Oracle Cloud Infrastructure v2.27.0 published on Thursday, Mar 20, 2025 by Pulumi
oci.Waas.getWaasPolicies
Explore with Pulumi AI
This data source provides the list of Waas Policies in Oracle Cloud Infrastructure Web Application Acceleration and Security service.
Gets a list of WAAS policies.
Example Usage
import * as pulumi from "@pulumi/pulumi";
import * as oci from "@pulumi/oci";
const testWaasPolicies = oci.Waas.getWaasPolicies({
    compartmentId: compartmentId,
    displayNames: waasPolicyDisplayNames,
    ids: waasPolicyIds,
    states: waasPolicyStates,
    timeCreatedGreaterThanOrEqualTo: waasPolicyTimeCreatedGreaterThanOrEqualTo,
    timeCreatedLessThan: waasPolicyTimeCreatedLessThan,
});
import pulumi
import pulumi_oci as oci
test_waas_policies = oci.Waas.get_waas_policies(compartment_id=compartment_id,
    display_names=waas_policy_display_names,
    ids=waas_policy_ids,
    states=waas_policy_states,
    time_created_greater_than_or_equal_to=waas_policy_time_created_greater_than_or_equal_to,
    time_created_less_than=waas_policy_time_created_less_than)
package main
import (
	"github.com/pulumi/pulumi-oci/sdk/v2/go/oci/waas"
	"github.com/pulumi/pulumi/sdk/v3/go/pulumi"
)
func main() {
	pulumi.Run(func(ctx *pulumi.Context) error {
		_, err := waas.GetWaasPolicies(ctx, &waas.GetWaasPoliciesArgs{
			CompartmentId:                   compartmentId,
			DisplayNames:                    waasPolicyDisplayNames,
			Ids:                             waasPolicyIds,
			States:                          waasPolicyStates,
			TimeCreatedGreaterThanOrEqualTo: pulumi.StringRef(waasPolicyTimeCreatedGreaterThanOrEqualTo),
			TimeCreatedLessThan:             pulumi.StringRef(waasPolicyTimeCreatedLessThan),
		}, nil)
		if err != nil {
			return err
		}
		return nil
	})
}
using System.Collections.Generic;
using System.Linq;
using Pulumi;
using Oci = Pulumi.Oci;
return await Deployment.RunAsync(() => 
{
    var testWaasPolicies = Oci.Waas.GetWaasPolicies.Invoke(new()
    {
        CompartmentId = compartmentId,
        DisplayNames = waasPolicyDisplayNames,
        Ids = waasPolicyIds,
        States = waasPolicyStates,
        TimeCreatedGreaterThanOrEqualTo = waasPolicyTimeCreatedGreaterThanOrEqualTo,
        TimeCreatedLessThan = waasPolicyTimeCreatedLessThan,
    });
});
package generated_program;
import com.pulumi.Context;
import com.pulumi.Pulumi;
import com.pulumi.core.Output;
import com.pulumi.oci.Waas.WaasFunctions;
import com.pulumi.oci.Waas.inputs.GetWaasPoliciesArgs;
import java.util.List;
import java.util.ArrayList;
import java.util.Map;
import java.io.File;
import java.nio.file.Files;
import java.nio.file.Paths;
public class App {
    public static void main(String[] args) {
        Pulumi.run(App::stack);
    }
    public static void stack(Context ctx) {
        final var testWaasPolicies = WaasFunctions.getWaasPolicies(GetWaasPoliciesArgs.builder()
            .compartmentId(compartmentId)
            .displayNames(waasPolicyDisplayNames)
            .ids(waasPolicyIds)
            .states(waasPolicyStates)
            .timeCreatedGreaterThanOrEqualTo(waasPolicyTimeCreatedGreaterThanOrEqualTo)
            .timeCreatedLessThan(waasPolicyTimeCreatedLessThan)
            .build());
    }
}
variables:
  testWaasPolicies:
    fn::invoke:
      function: oci:Waas:getWaasPolicies
      arguments:
        compartmentId: ${compartmentId}
        displayNames: ${waasPolicyDisplayNames}
        ids: ${waasPolicyIds}
        states: ${waasPolicyStates}
        timeCreatedGreaterThanOrEqualTo: ${waasPolicyTimeCreatedGreaterThanOrEqualTo}
        timeCreatedLessThan: ${waasPolicyTimeCreatedLessThan}
Using getWaasPolicies
Two invocation forms are available. The direct form accepts plain arguments and either blocks until the result value is available, or returns a Promise-wrapped result. The output form accepts Input-wrapped arguments and returns an Output-wrapped result.
