Thanks to visit codestin.com
Credit goes to github.com

Skip to content

Commit fd24bf9

Browse files
authored
Merge pull request Hacker0x01#687 from Hacker0x01/Update-nav
redoing images
2 parents 2b8e3fc + 3bc1aac commit fd24bf9

File tree

2 files changed

+12
-14
lines changed

2 files changed

+12
-14
lines changed

docs/changelog/2022/march.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -5,13 +5,13 @@ date: "2022-03"
55
---
66

77
### Retesting Enhancement
8-
We've update retesting time so the tester will now have 72 hours to complete retesting.
8+
The tester will now have 72 hours to complete retesting once a retest is claimed.
99

1010
### Program Hacker Matching Improvement
1111
We’ve made improvements to our Invitation Engine, using program requirements and customer preferences to match hackers to opportunities, we provide our hacker community with much more personalized recommendations.
1212

1313
### Organization Settings Page
14-
Customers with multiple programs can now manage users from a single page.
14+
The Organization Settings page allows customers with multiple programs to manage users from a single page.
1515
![Organization Settings Page](./images/organization-settings.png)
1616

1717
### Program Dashboard Enhancements

docs/programs/asset-based-credential-management.md

Lines changed: 10 additions & 12 deletions
Original file line numberDiff line numberDiff line change
@@ -13,7 +13,7 @@ Asset-based credential management has additional steps of downloading a template
1313

1414
Programs can download their asset file, modify it, and re-upload their CSV.
1515

16-
![Credential management screen](./images/___-based-1.png)
16+
![Credential management screen](./images/asset-based-1.png)
1717

1818
#### CSV Format
1919
When you navigate to the credentials area, you will see an option to first download the template which will auto-populate some of the fields with information from your project. The **Asset ID** and **Asset information** are required in the CSV when using Asset-specific credentials. The **Assigned To column** can be left empty if there is no credential inquiry required, and any hacker can claim the credentials.
@@ -41,35 +41,35 @@ The hacker provides the information via the program’s Policy Page.
4141

4242
When it’s not necessary to request information from the hacker before creating credentials, you can immediately add credentials.
4343

44-
![Add your credentials](./images/___-based-2.png)
44+
![Add your credentials](./images/asset-based-2.png)
4545

4646

47-
![What information do you need](./images/___-based-3.png)
47+
![What information do you need](./images/asset-based-3.png)
4848

4949

5050
You will see a list of hackers that requested credentials and provided the needed information.
5151

52-
![hackers that requested credentials & provided info](./images/___-based-4.png)
52+
![hackers that requested credentials & provided info](./images/asset-based-4.png)
5353

5454
### Hacker Assignment
5555
#### Claiming Credentials
5656

5757
When a program has an asset that does not require information from a hacker, the hacker can claim a credential via the program’s Policy Page. Once the credential is claimed by the hacker, the credential is automatically assigned to them.
5858

59-
![Show credentials button](./images/___-based-5.png)
59+
![Show credentials button](./images/asset-based-5.png)
6060

61-
![Assets with credentials](./images/___-based-6.png)
61+
![Assets with credentials](./images/asset-based-6.png)
6262

6363
#### Requesting Credentials
6464
When a program has a credential inquiry, the hacker can’t immediately claim credentials. First, they need to request credentials and provide the necessary information.
6565

6666
Once the information is provided, the hacker is put on a waiting list until the Program Manager creates the credential and assigns the hacker to these credentials.
6767

68-
![Request credentials button](./images/___-based-7.png)
68+
![Request credentials button](./images/asset-based-7.png)
6969

70-
![Define credentials area](./images/___-based-8.png)
70+
![Define credentials area](./images/asset-based-8.png)
7171

72-
![Credential requirements](./images/___-based-9.png)
72+
![Credential requirements](./images/asset-based-9.png)
7373

7474
### Credential Assignment
7575
When creating a new credential and assigning the credential to a hacker via CSV upload. Once the credential is assigned the hacker is removed from the waiting list.
@@ -83,8 +83,6 @@ To assign credentials to hackers, you need to create a CSV file with credentials
8383

8484
When the credential is assigned to a hacker, the hacker is notified. If a hacker is not a whitelisted reporter in the program, an error is raised.
8585

86-
![Hacker whitelist error](./images/-based-11.png)
87-
8886
### Edit, Revoke and Delete Credentials
8987
If you need to edit a credential, you can do this by clicking on the edit button on the right side of the table.
9088

@@ -98,4 +96,4 @@ Credentials are also automatically revoked when a hacker leaves a program for an
9896
#### Delete All Credentials
9997
If you want to delete all credentials on all the assets, click on the Reset button. This action will delete both the assigned and unassigned credentials.
10098

101-
![Delete credentials menu](./images/___-based-13.png)
99+
![Delete credentials menu](./images/asset-based-13.png)

0 commit comments

Comments
 (0)