You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
{{ message }}
This repository was archived by the owner on Jul 22, 2024. It is now read-only.
This repository contains samples for the Partner Center Java SDK.
5
+
This repository contains samples for the Partner Center SDK for Java.
6
6
7
7
## Samples List
8
8
9
9
| Sample Name | Description |
10
10
|-------------|-------------|
11
11
|[SDK Samples](sdk/README.md)| Console application that demonstrates each scenario the Partner Center Java SDK is capable of performing.|
12
-
|[Secure App Model](secure-app-model/README.md)| A set of projects that demonstrate how a Control Panel Vendor (CPV) and a Cloud Solution Provider (CSP) should implement the Secure App Model. |
12
+
|[Secure Application Model](secure-app-model/README.md)| A set of projects that demonstrate how a Control Panel Vendor (CPV) and a Cloud Solution Provider (CSP) should implement the Secure Application Model. |
Microsoft takes the security of our software products and services seriously, which includes all source code repositories managed through our GitHub organizations, which include [Microsoft](https://github.com/Microsoft), [Azure](https://github.com/Azure), [DotNet](https://github.com/dotnet), [AspNet](https://github.com/aspnet), [Xamarin](https://github.com/xamarin), and [many more](https://opensource.microsoft.com/).
4
+
5
+
If you believe you have found a security vulnerability in any Microsoft-owned repository that meets Microsoft's [definition](https://docs.microsoft.com/previous-versions/tn-archive/cc751383(v=technet.10)) of a security vulnerability, please report it to us as described below.
6
+
7
+
## Reporting Security Issues
8
+
9
+
**Please do not report security vulnerabilities through public GitHub issues.** Instead, please report them to the Microsoft Security Response Center at [secure@microsoft.com](mailto:secure@microsoft.com). If possible, encrypt your message with our PGP key; please download it from the [Microsoft Security Response Center PGP Key page](https://technet.microsoft.com/security/dn606155).
10
+
11
+
You should receive a response within 24 hours. If for some reason you do not, please follow up via email to ensure we received your original message. Additional information can be found at [microsoft.com/msrc](https://www.microsoft.com/msrc).
12
+
13
+
Please include the requested information listed below (as much as you can provide) to help us better understand the nature and scope of the possible issue:
14
+
15
+
* Type of issue (e.g. buffer overflow, SQL injection, cross-site scripting, etc.)
16
+
* Full paths of source file(s) related to the manifestation of the issue
17
+
* The location of the affected source code (tag/branch/commit or direct URL)
18
+
* Any special configuration required to reproduce the issue
19
+
* Step-by-step instructions to reproduce the issue
20
+
* Proof-of-concept or exploit code (if possible)
21
+
* Impact of the issue, including how an attacker might exploit the issue
22
+
23
+
This information will help us triage your report more quickly.
24
+
25
+
## Preferred Languages
26
+
27
+
We prefer all communications to be in English.
28
+
29
+
## Policy
30
+
31
+
Microsoft follows the principle of [Coordinated Vulnerability Disclosure](https://www.microsoft.com/msrc/cvd).
0 commit comments