You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: src/content/docs/waf/managed-rules/reference/exposed-credentials-check.mdx
+43-45Lines changed: 43 additions & 45 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -52,64 +52,38 @@ To enable the Cloudflare Exposed Credentials Check Managed Ruleset for a given z
52
52
53
53
This example deploys the Cloudflare Exposed Credentials Check Managed Ruleset to the `http_request_firewall_managed` phase of a given zone (`{zone_id}`) by creating a rule that executes the managed ruleset. The rules in the managed ruleset are executed for all incoming requests.
54
54
55
-
1.Search for an existing [entry point ruleset](/ruleset-engine/about/rulesets/#entry-point-ruleset) for the `http_request_firewall_managed` phase using the [List zone rulesets](/api/operations/listZoneRulesets) operation and take note of the ruleset ID. This ruleset, if it exists, has the following properties: `"kind": "zone"`and`"phase": "http_request_firewall_managed"`.
55
+
1.Invoke the [Get a zone entry point ruleset](/api/operations/getZoneEntrypointRuleset) operation to obtain the definition of the entry point ruleset for the `http_request_firewall_managed` phase. You will need the [zone ID](/fundamentals/setup/find-account-and-zone-ids/) for this task.
2. If the entry point ruleset does not exist, create it using the [Create a zone ruleset](/api/operations/createZoneRuleset) operation. Include a single rule in the `rules` array that executes the [Cloudflare Exposed Credentials Check Managed Ruleset](/waf/managed-rules/reference/cloudflare-managed-ruleset/) (with ID <RuleIDid="c2e184081120413c86c3ab7e14069605" />) for all incoming requests in the zone.
"description": "Entry point ruleset for WAF managed rulesets",
93
-
"kind": "zone",
94
-
"phase": "http_request_firewall_managed",
95
-
"rules": [
96
-
{
97
-
"action": "execute",
98
-
"action_parameters": {
99
-
"id": "c2e184081120413c86c3ab7e14069605"
100
-
},
101
-
"expression": "true",
102
-
"description": "Execute the Cloudflare Exposed Credentials Check Managed Ruleset"
103
-
}
104
-
]
105
-
}'
106
-
```
107
-
108
-
If the entry point ruleset already exists, add a rule to this ruleset (with ID `{ruleset_id}`) using the [Create a zone ruleset rule](/api/operations/createZoneRulesetRule) operation. This rule executes the Cloudflare Exposed Credentials Check Managed Ruleset (with ID <RuleIDid="c2e184081120413c86c3ab7e14069605" />) for all incoming requests in the zone.
83
+
2. If the entry point ruleset already exists (that is, if you received a `200 OK` status code and the ruleset definition), take note of the ruleset ID in the response. Then, invoke the [Create a zone ruleset rule](/api/operations/createZoneRulesetRule) operation to add an `execute` rule to the existing ruleset deploying the [Cloudflare Exposed Credentials Check Managed Ruleset](/waf/managed-rules/reference/exposed-credentials-check/) (with ID <RuleIDid="c2e184081120413c86c3ab7e14069605" />). By default, the rule will be added at the end of the list of rules already in the ruleset.
@@ -129,7 +103,7 @@ This example deploys the Cloudflare Exposed Credentials Check Managed Ruleset to
129
103
"name": "Zone-level phase entry point",
130
104
"description": "",
131
105
"kind": "zone",
132
-
"version": "3",
106
+
"version": "11",
133
107
"rules": [
134
108
// ... any existing rules
135
109
{
@@ -156,6 +130,30 @@ This example deploys the Cloudflare Exposed Credentials Check Managed Ruleset to
156
130
}
157
131
```
158
132
133
+
3. If the entry point ruleset does not exist (that is, if you received a `404 Not Found` status code in step 1), create it using the [Create a zone ruleset](/api/operations/createZoneRuleset) operation. Include a single rule in the `rules` array that executes the [Cloudflare Exposed Credentials Check Managed Ruleset](/waf/managed-rules/reference/exposed-credentials-check/) (with ID <RuleIDid="c2e184081120413c86c3ab7e14069605" />) for all incoming requests in the zone.
"description": "Entry point ruleset for WAF managed rulesets",
142
+
"kind": "zone",
143
+
"phase": "http_request_firewall_managed",
144
+
"rules": [
145
+
{
146
+
"action": "execute",
147
+
"action_parameters": {
148
+
"id": "c2e184081120413c86c3ab7e14069605"
149
+
},
150
+
"expression": "true",
151
+
"description": "Execute the Cloudflare Exposed Credentials Check Managed Ruleset"
152
+
}
153
+
]
154
+
}'
155
+
```
156
+
159
157
### Next steps
160
158
161
159
To configure the Exposed Credentials Check Managed Ruleset via API, create [overrides](/ruleset-engine/managed-rulesets/override-managed-ruleset/) using the Rulesets API. You can perform the following configurations:
Copy file name to clipboardExpand all lines: src/content/docs/waf/managed-rules/reference/sensitive-data-detection.mdx
+44-46Lines changed: 44 additions & 46 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -48,64 +48,38 @@ To enable Cloudflare Sensitive Data Detection for a given zone using the API, cr
48
48
49
49
This example deploys the Cloudflare Sensitive Data Detection managed ruleset to the `http_response_firewall_managed` phase of a given zone (`{zone_id}`) by creating a rule that executes the managed ruleset. The rules in the managed ruleset are executed for all incoming requests.
