關於amazon亞馬遜SPAPI開發人員資料注冊,amazon亞馬遜開發人員資料申請注冊,amazon亞馬遜銷售合作伙伴 API申請注冊,amazon亞馬遜SP-API申請注冊,amazon亞馬遜Selling Partner API申請注冊詳細指導
從2020年10月6日開始,亞馬遜不在提供MWS API申請了,以后所有的開發都要轉到銷售伙伴api了,也就是SP-API。之前的mws api還可以繼續使用,但是最終亞馬遜還是會要求你遷移到SP-API的,這是趨勢。
SP-API據我研究,應該是不在分北美、歐洲、亞洲等區域分開申請了,現在不需要填寫開發者注冊表了,現在填寫的開發人員資料注冊表,
申請開發人員資料的流程稍微有些區別,但是區別不大,你依然可以找我。 無論是全新申請、還是補充資料,那么這些問題都是些很專業的問題,如果需要我幫您詳細指導,請加我的微信:yzw886
以下是亞馬遜官方的介紹:
銷售合作伙伴 API (SP-API) 現已可供全球所有注冊開發人員使用。SP-API 是亞馬遜銷售合作伙伴的下一代基於 API 的自動化功能套件,也是亞馬遜市場 Web 服務 (Amazon MWS) 的演變。
今后,所有新的 API 功能都將在 SP-API 中構建,僅對 Amazon MWS 進行更新,以支持業務關鍵型更改。
哪些市場受到影響?
SP-API 在所有市場都可用。
誰受到影響?
所有注冊的開發人員都可以在開發人員中心通過自助服務創建 SP-API 應用程序(轉到應用和服務>在賣家中心開發應用程序)。新開發人員將根據其用例完成角色訪問權限的注冊,並能夠創建具有其資格角色的 SP-API 應用程序。對於具有現有 Amazon MWS 憑據和角色的開發人員,我們使用細粒度角色回填了對 SP-API 的訪問;這些開發人員可以更新其現有集成以使用這兩個 API 套件。開發人員可以通過更新其開發人員配置文件並提供任何其他所需信息來請求其他訪問。
需要執行什么操作?
目前,具有現有 Amazon MWS 集成的開發人員不需要更改或操作。但是,傳統的 Amazon MWS API 將來將被棄用。我們尚未確定日期,但將提供通知、時間和工具,以支持現有 Amazon MWS 集成的遷移。我們鼓勵所有開發人員探索 SP-API 功能並開始規划遷移。
更多信息
有關詳細信息,請參閱:
SP-API 網站: https://developer.amazonservices.com
GitHub 上的 SP API 文檔:https://github.com/amzn/selling-partner-api-docs
無論是開發人員資料全新申請、還是補充資料,那么這些問題都是些很專業的問題,如果需要我幫您詳細指導,請加我的微信:yzw886
開發人員資料申請需要填寫的問答題如下:
**描述您打算使用所請求角色中的功能來構建的應用程序或功能。
**描述您為何需要個人識別信息來構建您的應用程序或功能。
**列出您的機構與之共享亞馬遜信息的所有外部方,並描述您的組織如何共享此信息。
**列出您檢索亞馬遜信息時發現的所有非亞馬遜 MWS 來源。
1、描述您的機構針對數據庫、文件服務器和桌面/開發人員端點的公共訪問所使用的網絡保護控制。
2、描述您的機構如何單獨識別有權訪問亞馬遜信息的員工,並在需要知道的基礎上限制員工訪問亞馬遜信息。
3、描述貴機構為監控和防止從員工個人設備(例如 USB 閃存盤、手機)訪問亞馬遜信息而實施的機制,以及在發生此類事件時如何向您發出提醒。
4、提供貴機構的隱私和數據處理政策,以描述如何收集、處理、存儲、使用、共享和處置亞馬遜數據。您可以以公共網站 URL 的形式提供此信息。
5、描述您的機構存儲靜態亞馬遜信息的位置,並提供關於所使用的任何加密算法的詳細信息。
6、描述您的機構如何備份或存檔亞馬遜信息,並提供所使用的所有加密算法的詳細信息。
7、描述您的機構如何監控、檢測和記錄應用程序中的惡意活動。
8、描述貴機構的事件應對計划如何解決數據庫入侵、未經授權的訪問以及數據泄露問題。是否接受鏈接至您的事件響應計划。
9、在密碼所需長度、復雜性(大寫/小寫、數字、特殊字符)和有效期方面,您如何在整個組織中強制實施這些密碼管理實踐?
10、測試期間如何為個人身份信息 (PII) 提供保護?
11、采取了哪些措施來防止憑證泄露?
12、您如何追蹤在漏洞掃描和滲透測試中發現的問題的修復進度?
13、您如何處理在開發生命周期和運行期間發現的代碼漏洞?
