diff --git a/state/wwwpublic/.well-known/security-disclosure-policy-erda.dk.txt b/state/wwwpublic/.well-known/security-disclosure-policy-erda.dk.txt index a81594949..cb2334d13 100644 --- a/state/wwwpublic/.well-known/security-disclosure-policy-erda.dk.txt +++ b/state/wwwpublic/.well-known/security-disclosure-policy-erda.dk.txt @@ -7,6 +7,10 @@ security monitoring as well as the national DK-Cert monitoring. So we do NOT have a bug/vulnerability reward program. Yet, we are of course grateful for any bug or security reports, which might improve our services or prevent abuse. +If you report such a bug/vulnerability of significance, we will make +sure to accredit your contribution in our corresponding release notes. +We develop the underlying platform as Free and Open Source Software, +so such mentions will be available for everyone online to see. Like e.g. Google we do NOT consider the presence of version information a security vulnerability in itself. Flaws affecting only diff --git a/state/wwwpublic/.well-known/security-disclosure-policy-migrid.org.txt b/state/wwwpublic/.well-known/security-disclosure-policy-migrid.org.txt index 8f1f23617..33b0c3529 100644 --- a/state/wwwpublic/.well-known/security-disclosure-policy-migrid.org.txt +++ b/state/wwwpublic/.well-known/security-disclosure-policy-migrid.org.txt @@ -7,6 +7,10 @@ security monitoring as well as the national DK-Cert monitoring. So we do NOT have a bug/vulnerability reward program. Yet, we are of course grateful for any bug or security reports, which might improve our services or prevent abuse. +If you report such a bug/vulnerability of significance, we will make +sure to accredit your contribution in our corresponding release notes. +We develop the underlying platform as Free and Open Source Software, +so such mentions will be available for everyone online to see. Like e.g. Google we do NOT consider the presence of version information a security vulnerability in itself. Flaws affecting only diff --git a/state/wwwpublic/.well-known/security-disclosure-policy-sif.erda.dk.txt b/state/wwwpublic/.well-known/security-disclosure-policy-sif.erda.dk.txt index 97f8193b7..d79f17c84 100644 --- a/state/wwwpublic/.well-known/security-disclosure-policy-sif.erda.dk.txt +++ b/state/wwwpublic/.well-known/security-disclosure-policy-sif.erda.dk.txt @@ -7,6 +7,10 @@ security monitoring as well as the national DK-Cert monitoring. So we do NOT have a bug/vulnerability reward program. Yet, we are of course grateful for any bug or security reports, which might improve our services or prevent abuse. +If you report such a bug/vulnerability of significance, we will make +sure to accredit your contribution in our corresponding release notes. +We develop the underlying platform as Free and Open Source Software, +so such mentions will be available for everyone online to see. Like e.g. Google we do NOT consider the presence of version information a security vulnerability in itself. Flaws affecting only diff --git a/state/wwwpublic/terms-storage.deic.dk.html b/state/wwwpublic/terms-storage.deic.dk.html index 6d680118b..4eadb1c57 100644 --- a/state/wwwpublic/terms-storage.deic.dk.html +++ b/state/wwwpublic/terms-storage.deic.dk.html @@ -75,7 +75,7 @@ site logo center - Electronic Research Data Archive + DeiC Storage
@@ -140,8 +140,8 @@

Your Privacy

technically administer our Services, for example, how we redundantly backup data to keep it safe. You give us the permissions we need to do those things solely to provide the Services. This permission also - extends to any trusted third parties at UCPH we work with to provide the Services, - for example University IT, which provides our UCPH OpenID login (again, only to + extends to any trusted third parties at DeiC Storage we work with to provide the Services, + for example University IT, which provides our WAYF login (again, only to provide the Services).

@@ -293,7 +293,7 @@

Modifications

diff --git a/state/wwwpublic/tips-storage.deic.dk.html b/state/wwwpublic/tips-storage.deic.dk.html index da1952cbe..3642b698b 100644 --- a/state/wwwpublic/tips-storage.deic.dk.html +++ b/state/wwwpublic/tips-storage.deic.dk.html @@ -122,7 +122,7 @@
-
+

2-Factor Authentication (2FA)

@@ -145,7 +145,7 @@

2-Factor Authentication (2FA)

wizard.

-
+

Custom Start Page

@@ -217,7 +217,7 @@

DeiC Storage as a Network Drive

details.

-
+ +

Data Distribution with Import Sharelink

@@ -265,7 +265,7 @@

Data Distribution with Import Sharelink

convenient for Jupyter notebooks to be used in exercises.

-
+

YubiKey For Multifactor Authentication

Can I use a YubiKey security device for stronger and safer authentication? - UCPH generally recommends securing your logins with MFA and offer + It generally recommends securing your logins with MFA and offer employees e.g. the small keyring-format hardware security keys from Yubico for the purpose. You might want to have a word with your local leader about perhaps getting one if you haven't done so already. It can be used for various - common UCPH services and we offer basic support for it on DeiC Storage - and SIF, too. For now you can use it along with the + common IT services and we offer basic support for it on DeiC Storage + and DeiC Sensitive Storage, too. For now you can use it along with the Yubico Authenticator app to actually get a 3-factor authentication. Namely, your usual user credentials, your physical YubiKey and the @@ -331,15 +331,17 @@

YubiKey For Multifactor Authentication

-

Ny brugergrænseflade

+

2-faktor godkendelse (2FA)

- Vidste du at du kan prøvekøre DeiC Storages nye moderniserede - brugergrænseflade? - Du kan nemt skifte mellem den traditionelle - og den nye - brugergrænseflade ved at skifte User Interface fra V2 til V3 eller - omvendt på din Settings. + Bekymrer du dig om sikkerheden på din konto hos DeiC Storage? DeiC Storage tilbyder valgfri + 2FA på alle tjenester. Dette reducerer risikoen for misbrug af kontoen betragteligt. + Selv i tilfælde, hvor nogen har opsnappet dit kodeord. Grundet generelle sikkerhedsovervejelser, + og nylig øgning af phishing-angreb, så anbefaler vi at slå 2FA til. Det sker ved at følge + en kort guide til + opsætning af 2-faktor godkendelse.

+