🤝Whitelist
Enabling, managing, and processing whitelist requests for in-scope assets.
Last updated
Enabling, managing, and processing whitelist requests for in-scope assets.
Last updated
The whitelist feature allows companies to authorize bounty hunters' credentials, such as phone numbers, emails, or both, on specific in-scope assets. Whitelisting is applied on a per-asset basis, ensuring targeted access control. Bounty hunters can request whitelisting through the programs they are part of, enabling seamless collaboration while maintaining security and compliance.
To enable whitelisting for an asset, companies should follow these steps:
Navigate to Assets: Go to /company/assets
.
Edit an Asset: Select the asset you want to edit.
Locate the Require Whitelist dropdown option.
Choose the appropriate whitelisting requirement, such as phone, email, or both, from the dropdown.
To manage whitelist requests after authorizing on the platform, follow these steps:
Navigate to Whitelist Requests: Go to /company/assets/whitelist
.
View Requests: All users who have requested whitelisting will be listed here.
Filter Requests:
Use filters to view requests by specific assets or across all assets.
Further refine results by request status: Requested, Approved, or Rejected.
Approve or Reject Requests:
Select one or multiple users.
Click on the Approve or Reject button to take action.