Thanks to visit codestin.com
Credit goes to github.com

Skip to content

Commit 8a8bf17

Browse files
committed
Images and links
1 parent d7931e1 commit 8a8bf17

17 files changed

+46
-64
lines changed

docs/changelog/2022/march.md

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -12,10 +12,10 @@ We’ve made improvements to our Invitation Engine, using program requirements a
1212

1313
### Organization Settings Page
1414
Customers with multiple programs can now manage users from a single page.
15-
[Organization Settings Page](./images/organization-settings.png)
15+
![Organization Settings Page](./images/organization-settings.png)
1616

1717
### Program Dashboard Enhancements
18-
We released fixes and performance optimizations to ensure consistent data between the Statistics page and the Submissions and Bounty dashboard.
18+
We released fixes and performance optimizations to ensure consistent data between the Statistics page and the [Submissions and Bounty dashboard.](/programs/submissions-bounty-dashboard.html)
1919

2020
### Team Member Eligibility
21-
Team member eligibility settings allow you to configure a list of email domains that are eligible to join your program. These settings will allow or block a user when accepting an invitation, but will not affect any users that are already a member of the program.
21+
[Team member eligibility settings](./programs/team-member-eligibility.html) allow you to configure a list of email domains that are eligible to join your program. These settings will allow or block a user when accepting an invitation, but will not affect any users that are already a member of the program. You can set team member eligibility regardless of saml usage.

docs/changelog/2022/may.md

Lines changed: 8 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,8 @@
1+
---
2+
title: "May 2022"
3+
path: "/changelog/2022/March"
4+
date: "2022-05"
5+
---
6+
7+
### Asset-Based Credential Management
8+
Customers can now [manage credentials](./programs/asset-based-credential-management.html) by specific assets.

docs/programs/asset-based-credential-management.md

Lines changed: 33 additions & 61 deletions
Original file line numberDiff line numberDiff line change
@@ -11,71 +11,32 @@ Credentials can be granted based on Team or Asset. This setting can be changed b
1111
### Asset-Based Credentials
1212
Asset-based credential management has additional steps of downloading a template which contains some pre-filled information about your project. Once you complete and upload the template, credentials will be assigned to the specified hackers.
1313

14-
Programs can download their asset file; modify it and upload their CSV back.
15-
16-
#### CSV Format
17-
When you navigate to the credentials area, you will see an option to first download the template which will auto-populate some of the fields with information from your project. The Asset ID and Asset information are required in the CSV when using Asset-specific credentials. The Assigned To column can be left empty if there is no credential inquiry required, and any hacker can claim the credentials.
18-
19-
For Team-specific credentials, those two categories are not required. See the example below.
14+
Programs can download their asset file, modify it, and re-upload their CSV.
2015

16+
[Credential management screen](./images/asset-based-1.png)
2117

18+
#### CSV Format
19+
When you navigate to the credentials area, you will see an option to first download the template which will auto-populate some of the fields with information from your project. The **Asset ID** and **Asset information** are required in the CSV when using Asset-specific credentials. The **Assigned To column** can be left empty if there is no credential inquiry required, and any hacker can claim the credentials.
2220

23-
Asset ID
24-
Asset
25-
Assigned To
26-
Username
27-
Password
28-
1
29-
https://hackerone.com
30-
hacker-john
31-
John
32-
john123
33-
2
34-
https://api.hackerone.com
35-
21+
**Note:** For Team-specific credentials, those two categories are not required. See the example below.
3622

37-
Jacob
38-
jingleheimer123
39-
3
40-
https://hackerone-attachments.s3.amazonaws.com/
4123

24+
Asset ID | Asset | Assigned To | Username | Password
25+
------ | -------
26+
1 | https://hackerone.com | hacker-john | John | john123
27+
2 | https://api.hackerone.com | | Jacob | jingleheimer123 |
28+
3 | https://hackerone-attachments.s3.amazonaws.com/ | | Schmidt | johnjacob2
4229

43-
Schmidt
44-
johnjacob2
4530

4631
#### Multiple Credentials
4732
Each hacker is allowed to claim one credential. If a hacker needs two logins, such as a regular account and an admin account, then both of those usernames and passwords can be put into the same credential for that hacker to claim. See examples below.
4833

