This is an automated email from the ASF dual-hosted git repository.

jleroux pushed a commit to branch master
in repository https://gitbox.apache.org/repos/asf/ofbiz-site.git


The following commit(s) were added to refs/heads/master by this push:
     new 1846b4b  Improved: formatting (you don't see the same thing locally )
1846b4b is described below

commit 1846b4bec890e784291d95a1e3f6ad4bba21f526
Author: Jacques Le Roux <[email protected]>
AuthorDate: Sun Sep 7 09:40:20 2025 +0200

    Improved: formatting (you don't see the same thing locally )
---
 template/page/security.tpl.php | 4 ++--
 1 file changed, 2 insertions(+), 2 deletions(-)

diff --git a/template/page/security.tpl.php b/template/page/security.tpl.php
index b2cb986..ada504e 100644
--- a/template/page/security.tpl.php
+++ b/template/page/security.tpl.php
@@ -20,8 +20,8 @@
              <h2>OFBiz Security</h2>
             <div class="divider"><span></span></div>
                 <a 
href="//cwiki.apache.org/confluence/display/OFBIZ/OFBiz+Security+Permissions" 
target="external">OFBiz Security Model : Permissions and related.</a> Be sure 
to read the children pages in the left part of screen.<br>
-                <a 
href="//cwiki.apache.org/confluence/display/OFBIZ/Keeping+OFBiz+secure" 
target="external">Keeping OFBiz secure.</a> To keep your OFBiz instance secure 
from exploits.<br>
-
+                <a 
href="//cwiki.apache.org/confluence/display/OFBIZ/Keeping+OFBiz+secure" 
target="external">Keeping OFBiz secure.</a> To keep your OFBiz instance secure 
from exploits.
+            <p></p>
             <p><strong>All system privileges, including access to potentially 
vulnerable operations, are granted to administrators</strong>. Even if we 
assume that administrators don't attack their own websites, it's essential to 
exercise extra care when granting administrator privileges.
                        Therefore, if a security breach occurs on the 
administration page (webtools), it's generally not perceived as a problem. The 
administrator holds the power. Unless an ordinary user manages to overstep 
their bounds and act beyond their authority.
                        So in the webtools page we only accept vulnerabilities 
when using a not administrator credential.

Reply via email to