50
50
51
-
1.Search for an existing [entry point ruleset](/ruleset-engine/about/rulesets/#entry-point-ruleset) for the `http_response_firewall_managed` phase using the [List zone rulesets](/api/operations/listZoneRulesets) operation and take note of the ruleset ID. This ruleset, if it exists, has the following properties: `"kind": "zone"`and`"phase": "http_response_firewall_managed"`.
51
+
1.Invoke the [Get a zone entry point ruleset](/api/operations/getZoneEntrypointRuleset) operation to obtain the definition of the entry point ruleset for the `http_response_firewall_managed` phase. You will need the [zone ID](/fundamentals/setup/find-account-and-zone-ids/) for this task.
"description": "Zone-level phase entry point (response)",
62
+
"id": "<RULESET_ID>",
63
+
"kind": "zone",
64
+
"last_updated": "2024-03-16T15:40:08.202335Z",
65
+
"name": "zone",
66
+
"phase": "http_response_firewall_managed",
67
+
"rules": [
68
+
// ...
69
+
],
70
+
"source": "firewall_managed",
71
+
"version": "10"
72
+
},
74
73
"success": true,
75
74
"errors": [],
76
75
"messages": []
77
76
}
78
77
```
79
78
80
-
2. If the entry point ruleset does not exist, create it using the [Create a zone ruleset](/api/operations/createZoneRuleset) operation. Include a single rule in the `rules` array that executes the [Cloudflare Sensitive Data Detection managed ruleset](/waf/managed-rules/reference/cloudflare-managed-ruleset/) (with ID <RuleIDid="e22d83c647c64a3eae91b71b499d988e" />) for all incoming requests in the zone.
"description": "Entry point ruleset for WAF managed rulesets (response)",
89
-
"kind": "zone",
90
-
"phase": "http_response_firewall_managed",
91
-
"rules": [
92
-
{
93
-
"action": "execute",
94
-
"action_parameters": {
95
-
"id": "e22d83c647c64a3eae91b71b499d988e"
96
-
},
97
-
"expression": "true",
98
-
"description": "Execute the Cloudflare Sensitive Data Detection managed ruleset"
99
-
}
100
-
]
101
-
}'
102
-
```
103
-
104
-
If the entry point ruleset already exists, add a rule to this ruleset (with ID `{ruleset_id}`) using the [Create a zone ruleset rule](/api/operations/createZoneRulesetRule) operation. This rule executes the Cloudflare Sensitive Data Detection managed ruleset (with ID <RuleIDid="e22d83c647c64a3eae91b71b499d988e" />) for all incoming requests in the zone.
79
+
2. If the entry point ruleset already exists (that is, if you received a `200 OK` status code and the ruleset definition), take note of the ruleset ID in the response. Then, invoke the [Create a zone ruleset rule](/api/operations/createZoneRulesetRule) operation to add an `execute` rule to the existing ruleset deploying the [Cloudflare Sensitive Data Detection managed ruleset](/waf/managed-rules/reference/sensitive-data-detection/) (with ID <RuleIDid="e22d83c647c64a3eae91b71b499d988e" />). By default, the rule will be added at the end of the list of rules already in the ruleset.
@@ -122,10 +96,10 @@ This example deploys the Cloudflare Sensitive Data Detection managed ruleset to
122
96
{
123
97
"result": {
124
98
"id": "<RULESET_ID>",
125
-
"name": "Zone-level phase entry point",
99
+
"name": "Zone-level phase entry point (response)",
126
100
"description": "",
127
101
"kind": "zone",
128
-
"version": "3",
102
+
"version": "11",
129
103
"rules": [
130
104
// ... any existing rules
131
105
{
@@ -152,6 +126,30 @@ This example deploys the Cloudflare Sensitive Data Detection managed ruleset to
152
126
}
153
127
```
154
128
129
+
3. If the entry point ruleset does not exist (that is, if you received a `404 Not Found` status code in step 1), create it using the [Create a zone ruleset](/api/operations/createZoneRuleset) operation. Include a single rule in the `rules` array that executes the [Cloudflare Sensitive Data Detection managed ruleset](/waf/managed-rules/reference/sensitive-data-detection/) (with ID <RuleIDid="e22d83c647c64a3eae91b71b499d988e" />) for all incoming requests in the zone.
"description": "Entry point ruleset for WAF managed rulesets (response)",
138
+
"kind": "zone",
139
+
"phase": "http_response_firewall_managed",
140
+
"rules": [
141
+
{
142
+
"action": "execute",
143
+
"action_parameters": {
144
+
"id": "e22d83c647c64a3eae91b71b499d988e"
145
+
},
146
+
"expression": "true",
147
+
"description": "Execute the Cloudflare Sensitive Data Detection managed ruleset"
148
+
}
149
+
]
150
+
}'
151
+
```
152
+
155
153
### Next steps
156
154
157
155
To configure Cloudflare Sensitive Data Detection using the API, create [overrides](/ruleset-engine/managed-rulesets/override-managed-ruleset/) using the Rulesets API. You can perform the following configurations:
0 commit comments