|
| 1 | +--- |
| 2 | +title: "Credential Management (beta)" |
| 3 | +path: "/programs/credential-management.html" |
| 4 | +id: "programs/credential-management" |
| 5 | +--- |
| 6 | + |
| 7 | +The Credential Management feature enables you to pre-populate the credentials to access your assets on HackerOne. This enables participating hackers to quickly retrieve the credentials needed to find vulnerabilities in your program. |
| 8 | + |
| 9 | +<i>This feature is currently in beta and only available to select programs.</i> |
| 10 | + |
| 11 | +### Set Up |
| 12 | +To set up Credential Management for your program: |
| 13 | +1. Go to <b>Settings > General > Credential Management</b>. |
| 14 | + |
| 15 | + |
| 16 | + |
| 17 | +2. Click <b>Import Credentials</b>. |
| 18 | +3. Upload the CSV file of credentials that you want to share. The CSV file supports a set of headers and values where each row is a set of credentials that can be claimed by a hacker. |
| 19 | + |
| 20 | + |
| 21 | + |
| 22 | +4. Click <b>Submit</b>. |
| 23 | + |
| 24 | +Your uploaded credentials will populate under the <b>Credentials</b> section where you can see which credentials have or haven’t been claimed. Claimed credentials will also display the username of the hacker under the <b>Claimed by</b> column. |
| 25 | + |
| 26 | + |
| 27 | + |
| 28 | +If a hacker has violated your policy or HackerOne’s code of conduct, you can revoke the credential rights of a hacker by clicking <b>Revoke</b> next to the username of the hacker. |
| 29 | + |
| 30 | +The username of the account the hacker created using the provided credentials will display on the submitted report under the <b>Account details used</b> section. |
| 31 | + |
| 32 | + |
| 33 | + |
| 34 | +### How It Works |
| 35 | +Once you’ve set up credential management, hackers participating in your program will be able to retrieve their credentials by clicking the <b>Show Credentials</b> button on your security page. |
| 36 | + |
| 37 | + |
| 38 | + |
| 39 | +The <b>Credentials</b> window will then display with instructions where the hacker can claim one of the credentials you’ve provided. They’ll be prompted to enter the username of the account they created using the credentials provided. |
| 40 | + |
| 41 | + |
0 commit comments