function getWaasPolicies(args: GetWaasPoliciesArgs, opts?: InvokeOptions): Promise<GetWaasPoliciesResult>
function getWaasPoliciesOutput(args: GetWaasPoliciesOutputArgs, opts?: InvokeOptions): Output<GetWaasPoliciesResult>def get_waas_policies(compartment_id: Optional[str] = None,
                      display_names: Optional[Sequence[str]] = None,
                      filters: Optional[Sequence[_waas.GetWaasPoliciesFilter]] = None,
                      ids: Optional[Sequence[str]] = None,
                      states: Optional[Sequence[str]] = None,
                      time_created_greater_than_or_equal_to: Optional[str] = None,
                      time_created_less_than: Optional[str] = None,
                      opts: Optional[InvokeOptions] = None) -> GetWaasPoliciesResult
def get_waas_policies_output(compartment_id: Optional[pulumi.Input[str]] = None,
                      display_names: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
                      filters: Optional[pulumi.Input[Sequence[pulumi.Input[_waas.GetWaasPoliciesFilterArgs]]]] = None,
                      ids: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
                      states: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
                      time_created_greater_than_or_equal_to: Optional[pulumi.Input[str]] = None,
                      time_created_less_than: Optional[pulumi.Input[str]] = None,
                      opts: Optional[InvokeOptions] = None) -> Output[GetWaasPoliciesResult]func GetWaasPolicies(ctx *Context, args *GetWaasPoliciesArgs, opts ...InvokeOption) (*GetWaasPoliciesResult, error)
func GetWaasPoliciesOutput(ctx *Context, args *GetWaasPoliciesOutputArgs, opts ...InvokeOption) GetWaasPoliciesResultOutput> Note: This function is named GetWaasPolicies in the Go SDK.
public static class GetWaasPolicies 
{
    public static Task<GetWaasPoliciesResult> InvokeAsync(GetWaasPoliciesArgs args, InvokeOptions? opts = null)
    public static Output<GetWaasPoliciesResult> Invoke(GetWaasPoliciesInvokeArgs args, InvokeOptions? opts = null)
}public static CompletableFuture<GetWaasPoliciesResult> getWaasPolicies(GetWaasPoliciesArgs args, InvokeOptions options)
public static Output<GetWaasPoliciesResult> getWaasPolicies(GetWaasPoliciesArgs args, InvokeOptions options)
fn::invoke:
  function: oci:Waas/getWaasPolicies:getWaasPolicies
  arguments:
    # arguments dictionaryThe following arguments are supported:
- CompartmentId string
- The OCID of the compartment. This number is generated when the compartment is created.
- DisplayNames List<string>
- Filter policies using a list of display names.
- Filters
List<GetWaas Policies Filter> 
- Ids List<string>
- Filter policies using a list of policy OCIDs.
- States List<string>
- Filter policies using a list of lifecycle states.
- TimeCreated stringGreater Than Or Equal To 
- A filter that matches policies created on or after the specified date and time.
- TimeCreated stringLess Than 
- A filter that matches policies created before the specified date-time.
- CompartmentId string
- The OCID of the compartment. This number is generated when the compartment is created.
- DisplayNames []string
- Filter policies using a list of display names.
- Filters
[]GetWaas Policies Filter 
- Ids []string
- Filter policies using a list of policy OCIDs.
- States []string
- Filter policies using a list of lifecycle states.
- TimeCreated stringGreater Than Or Equal To 
- A filter that matches policies created on or after the specified date and time.
- TimeCreated stringLess Than 
- A filter that matches policies created before the specified date-time.
- compartmentId String
- The OCID of the compartment. This number is generated when the compartment is created.
- displayNames List<String>
- Filter policies using a list of display names.
- filters
List<GetPolicies Filter> 
- ids List<String>
- Filter policies using a list of policy OCIDs.
- states List<String>
- Filter policies using a list of lifecycle states.
- timeCreated StringGreater Than Or Equal To 
- A filter that matches policies created on or after the specified date and time.
- timeCreated StringLess Than 
- A filter that matches policies created before the specified date-time.
- compartmentId string
- The OCID of the compartment. This number is generated when the compartment is created.
- displayNames string[]
- Filter policies using a list of display names.
- filters
GetWaas Policies Filter[] 
- ids string[]
- Filter policies using a list of policy OCIDs.
- states string[]
- Filter policies using a list of lifecycle states.
- timeCreated stringGreater Than Or Equal To 
- A filter that matches policies created on or after the specified date and time.
- timeCreated stringLess Than 
- A filter that matches policies created before the specified date-time.
- compartment_id str
- The OCID of the compartment. This number is generated when the compartment is created.
- display_names Sequence[str]
- Filter policies using a list of display names.
- filters
Sequence[waas.Get Waas Policies Filter] 
- ids Sequence[str]
- Filter policies using a list of policy OCIDs.
- states Sequence[str]
- Filter policies using a list of lifecycle states.
- time_created_ strgreater_ than_ or_ equal_ to 
- A filter that matches policies created on or after the specified date and time.
