Thanks to visit codestin.com
Credit goes to github.com

Skip to content

Commit efb1d03

Browse files
committed
changes
1 parent cc3a715 commit efb1d03

File tree

2 files changed

+35
-35
lines changed

2 files changed

+35
-35
lines changed

docs/programs/api-tokens.md

Lines changed: 34 additions & 34 deletions
Original file line numberDiff line numberDiff line change
@@ -1,34 +1,34 @@
1-
---
2-
title: "API Tokens"
3-
path: "/programs/api-tokens.html"
4-
id: "programs/api-tokens"
5-
---
6-
7-
Your program’s administrative users can generate and manage API tokens to experiment with or use the HackerOne API. The API token identifier and value are used as the username and password for HTTP Basic authentication.
8-
9-
To generate an API token:
10-
1. Go to <b>Settings > Program > Automation > API</b>.
11-
![api-token-1](./images/api-token-1.png)
12-
13-
2. Click <b>Create API Token</b>.
14-
![api-token-2](./images/api-token-2.png)
15-
16-
3. Enter an identifier for the new API token.
17-
![api-token-3](./images/api-token-3.png)
18-
19-
4. Store the generated API token.
20-
5. Click <b>I have stored the API Token</b>.
21-
![api-token-4](./images/api-token-4.png)
22-
23-
You’ll get a confirmation email stating that you’ve created a new API token. You can manage the groups that have access to the API tokens and revoke the token as well.
24-
25-
To learn more about the HackerOne API check out our [API docs](https://api.hackerone.com/docs/v1).
26-
27-
### Managing Groups
28-
To manage which groups have access to the API tokens:
29-
1. Click <b>Manage groups</b> on the API settings page for the identifier you want to manage groups for.
30-
![api-token-5](./images/api-token-5.png)
31-
32-
2. Select which groups you want to give permissions to. When a group isn’t selected, they only have read-only permissions.
33-
3. Click <b>Apply changes</b>.
34-
![api-token-6](./images/api-token-6.png)
1+
---
2+
title: "API Tokens"
3+
path: "/programs/api-tokens.html"
4+
id: "programs/api-tokens"
5+
---
6+
7+
Your program’s administrative users can generate and manage API tokens to experiment with or use the HackerOne API. The API token identifier and value are used as the username and password for HTTP Basic authentication.
8+
9+
To generate an API token:
10+
1. Go to <b>Settings > Program > Automation > API</b>.
11+
![api-token-1](./images/api-token-1.png)
12+
13+
2. Click <b>Create API Token</b>.
14+
![api-token-2](./images/api-token-2.png)
15+
16+
3. Enter an identifier for the new API token.
17+
![api-token-3](./images/api-token-3.png)
18+
19+
4. Store the generated API token.
20+
5. Click <b>I have stored the API Token</b>.
21+
![api-token-4](./images/api-token-4.png)
22+
23+
You’ll get a confirmation email stating that you’ve created a new API token. You can manage the groups that have access to the API tokens and revoke the token as well.
24+
25+
To learn more about the HackerOne API check out our [API docs](https://api.hackerone.com/docs/v1).
26+
27+
### Managing Groups
28+
To manage which groups have access to the API tokens:
29+
1. Click <b>Manage groups</b> on the API settings page for the identifier you want to manage groups for.
30+
![api-token-5](./images/api-token-5.png)
31+
32+
2. Select which groups you want to give permissions to. When a group isn’t selected, they only have read-only permissions.
33+
3. Click <b>Apply changes</b>.
34+
![api-token-6](.images/api-token-6.png)

docs/programs/credential-management.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -4,7 +4,7 @@ path: "/programs/credential-management.html"
44
id: "programs/credential-management"
55
---
66

7-
The Credential Management feature enables you to pre-populate the credentials to access your assets on HackerOne. This enables participating hackers to quickly retrieve the credentials needed to find vulnerabilities in your program.
7+
The Credential Management feature enables you to easily share access credentials with hackers so that you don't have to constantly create sign in credentials for each new hacker that participates in your program. This also enables participating hackers to quickly retrieve the credentials needed to find vulnerabilities in your program.
88

99
<i>This feature is currently in beta and only available to select programs.</i>
1010

0 commit comments

Comments
 (0)