Sometimes, customers and suppliers have a different front-end, where often the customer portal is pretty and secure, and the supplier portal is aimed at performance, sometimes lacking in the security maturity. Therefore, it is important to gain access to the supplier portal in this example, to have a bigger attacker surface and to have a leg up