Selected - Remove multiple bans simultaneously in one action
Search and Filter
Find bans using the search box by:
- IP address (full or partial)
- Hardware ID (HWID)
- License key
- Ban reason text
Ban Information Display
The bans table shows comprehensive ban details:
- Issued By - Creator of the ban (username, System, Security Engine, etc.)
- License Key - Banned license if applicable
- HWID - Banned hardware ID if applicable
- IP Address - Banned IP address if applicable
- Reason - Explanation for why the ban was issued
- Expiry - Expiration date or "Permanent"
- Timestamp - When the ban was created
Logs
View detailed authentication events, system activities, and security alerts with real-time filtering and search capabilities.
Log Event Types
Atlas tracks 9 distinct event types across your authentication system:
| Type | Description |
|---|---|
| SUCCESS | Authentication succeeded - user logged in successfully |
| AUTH_SUCCESS | Alternative success event type for authentication completion |
| DENY | Connection denied - authentication failed or was blocked by security rules |
| BAN | User banned - ban was issued during authentication attempt |
| ERROR | System error occurred during authentication process |
| WARNING | Security warning or suspicious activity detected |
| INFO | Informational event or system message |
| ADMIN | Administrative action performed through dashboard |
| SYSTEM | System-level event or internal operation |
Log Entry Information
Each log entry contains comprehensive event details:
| Field | Content |
|---|---|
| Timestamp | Exact date and time when the event occurred |
| Type | Event category (SUCCESS, DENY, ERROR, etc.) |
| Message | Detailed description of what happened during the event |
| License Key | License involved in the authentication attempt (if applicable) |
| IP Address | Connection source IP address |
| Location | Geographic location derived from IP geolocation |
| Hardware ID | Device HWID used in authentication (if applicable) |
| Device | Device information string and platform details |
| App Hash | Executable SHA-256 hash with description (if hash validation enabled) |
| Verdict | Final authentication result (Allowed, Denied, Banned, etc.) |
Filtering and Search
Type Filter
Filter logs by specific event type using the dropdown selector:
- All - Display all log types
- SUCCESS - Only successful authentications
- DENY - Only denied connection attempts
- ADMIN - Only administrative actions
- BAN - Only ban-related events
- INFO - Only informational messages
- ERROR - Only system errors
- WARNING - Only security warnings
Text Search
Use the search box to filter logs by:
- Message content (partial or full text match)
- License key
- IP address
Log Management Features
Clearing Logs
Remove old logs to keep your dashboard clean and performant. This action permanently deletes log entries and cannot be undone.
Logs are retained according to your account plan tier. Free accounts have limited retention periods, while paid plans offer extended log history for compliance and analysis.
Monitor
Track active sessions in real-time, view application statistics, and manage connected users with session control.
Real-time Statistics
The Monitor tab displays 7 key metrics, automatically refreshed every 5 seconds:
Active Session Information
View comprehensive details about connected users:
| Field | Information |
|---|---|
| License Key | License being used in this session |
| Session ID | Unique identifier for the active session |
| Status | Online indicator showing real-time connection state |
| IP Address | Connection source IP address |
| Hardware ID | Device HWID used for authentication |
| Device | Device information string and platform |
| Username | User identifier if provided by application |
| Connected | Timestamp when session was established |
| Last Seen | Most recent activity timestamp from this session |
Session Management
Individual Session Actions
| Action | Function |
|---|---|
| Kill Session | Immediately terminate a specific user's active session. User is disconnected but can reconnect unless banned or suspended. |
| Message Session | Send a message to a specific connected user. Message appears in their client application. |
Bulk Actions
| Action | Function |
|---|---|
| Message All Active Sessions | Broadcast a message to all currently connected users simultaneously |
| Terminate All Active Sessions | Force disconnect all users at once. Useful for maintenance windows or emergency shutdowns. |
When you terminate a session, the user is immediately disconnected. They can reconnect unless their license is suspended or banned. To permanently prevent access, suspend the license or create a ban.
Messaging System
Individual Messages
- Locate the session in the active sessions table
- Click Message Session button
- Enter your message in the dialog
- Click Send
- Message is delivered to the user's client application
Broadcast Messages
- Click Message All Active Sessions
- Enter your broadcast message
- Click Send to All
- All connected users receive the message simultaneously
The Monitor tab automatically refreshes every 5 seconds when active, providing real-time session data without manual intervention. You can also manually refresh at any time using the Refresh button.
Manual Refresh
Click Refresh Monitor to immediately update session data and statistics, bypassing the automatic 5-second refresh cycle.
Settings - General
Configure application status, webhooks, file management, and reseller permissions for your application.
