You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
*[Test Block Flow on Monitoring Mode](#bypass_monitor_header)
31
-
*[Enforce Specific Routes](#enforce_specific_routes)
32
37
33
38
## <aname="installation"></a> Installation
34
39
@@ -59,10 +64,10 @@ px_config = {
59
64
application = get_wsgi_application()
60
65
application = PerimeterX(application, px_config)
61
66
```
62
-
- The PerimeterX **Application ID** / **AppId** and PerimeterX **Token** / **Auth Token** can be found in the Portal, in [Applications](https://console.perimeterx.com/#/app/applicationsmgmt).
63
-
- PerimeterX **Risk Cookie** / **Cookie Key** can be found in the portal, in [Policies](https://console.perimeterx.com/#/app/policiesmgmt).
67
+
- The PerimeterX **Application ID** / **AppId** and PerimeterX **Token** / **Auth Token** can be found in the Portal, in [Applications](https://console.perimeterx.com/botDefender/admin?page=applicationsmgmt).
68
+
- PerimeterX **Risk Cookie** / **Cookie Key** can be found in the portal, in [Policies](https://console.perimeterx.com/botDefender/admin?page=policiesmgmt).
64
69
The Policy from where the **Risk Cookie** / **Cookie Key** is taken must correspond with the Application from where the **Application ID** / **AppId** and PerimeterX **Token** / **Auth Token**.
65
-
For details on how to create a custom Captcha page, refer to the [documentation](https://console.perimeterx.com/docs/server_integration_new.html#custom-captcha-section)
70
+
For details on how to create a custom Captcha page, refer to the [documentation](https://docs.perimeterx.com/pxconsole/docs/customize-challenge-page)
An array of regex patterns which will bypass enforcement (will never get scored).
192
+
193
+
**Default:** Empty
194
+
195
+
```python
196
+
config = {
197
+
...
198
+
whitelist_routes_regex: [r'^/about']
199
+
...
200
+
}
201
+
```
202
+
203
+
#### <aname="enforce_specific_routes"></a> Enforce Specific Routes
204
+
205
+
An array of route prefixes that are always validated by the PerimeterX Worker (as opposed to whitelisted routes).
206
+
When this property is set, any route which is not added - will be whitelisted.
207
+
208
+
**Default:** Empty
209
+
210
+
```python
211
+
config = {
212
+
...
213
+
enforced_specific_routes: ['/profile']
214
+
...
215
+
};
216
+
```
217
+
218
+
#### <aname="enforce_specific_routes_regex"></a> Enforce Specific Routes Regex
219
+
220
+
An array of regex patterns that are always validated by the PerimeterX Worker (as opposed to whitelisted routes).
221
+
When this property is set, any route which is not added - will be whitelisted.
222
+
223
+
**Default:** Empty
224
+
225
+
```python
226
+
config = {
227
+
...
228
+
enforced_specific_routes_regex: [r'^/profile$']
229
+
...
230
+
};
231
+
```
232
+
233
+
#### <aname="monitor_specific_routes"></a> Monitor Specific Routes
234
+
235
+
An array of route prefixes that are always set to be in [monitor mode](#module_mode). This configuration is effective only when the module is enabled and in blocking mode.
236
+
237
+
**Default:** Empty
238
+
239
+
```python
240
+
config = {
241
+
...
242
+
monitored_specific_routes: ['/profile']
243
+
...
244
+
};
245
+
```
246
+
247
+
#### <aname="monitor_specific_routes_regex"></a> Monitor Specific Routes Regex
248
+
249
+
An array of regex patterns that are always set to be in [monitor mode](#module_mode). This configuration is effective only when the module is enabled and in blocking mode.
0 commit comments