You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: src/content/docs/api-shield/security/jwt-validation/transform-rules.mdx
+1-26Lines changed: 1 addition & 26 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -34,29 +34,4 @@ As an example, to send the header `x-send-jwt-claim-user` request header to the
34
34
4. Enter a rule name and a filter expression, if applicable.
35
35
5. Choose **Set dynamic**.
36
36
6. Set the header name.
37
-
7. Set the value to `lookup_json_string(http.request.jwt.claims["<TOKEN_CONFIGURATION_ID>"][0], "claim_name")`, where `<TOKEN_CONFIGURATION_ID>` is your token configuration ID found in JWT Validation and `claim_name` is the JWT claim you want to add to the header.
38
-
39
-
## Available fields
40
-
41
-
You can create Transform Rules using more claims present in tokens processed by [JWT Validation](/api-shield/security/jwt-validation/).
42
-
43
-
-`http.request.jwt.claims.aud,`
44
-
-`http.request.jwt.claims.aud.names,`
45
-
-`http.request.jwt.claims.aud.values,`
46
-
-`http.request.jwt.claims.iat.sec,`
47
-
-`http.request.jwt.claims.iat.sec.names,`
48
-
-`http.request.jwt.claims.iat.sec.values,`
49
-
-`http.request.jwt.claims.iss,`
50
-
-`http.request.jwt.claims.iss.names,`
51
-
-`http.request.jwt.claims.iss.values,`
52
-
-`http.request.jwt.claims.jti,`
53
-
-`http.request.jwt.claims.jti.names,`
54
-
-`http.request.jwt.claims.jti.values,`
55
-
-`http.request.jwt.claims.nbf.sec,`
56
-
-`http.request.jwt.claims.nbf.sec.names,`
57
-
-`http.request.jwt.claims.nbf.sec.values,`
58
-
-`http.request.jwt.claims.sub,`
59
-
-`http.request.jwt.claims.sub.names,`
60
-
-`http.request.jwt.claims.sub.values,`
61
-
-`cf.api_gateway.auth_id_present,`
62
-
-`cf.api_gateway.request_violates_schema`
37
+
7. Set the value to `lookup_json_string(http.request.jwt.claims["<TOKEN_CONFIGURATION_ID>"][0], "claim_name")`, where `<TOKEN_CONFIGURATION_ID>` is your token configuration ID found in JWT Validation and `claim_name` is the [JWT claim](/ruleset-engine/rules-language/fields/dynamic-fields/#json-web-tokens-validation-claims) you want to add to the header.
Copy file name to clipboardExpand all lines: src/content/docs/ruleset-engine/rules-language/fields/dynamic-fields.mdx
+64Lines changed: 64 additions & 0 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -511,3 +511,67 @@ Identifies whether a request comes from a worker or not. When a request comes fr
511
511
## Corporate Proxy
512
512
513
513
<Renderfile="corporate_proxy"product="bots" />
514
+
515
+
## JSON Web Tokens Validation claims
516
+
517
+
[API Shield](/api-shield/) users can now create [custom rules](/waf/custom-rules/) using claims present in tokens processed by [JSON Web Tokens Validation](/api-shield/security/jwt-validation/).
The `aud` (audience) claim identifies the recipients that the JSON Web Token (JWT) is intended for. Each principal intended to process the JWT must identify itself with a value in the audience claim. In the general case, the `aud` value is an array of case-sensitive strings, each containing a `StringOrURI` value.
0 commit comments