Skip to content

Commit fd3414c

Browse files
committed
docs: add jwt protection
1 parent 4d57ca1 commit fd3414c

File tree

3 files changed

+110
-94
lines changed

3 files changed

+110
-94
lines changed

content/nap-waf/v5/configuration-guide/configuration.md

Lines changed: 0 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1100,7 +1100,6 @@ In the cases where decompression fails, NGINX App Protect WAF will continue wit
11001100

11011101
{{< include "nap-waf/config/common/supported-violations.md" >}}
11021102

1103-
11041103
### HTTP Compliance Sub-Violations
11051104

11061105
{{< include "nap-waf/config/common/http-compliance-subviolations.md" >}}

content/waf/policies/configuration.md

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -348,9 +348,9 @@ Individual security features can be defined as blocked or transparent in the pol
348348

349349
### Enabling violations
350350

351-
Adding and enabling additional security features to the policy can be done by specifying the violation name and the `alarm` block state to `true`.
351+
Adding and enabling additional security features to the policy can be done by specifying the violation name and the `alarm` block state to `true`.
352352

353-
To set different states for sub-violations within the violation, enable the violation first, then specifying and configure the sub-violations.
353+
To set different states for sub-violations within the violation, enable the violation first, then specifying and configure the sub-violations.
354354

355355
A violation may have its own section that provides additional configuration granularity for a specific violation/sub-violation.
356356

@@ -364,7 +364,7 @@ It is determined by the combination of the [signature sets]({{< ref "/waf/polici
364364

365365
In this example, we enable a violation and a sub-violation: `VIOL_JSON_FORMAT` and `VIOL_PARAMETER_VALUE_METACHAR`.
366366

367-
The example defines the blocking and alarm setting for each violation. These settings override the default configuration set above in the `enforcementMode` directive.
367+
The example defines the blocking and alarm setting for each violation. These settings override the default configuration set above in the `enforcementMode` directive.
368368

369369
Be aware, however, that in a transparent policy no violations are blocked, even if specific violations are set to `block: true` in the configuration.
370370

0 commit comments

Comments
 (0)