4934
Table appearance:
50-
Asset ID
51-
Asset
52-
Assigned To
53-
Username
54-
Password
55-
Username2
56-
Password2
57-
1
58-
https://hackerone.com
59-
hacker-john
60-
John
61-
john123
62-
JohnAdmin
63-
johnadmin123
64-
2
65-
https://api.hackerone.com
66-
jacob-123
67-
Jacob
68-
jingleheimer123
69-
JacobAdmin
70-
schmidtadmin123
71-
3
72-
https://hackerone-attachments.s3.amazonaws.com/
73-
jane-hacks
74-
Jane
75-
jane123
76-
JaneAdmin
77-
janeadmin123
78-
35+
Asset ID | Asset | Assigned To | Username | Password | Username2 | Password2
36+
------ | -------
37+
1 | https://hackerone.com | hacker-john | John | john123 | JohnAdmin | johnadmin123
38+
2 | https://api.hackerone.com | jacob-123 | Jacob | jingleheimer123 | JacobAdmin | schmidtadmin123
39+
3 | https://hackerone-attachments.s3.amazonaws.com/ | jane-hacks | Jane | jane123 | JaneAdmin | janeadmin123
7940

8041

8142
### Credential Inquiry
@@ -85,45 +46,54 @@ The hacker provides the information via the program’s Policy Page.
8546

8647
When it’s not necessary to request information from the hacker before creating credentials, you can immediately add credentials.
8748

49+
[Add your credentials](./images/asset-based-2.png)
8850

8951

52+
[What information do you need](./images/asset-based-3.png)
9053

9154

55+
You will see a list of hackers that requested credentials and provided the needed information.
9256

57+
[hackers that requested credentials & provided info](./images/asset-based-4.png)
9358

94-
95-
96-
97-
98-
99-
You will see a list of hackers that requested credentials and provided the needed information.
10059
### Hacker Assignment
10160
#### Claiming Credentials
10261

10362
When a program has an asset that does not require information from a hacker, the hacker can claim a credential via the program’s Policy Page. Once the credential is claimed by the hacker, the credential is automatically assigned to them.
10463

64+
[Show credentials button](./images/asset-based-5.png)
65+
66+
[Assets with credentials](./images/asset-based-6.png)
10567

10668
#### Requesting Credentials
10769
When a program has a credential inquiry, the hacker can’t immediately claim credentials. First, they need to request credentials and provide the necessary information.
10870

10971
Once the information is provided, the hacker is put on a waiting list until the Program Manager creates the credential and assigns the hacker to these credentials.
11072

73+
[Request credentials button](./images/asset-based-7.png)
11174

75+
[Define credentials area](./images/asset-based-8.png)
11276

113-
77+
[Credential requirements](./images/asset-based-9.png)
11478

11579
### Credential Assignment
11680
When creating a new credential and assigning the credential to a hacker via CSV upload. Once the credential is assigned the hacker is removed from the waiting list.
11781

11882
As the hacker provides the information, the Program Manager is notified every 5 days per e-mail. The information given by the hacker shows up in the list on the Credential Management page. From here you can download the list with credential inquiry responses.
11983

84+
[Credential management screen](./images/asset-based-10.png)
85+
12086
#### Pre-Assigning Credentials
12187
To assign credentials to hackers, you need to create a CSV file with credentials and put the hacker’s username to the (already provided) Assigned To column. This column can be left empty if there is no credential inquiry required, and any hacker can claim the credentials.
12288

12389
When the credential is assigned to a hacker, the hacker is notified. If a hacker is not a whitelisted reporter in the program, an error is raised.
90+
91+
[Hacker whitelist error](./images/asset-based-11.png)
92+
12493
### Edit, Revoke and Delete Credentials
12594
If you need to edit a credential, you can do this by clicking on the edit button on the right side of the table.
12695

96+
[Edit credentials menu](./images/asset-based-12.png)
12797

12898
#### Revoking Credentials
12999
If a hacker has violated your policy or HackerOne’s code of conduct, you can revoke the credential rights of a hacker by clicking Revoke next to the username of the hacker. You'll also need to invalidate the account on your own platform to prevent the hacker from logging in and reset the password when you recycle the credential for another user.
@@ -132,3 +102,5 @@ Credentials are also automatically revoked when a hacker leaves a program for an
132102

133103
#### Delete All Credentials
134104
If you want to delete all credentials on all the assets, click on the Reset button. This action will delete both the assigned and unassigned credentials.
105+
106+
[Delete credentials menu](./images/asset-based-13.png)
270 KB
Loading
886 KB
Loading
1.34 MB
Loading
730 KB
Loading
602 KB
Loading
521 KB
Loading
1.89 MB
Loading
1.59 MB
Loading
723 KB
Loading
1.83 MB
Loading
1.71 MB
Loading
1.8 MB
Loading
1.9 MB
Loading

src/pages/programs/programs-nav.yaml

Lines changed: 2 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -122,6 +122,8 @@
122122
path: /programs/sessions.html
123123
- title: Credential Management
124124
path: /programs/credential-management.html
125+
- title: "Asset-Based Credential Management"
126+
path: "/programs/asset-based-credential-management.html"
125127
- title: Notifications
126128
path: /programs/notifications.html
127129
- title: Response Programs

0 commit comments

Comments
 (0)