Skip to content

Commit 922e894

Browse files
committed
Fix indent
1 parent 695dab7 commit 922e894

File tree

1 file changed

+2
-2
lines changed

1 file changed

+2
-2
lines changed

src/content/docs/waf/custom-rules/use-cases/check-jwt-claim-to-protect-admin-user.mdx

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -14,7 +14,7 @@ This example configures additional protection for requests with a JSON Web Token
1414

1515
Create a custom rule that issues a Managed Challenge if the user claim in a JWT is `admin` and the attack score is below 40.
1616

17-
- **Expression**: `(lookup_json_string(http.request.jwt.claims["<TOKEN_CONFIGURATION_ID>"][0], "user") eq "admin" and cf.waf.score < 40)`
18-
- **Action**: _Managed Challenge_
17+
- **Expression**: `(lookup_json_string(http.request.jwt.claims["<TOKEN_CONFIGURATION_ID>"][0], "user") eq "admin" and cf.waf.score < 40)`
18+
- **Action**: _Managed Challenge_
1919

2020
In this example, `<TOKEN_CONFIGURATION_ID>` is your [token configuration ID](/api-shield/security/jwt-validation/configure/) found in JWT Validation and `user` is the JWT claim.

0 commit comments

Comments
 (0)