Thanks to visit codestin.com
Credit goes to github.com

Skip to content

Commit 484a3a1

Browse files
committed
Fix table and link
Hopefully
1 parent 3a27ba7 commit 484a3a1

File tree

4 files changed

+3
-10
lines changed

4 files changed

+3
-10
lines changed

docs/changelog/2022/march.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -5,7 +5,7 @@ date: "2022-03"
55
---
66

77
### Retesting Enhancement
8-
Once a retest is claimed, the tester will now have 72 hours to complete retesting.
8+
We've update retesting time so the tester will now have 72 hours to complete retesting.
99

1010
### Program Hacker Matching Improvement
1111
We’ve made improvements to our Invitation Engine, using program requirements and customer preferences to match hackers to opportunities, we provide our hacker community with much more personalized recommendations.
@@ -18,4 +18,4 @@ Customers with multiple programs can now manage users from a single page.
1818
We released fixes and performance optimizations to ensure consistent data between the Statistics page and the [Submissions and Bounty dashboard.](/programs/submissions-bounty-dashboard.html)
1919

2020
### Team Member Eligibility
21-
[Team member eligibility settings](./programs/team-member-eligibility.html) allow you to configure a list of email domains that are eligible to join your program. These settings will allow or block a user when accepting an invitation, but will not affect any users that are already a member of the program. You can set team member eligibility regardless of SAML usage.
21+
[Team Member Eligibility](/programs/team-member-eligibility.html) settings allow you to configure a list of email domains that are eligible to join your program. These settings will allow or block a user when accepting an invitation, but will not affect any users that are already a member of the program. You can set team member eligibility regardless of SAML usage.

docs/programs/asset-based-credential-management.md

Lines changed: 1 addition & 8 deletions
Original file line numberDiff line numberDiff line change
@@ -32,14 +32,7 @@ Asset ID | Asset | Assigned To | Username | Password
3232
Each hacker is allowed to claim one credential. If a hacker needs two logins, such as a regular account and an admin account, then both of those usernames and passwords can be put into the same credential for that hacker to claim. See examples below.
3333

3434
Table appearance:
35-
36-
Asset ID | Asset | Assigned To | Username | Password | Username2 | Password2
37-
----- | ----- | ----- | ----- | ----- | ----- | -----
38-
|<img width=20/>|<img width=20/>|<img width=20/>|<img width=20/>|<img width=20/>|<img width=20/>|<img width=20/>|
39-
1 | https://hackerone.com | hacker-john | John | john123 | JohnAdmin | johnadmin123
40-
2 | https://api.hackerone.com | jacob-123 | Jacob | jingleheimer123 | JacobAdmin | schmidtadmin123
41-
3 | https://hackerone-attachments.s3.amazonaws.com/ | jane-hacks | Jane | jane123 | JaneAdmin | janeadmin123
42-
35+
![Table displaying how two logins must be set up](./images/asset-based-table.png)
4336

4437
### Credential Inquiry
4538
In the first step of Credential Management you will select which flow you need. In case the program needs specific information about the end-user’s environment in order to prepare a set of credentials, you can create a credential inquiry. Via the Credential Management page, the program specifies what information you need from hackers and selects the asset for which the information is required.
-1.34 MB
Binary file not shown.
468 KB
Loading

0 commit comments

Comments
 (0)