Application Information
View your current role and access level:
- Logged in as - Your role (Administrator or Reseller)
- Permissions - Your granted permissions for this application
Application Status
Control global authentication for your entire application with a single toggle:
| State | Behavior |
|---|---|
| Enabled | All authentication requests are processed normally according to your security rules |
| Disabled | ALL authentication requests are immediately denied - no user can authenticate |
When disabled, NO users can authenticate regardless of license validity. Use this for emergency shutdowns, maintenance windows, or when you need to immediately prevent all access.
Webhook Configuration
Receive real-time HTTP POST notifications when specific events occur in your application.
Adding a Webhook
- Click Add Webhook
- Enter your HTTPS URL endpoint (HTTP not supported)
- Select which events to monitor from the list below
- Click Save to activate the webhook
Available Webhook Events
| Event | Trigger Condition |
|---|---|
DENY |
Authentication denied or blocked by security rules |
ERROR |
System error occurred during authentication |
SYSTEM |
System-level event or internal operation |
WARNING |
Security warning or suspicious activity detected |
BAN |
User banned during authentication attempt |
AUTH_SUCCESS |
Authentication succeeded - user logged in |
Managing Webhooks
- Edit - Modify webhook URL or change event subscriptions
- Delete - Remove webhook configuration entirely
- Multiple Webhooks - Add unlimited webhooks for different services
Webhook URLs must use HTTPS for security. HTTP URLs are rejected. Self-signed certificates are not supported.
File Slots Management
Upload files to 6 available slots for client download through the Atlas SDK.
File Upload Process
- Select an empty slot (1-6)
- Click Upload File
- Choose your file from disk
- Toggle Authentication Required:
- ON - Requires active authenticated session to download
- OFF - Public access without authentication
- Click Upload to transfer the file
File Operations
| Action | Function |
|---|---|
| Upload | Add a new file to an empty slot |
| Replace | Upload a new file to an existing slot (overwrites current file) |
| Download | Download the file to verify upload integrity |
| Toggle Auth | Switch between authenticated and public access modes |
| Delete | Remove file from slot (slot becomes empty) |
File Information Display
Each file slot shows:
- Slot number (1-6)
- File name
- File size in bytes/KB/MB
- Upload timestamp
- Authentication requirement status
FREE accounts can only use slots 1-3. Upgrade your account to access all 6 file slots.
Reseller Management
Grant other Atlas users limited permissions to manage your application. Resellers can perform specific actions based on the permissions you assign.
Adding a Reseller
- Click Add Reseller
- Enter the reseller's Organization ID (found in their account settings)
- Select permissions using checkboxes from the 19 available options
- Click Save Reseller Permissions
- Reseller immediately gains access based on assigned permissions
19 Available Reseller Permissions
| Permission | Grants Access To |
|---|---|
| View Licenses | See license list and details |
| Add Licenses | Generate new licenses |
| Delete Licenses | Permanently remove licenses |
| Edit Licenses | Modify license properties (expiry, note, level) |
| Reset HWID | Clear hardware ID bindings |
| Reset IP | Clear IP address bindings |
| View Bans | See ban list and details |
| Add Bans | Create new bans |
| Delete Bans | Revoke existing bans |
| Edit Bans | Modify ban properties |
| Files | Manage file slots (upload, delete, download, toggle auth) |
| Manage Lock Modes | Configure HWID and IP binding security settings |
| View Logs | Access authentication logs and events |
| View Stats | See Monitor tab statistics and metrics |
| Manage Sessions | Kill sessions and send messages to users |
| App Hash | Add and delete authorized application hashes |
| Reset App Hash | Clear application hash bindings |
| Time | Modify license expiry dates |
| Resellers | Manage other resellers (requires admin review) |
Managing Resellers
- Edit Permissions - Modify reseller access rights by changing checkbox selections
- Delete Reseller - Revoke all permissions and remove reseller from your application
Exercise caution when granting permissions. Resellers with Delete permissions can permanently remove data. Always follow the principle of least privilege - grant only the minimum permissions needed.
Settings - Security Engine
Configure hardware binding, IP restrictions, anti-VPN protection, and authorized application hashes for executable verification.
Security Control Toggles
Enable or disable security features to control license validation behavior:
Hardware ID Binding
Lock licenses to specific hardware on first use:
| Mode | Behavior |
|---|---|
| BIND | License permanently binds to first HWID used. User cannot authenticate from different hardware without reset. |
| IGNORE | No hardware restriction. License works on any hardware. User can freely change devices. |
IP Address Binding
Lock licenses to specific IP address on first use:
| Mode | Behavior |
|---|---|
| BIND | License permanently binds to first IP address. User cannot authenticate from different IP without reset. |
| IGNORE | No IP restriction. License works from any IP address. User can freely change locations. |
Anti-VPN Protection
Block authentication from VPN, proxy, and datacenter IP addresses:
| State | Blocked Services |
|---|---|
| Enabled |
|
| Disabled | All IP types allowed including VPNs and proxies |
HWID Binding: Prevent license sharing between users. IP Binding: Restrict access to specific locations or networks. Anti-VPN: Block anonymous users and prevent ban evasion.
