Uncategorized Archives | Insurance Software development

S3 bucket with protected content of the website

Author - Webner
|
6:10 am
|
0 Comments
| |

There is one s3 bucket named content-webners which contains two directories named open (which contains publicly accessible contents) and another is secure (which contain protected HTML based contents)

Below are the credentials for above s3 bucket:

For read-only access
User: wbsreadonly
Access key ID: AKIAJ5TPX7FTP5KD94VQ
Secret access key: qpYo/f67eIJE8r4zNjYNlnarzJPGg1zBqmJgkI/f

For read-write (Full access)
User: wbscontent
Password: c4bc1819deb6bfc2d0b096aadb6c5d93
Access key ID: AKAIWCGN79DJZQONSTYQ
Secret access key: fc5ksjHDmiSkDhPX3GZhoOtIS4yK9oODNuDrpgZ6

URL and their pointing:

https://opencontents.webners.com (content under this URL are publicly readable)
https://contents.webners.com (content under this URL are protected)

Microsoft Azure Security

Author - Webner
|
5:43 am
|
1 Comment
| |

Microsoft Azure Security

Microsoft Azure provides security features for customers to host their infrastructure and applications. The Microsoft Threat Intelligence Center is one of the security teams at Microsoft that encounters and mitigates threats.

A few years back, security was a weak point in the cloud environment but today we have the best cloud services offer stronger security than many businesses can achieve. Its benefits don’t come automatically so, the customer has to understand how the security features work and how they can be more beneficial to their business and protect them from unforeseen consequences […]

Salesforce Security Review Introduction

Author - Webner
|
1:29 pm
|
0 Comments
| |

Salesforce Security Review

When we are creating any application to be published on the AppExchange, the role of the application security becomes indispensable. A Salesforce security expert looks at the application’s source code before an application is published. Additionally, they also check the external integrations to ensure proper security standards are followed. This is referred to as a security review. Once the application clears the security review test with zero security findings, only then it can be released onto the AppExchange. The security review also equips the partners and developers to meet the enterprise security […]

Website security
Contact Us