You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: src/content/docs/waf/detections/leaked-credentials/get-started.mdx
+8-12Lines changed: 8 additions & 12 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -90,20 +90,16 @@ To check for leaked credentials in a way that is not covered by the default conf
90
90
91
91
1. Log in to the [Cloudflare dashboard](https://dash.cloudflare.com/), and select your account and domain.
92
92
2. Go to **Security** > **Settings**.
93
-
3. Under **Incoming traffic detections**, select **Leaked credentials** and then select the three dots to add a custom detection.
94
-
4. In **Username location**, enter an expression for obtaining the username in the HTTP request. For example:
93
+
3. Under **Incoming traffic detections**, select **Leaked credentials** and then select **Add custom username and password location**.
94
+
4. In **Username location** and **Password location** (optional), enter expressions for obtaining the username and the password from the HTTP request. Refer to the following example expressions:
95
95
96
-
```txt
97
-
lookup_json_string(http.request.body.raw, "user")
98
-
```
96
+
| Request type | Username location / Password location |
0 commit comments