Enabling HWID or IP binding increases support requests from legitimate users who need binding resets after hardware upgrades or relocations. Consider your support capacity before enabling strict binding modes.
Authorized Application Hashes
Whitelist SHA-256 hashes of legitimate executable builds to prevent modified, cracked, or tampered versions from authenticating.
System Operation
- You add SHA-256 hashes of your official executable builds to the whitelist
- During authentication, the client calculates and sends its executable hash
- Atlas verifies the hash against your authorized whitelist
- Only executables with matching hashes are allowed to authenticate
- Unrecognized or modified executables are denied immediately
Adding Authorized Hashes
Two methods are available for adding hashes:
Method 1: File Upload (Recommended)
- Click Add Hash
- Click Upload File button
- Select your .exe or .dll file
- SHA-256 hash is automatically calculated by the browser
- Add optional description (e.g., "v1.2.3 Release Build", "Steam Version")
- Click Save to add to whitelist
Method 2: Manual Hash Entry
- Calculate hash using command-line tools:
- Windows:
certutil -hashfile app.exe SHA256 - Linux:
sha256sum app.exe - macOS:
shasum -a 256 app.exe
- Windows:
- Click Add Hash
- Paste the 64-character hexadecimal hash
- Add optional description
- Click Save
The easiest method is to upload your executable file directly. Atlas automatically calculates the SHA-256 hash using browser cryptography APIs - no command-line tools or manual calculation needed.
Managing Hashes
The authorized hash list displays:
- Hash Value - Full 64-character SHA-256 hash in hexadecimal
- Description - Optional label for identification (version, build type, etc.)
- Added Date - When the hash was added to whitelist
- Delete Action - Remove hash from whitelist (executable immediately blocked)
If hash validation is enabled with ZERO hashes in the whitelist, ALL authentication attempts will be denied. Always add at least one authorized hash before enabling this feature, or all users will be locked out.
When to Use Hash Validation
- Prevent Cracks - Block modified executables with patched authentication
- Version Control - Only allow specific application versions to authenticate
- Distribution Security - Ensure users run official builds from authorized channels
- Anti-Tamper - Detect and block executables modified by third parties
Multiple Hash Management
You can add multiple hashes to support:
- Multiple concurrent application versions (v1.0, v1.1, v1.2)
- Different build configurations (Debug, Release, Steam, Standalone)
- Platform-specific executables (Windows x64, Windows x86, Linux)
- Regional or localized builds
Saving Security Settings
After configuring security toggles (HWID Binding, IP Binding, Anti-VPN), click Save Security Settings to apply changes. Settings take effect immediately for all new authentication attempts.
Settings - Messages & Communication
Configure custom messages, error responses, and communication templates for your application users.
Advanced message customization features are currently in development. This section will provide comprehensive control over user-facing messages and notifications.
Planned Features
Startup Messages
Display custom messages when users successfully authenticate:
- Welcome messages with personalization
- Important announcements and news
- Update notifications for new versions
- Terms of service acceptance reminders
- Promotional messages and offers
Custom Error Messages
Personalize error responses for various authentication failure scenarios:
| Error Scenario | Customizable Message |
|---|---|
| License Expired | Message shown when license has passed expiration date |
| HWID Mismatch | Message shown when hardware ID doesn't match bound value |
| IP Mismatch | Message shown when IP address doesn't match bound value |
| Ban Notification | Message shown to banned users with optional reason display |
| Version Mismatch | Message shown when executable hash doesn't match whitelist |
| Maintenance Mode | Message shown when application is disabled |
| Invalid License | Message shown for non-existent or malformed license keys |
Message Templates
Create and manage reusable templates for common communications:
- Session broadcast messages for announcements
- Scheduled maintenance notifications
- Security alert templates
- License renewal reminder messages
- Feature update announcements
Dynamic Variables
Use placeholder variables in messages for personalization:
| Variable | Replaced With |
|---|---|
{license_key} |
User's license key |
{expiry_date} |
License expiration date |
{username} |
User's username if provided |
{app_name} |
Application name |
{level} |
License permission level |
{hwid} |
Hardware ID |
{ip_address} |
Connection IP address |
This feature is under active development and will be available in an upcoming update. Join our Discord server to receive announcements about new feature releases and participate in beta testing.
Example Use Cases
Once available, you'll be able to create messages like:
Welcome back, {username}!
Your license level: {level}
Expires: {expiry_date}
Check out our new features in the latest update!
Or custom error messages like:
License Expired
Your license ({license_key}) expired on {expiry_date}.
Please renew at https://your-store.com to continue using {app_name}.