Security Guide

Subdomain takeover vulnerabilities in DNS configuration

Explains the mechanics of subdomain takeover vulnerabilities, including how DNS configurations and external service dependencies can create exploitable conditions.

Audience: web developers

Strong example of explaining a complex security concept to developers and site operators.

Security documentationDeveloper experienceCross-team collaboration

Platform local API security model

Explains the security model governing local APIs exposed by the platform runtime, including how access restrictions protect system capabilities.

Audience: developers

Demonstrates ability to explain access control for platform APIs.

Security documentationDeveloper experience

Reference Content

Application manifest configuration reference

Documents the structure and fields used in the application manifest file and how they control application capabilities.

Audience: developers

Demonstrates structured reference documentation for configuration-based systems,detailing fields and behaviors that control runtime capabilities. The same info is available in the API reference, but spread across a number of classes.

Platform documentationConfiguration documentation

Concept, Procedure

Agents: integrating external systems with HERE Enterprise Browser

Explains how agents connect HERE Enterprise Browser to external systems such as Microsoft 365, Salesforce, and Slack, enabling cross-application search and interoperability.

Audience: platform administrators,enterprise architects

Platform documentationConceptual documentationEnterprise software documentation

Procedure

Collect diagnostic logs for troubleshooting

Explains how to use the log uploader tool to collect and submit logs for debugging and support troubleshooting workflows.

Audience: developers

Strong fit for roles seeking procedural troubleshooting and developer support documentation.

Developer experienceMarkdown authoringGitHub workflows