14、誰負責變更管理?如何授予他們訪問權限? 請指定職務。
無論是開發人員資料全新申請、還是補充資料,那么這些問題都是些很專業的問題,如果需要我幫您詳細指導,請加我的微信:yzw886
Developer Profile collects your organization’s contact information, information about the data you require in Seller Partner API, and security and use information to ensure your compliance with Amazon’s Acceptable Use Policy and Data Protection Policy. If you are an Amazon Marketplace Web Service developer with multiple developer IDs, you do not need to submit a separate Developer Profile for each developer ID.
Once you complete the Developer Profile, Amazon will evaluate your information and create a case with next steps. You may be asked to provide additional information or documentation, so please complete all fields truthfully and accurately.
Contact Information
Organization name
Organization website
Organization home country
Primary contact name
Contact email
Contact country code
Contact phone number
Data Access
Please select the option that best describes your organization
Note that your answers represent your organization
If you are currently an MWS developer, please provide your organization's developer ID(s)
Please include all of your organization's developer IDs separated by a comma. Note: If you are an Amazon Marketplace Web Service developer with multiple developer IDs, you do not need to submit a separate Developer Profile for each developer ID.
Example: 123456789123, 987654321987
Roles
Roles determine access to Selling Partner API. Role definitions can be found here
Note: Restricted roles contain Personally Identifiable Information (PII) about Amazon Buyers, and you will be required to provide additional information about your data use and security controls.
Finance & Accounting
Produce accounting and financial statements.
Selling Partner Insights
View information about the Amazon Selling Partner account and performance.
Buyer Communication
Manage messaging to and from Amazon buyers.
Pricing
Determine list prices and automate product pricing.
Direct-to-Consumer Shipping(Restricted)
Ship orders directly to customers using carrier of choice, including Amazon.
Tax Remittance(Restricted)
Calculate and remit sales taxes.
Inventory and Order Management
Analyze and manage inventory.
Amazon Fulfillment
Ship to Amazon, and Amazon ships directly to customers.
Buyer Solicitation
Solicit Amazon buyers for feedback.
Product Listing
Create and manage product listings.
Tax Invoicing(Restricted)
Generate tax invoices to comply with tax regulation.
Use Cases
Describe the application or feature(s) you intend to build using the functionality in the requested roles.
5000 characters maximum
Describe why you require Personally Identifiable Information to build your application or feature.
500 characters maximum
Security Controls
Do you use network controls to prevent unauthorized access to Amazon Information?
Yes
No
Do you restrict access to Amazon Information based on users’ job duties or business functions?
Yes
No
Do you encrypt Amazon Information in transit?
Yes
No
Do you have an incident response plan that covers monitoring, detection, and response for potential threats and security incidents?
Yes
No
Does your incident response plan to detect and handle Security Incidents, and report Security Incidents to 3p-security@amazon.com?
Yes
No
List all outside parties with whom your organization shares Amazon Information and describe how your organization shares this information.
500 characters maximum
List all non-Amazon MWS sources where you retrieve Amazon Information.
500 characters maximum
Because the roles you have requested are Restricted, you must comply with the Personally Identifiable Information security requirements in the Data Protection Policy.
How long do you retain Personally Identifiable Information data?
Less than 31 days after order shipments
31 to 90 days after order shipments
91 to 180 days after order shipments
More than 180 days after order shipments
Do you have a privacy and data handling policy?
Yes
No
Do you encrypt Personally Identifiable Information at rest?
Yes
No
Do you use fine-grained access controls to restrict to Personally Identifiable Information?
Yes
No
Do you use audit logs from systems or applications that contain Personally Identifiable Information to detect and alert on Security Incidents?
Yes
No
Describe the network protection controls used by your organization to restrict public access to databases, file servers, and desktop/developer endpoints.
500 characters maximum
Describe how your organization individually identifies employees who have access to Amazon Information, and restricts employee access to Amazon information on a need- to-know basis.
500 characters maximum
Describe the mechanism your organization has in place to monitor and prevent Amazon Information from being accessed from employee personal devices (such as USB flash drives, cellphones) and how are you alerted in the event such incidents occur.
500 characters maximum
Provide your organization's privacy and data handling policies to describe how Amazon data is collected, processed, stored, used, shared and disposed. You may provide this in the form of a public website URL.
500 characters maximum
Describe where your organization stores Amazon Information at rest and provide details on any encryption algorithm used.
500 characters maximum
Describe how your organization backups or archives Amazon Information and provide details on any encryption algorithm used.
500 characters maximum
Describe how your organization monitors, detects, and logs malicious activity in your application(s).
500 characters maximum
Describe how your organization's incident response plan addresses database hacks, unauthorized access, and data leaks. A link to your incident response plan is also acceptable.
How do you enforce password management practices throughout the organisation as it relates to required length, complexity (upper/lower case, numbers, special characters) and expiration period?
How is Personally Identifiable Information (PII) protected during testing?
What measures are taken to prevent exposure of credentials?
How do you track remediation progress of findings identified from vulnerability scans and penetration tests?
How do you address code vulnerabilities identified in the development lifecycle and during runtime?
Who is responsible for change management and how is their access granted? Please specify job title.