Thanks to visit codestin.com
Credit goes to github.com

Skip to content

Commit b0141d0

Browse files
committed
changed allowlisting to allowlist
1 parent cd36f8f commit b0141d0

File tree

4 files changed

+5
-5
lines changed

4 files changed

+5
-5
lines changed

docs/changelog/2014/july.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -10,8 +10,8 @@ We introduce the new trigger option to change the report state to <i>Needs more
1010
### Data Export CSV
1111
We enable programs and hackers to export their reports as .CSV files to enable them to quickly generate a spreadsheet of selected reports with key details.
1212

13-
### Security IP Allowlisting
14-
We enable programs to configure IP allowlisting to control which IP ranges their program members must be coming from in order to access HackerOne.
13+
### Security IP Allowlists
14+
We enable programs to configure IP allowlists to control which IP ranges their program members must be coming from in order to access HackerOne.
1515

1616
### Invite-Only Programs
1717
We introduce private programs to hackers that are only accessible through invitations.

docs/programs/general-settings.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -12,7 +12,7 @@ To change the settings of your bounty program follow these steps:
1212
------ | ------
1313
Information | Configure what information shows on your program's Security Page. You can choose from these fields: <br> * Name <br> * Handle <br> * Website <br> * Twitter handle <br> * About <br> * Cover color
1414
Product Edition | Select your product editions. You can choose between Bounty Professional and Bounty Enterprise.
15-
Authentication | Configure your authentication settings. You can set up SAML and IP allowlisting.
15+
Authentication | Configure your authentication settings. You can set up SAML and IP allowlists.
1616
User Management | Invite and manage users in your program. You can manage which groups each member is a part of.
1717
Group Management | Add and Edit various groups in your program. You can also add and remove users to these groups.
1818
Billing | Enter your billing info in the **Overview, Credit Card**, and **Prepayment** tabs.

docs/programs/set-up-ip-whitelisting.md renamed to docs/programs/set-up-ip-allowlists.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -4,7 +4,7 @@ path: "/programs/ip-allowlists.html"
44
id: "programs/ip-allowlists"
55
---
66

7-
IP allowlisting is a security feature that permits teams to control which IP ranges their team members must be coming from in order to access HackerOne. You can configure IP allowlisting with these addresses:
7+
IP allowlists is a security feature that permits teams to control which IP ranges their team members must be coming from in order to access HackerOne. You can configure IP allowlists with these addresses:
88
* IPv4
99
* IPv6
1010
* CIDR

docs/programs/vulnerability-reports.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -5,4 +5,4 @@ id: "programs/vulnerability-reports"
55
---
66
HackerOne works to provide organizations with the tools they need to successfully run their own vulnerability coordination program. HackerOne doesn't have access to your confidential vulnerability reports. HackerOne will never share your confidential data with any other parties. HackerOne is happy to accept report submissions encrypted with the Response Teams's PGP key. For more details, view our [Privacy Policy](https://www.hackerone.com/privacy).
77

8-
All traffic to and from the hackerOne servers is encrypted. Your security team can use the HackerOne IP allowlisting policy so your data can only be accessed from locations you control. [Learn more about HackerOne security](https://hackerone.com/security).
8+
All traffic to and from the hackerOne servers is encrypted. Your security team can use the HackerOne IP allowlist policy so your data can only be accessed from locations you control. [Learn more about HackerOne security](https://hackerone.com/security).

0 commit comments

Comments
 (0)