- time_created_ strless_ than 
- A filter that matches policies created before the specified date-time.
- compartmentId String
- The OCID of the compartment. This number is generated when the compartment is created.
- displayNames List<String>
- Filter policies using a list of display names.
- filters List<Property Map>
- ids List<String>
- Filter policies using a list of policy OCIDs.
- states List<String>
- Filter policies using a list of lifecycle states.
- timeCreated StringGreater Than Or Equal To 
- A filter that matches policies created on or after the specified date and time.
- timeCreated StringLess Than 
- A filter that matches policies created before the specified date-time.
getWaasPolicies Result
The following output properties are available:
- CompartmentId string
- The OCID of the WAAS policy's compartment.
- Id string
- The provider-assigned unique ID for this managed resource.
- WaasPolicies List<GetWaas Policies Waas Policy> 
- The list of waas_policies.
- DisplayNames List<string>
- Filters
List<GetWaas Policies Filter> 
- Ids List<string>
- States List<string>
- TimeCreated stringGreater Than Or Equal To 
- TimeCreated stringLess Than 
- CompartmentId string
- The OCID of the WAAS policy's compartment.
- Id string
- The provider-assigned unique ID for this managed resource.
- WaasPolicies []GetWaas Policies Waas Policy 
- The list of waas_policies.
- DisplayNames []string
- Filters
[]GetWaas Policies Filter 
- Ids []string
- States []string
- TimeCreated stringGreater Than Or Equal To 
- TimeCreated stringLess Than 
- compartmentId String
- The OCID of the WAAS policy's compartment.
- id String
- The provider-assigned unique ID for this managed resource.
- waasPolicies List<GetPolicies Policy> 
- The list of waas_policies.
- displayNames List<String>
- filters
List<GetPolicies Filter> 
- ids List<String>
- states List<String>
- timeCreated StringGreater Than Or Equal To 
- timeCreated StringLess Than 
- compartmentId string
- The OCID of the WAAS policy's compartment.
- id string
- The provider-assigned unique ID for this managed resource.
- waasPolicies GetWaas Policies Waas Policy[] 
- The list of waas_policies.
- displayNames string[]
- filters
GetWaas Policies Filter[] 
- ids string[]
- states string[]
- timeCreated stringGreater Than Or Equal To 
- timeCreated stringLess Than 
- compartment_id str
- The OCID of the WAAS policy's compartment.
- id str
- The provider-assigned unique ID for this managed resource.
- waas_policies Sequence[waas.Get Waas Policies Waas Policy] 
- The list of waas_policies.
- display_names Sequence[str]
- filters
Sequence[waas.Get Waas Policies Filter] 
- ids Sequence[str]
- states Sequence[str]
- time_created_ strgreater_ than_ or_ equal_ to 
- time_created_ strless_ than 
- compartmentId String
- The OCID of the WAAS policy's compartment.
- id String
- The provider-assigned unique ID for this managed resource.
- waasPolicies List<Property Map>
- The list of waas_policies.
- displayNames List<String>
- filters List<Property Map>
- ids List<String>
- states List<String>
- timeCreated StringGreater Than Or Equal To 
- timeCreated StringLess Than 
Supporting Types
GetWaasPoliciesFilter   
GetWaasPoliciesWaasPolicy    
- AdditionalDomains List<string>
- An array of additional domains for this web application.
- Cname string
- The CNAME record to add to your DNS configuration to route traffic for the domain, and all additional domains, through the WAF.
- CompartmentId string
- The OCID of the compartment. This number is generated when the compartment is created.
- Dictionary<string, string>
- Defined tags for this resource. Each key is predefined and scoped to a namespace. For more information, see Resource Tags. Example: {"Operations.CostCenter": "42"}
- DisplayName string
- The user-friendly name of the WAAS policy. The name can be changed and does not need to be unique.
- Domain string
- The domain for which the cookie is set, defaults to WAAS policy domain.
- Dictionary<string, string>
- Free-form tags for this resource. Each tag is a simple key-value pair with no predefined name, type, or namespace. For more information, see Resource Tags. Example: {"Department": "Finance"}
- Id string
- The OCID of the custom protection rule.
- OriginGroups List<GetWaas Policies Waas Policy Origin Group> 
- The map of origin groups and their keys used to associate origins to the wafConfig. Origin groups allow you to apply weights to groups of origins for load balancing purposes. Origins with higher weights will receive larger proportions of client requests. To add additional origins to your WAAS policy, update theoriginsfield of aUpdateWaasPolicyrequest.
- Origins
List<GetWaas Policies Waas Policy Origin> 
- A map of host servers (origins) and their keys for the web application. Origin keys are used to associate origins to specific protection rules. The key should be a user-friendly name for the host. Examples: primaryorsecondary.
- PolicyConfigs List<GetWaas Policies Waas Policy Policy Config> 
- The configuration details for the WAAS policy.
- State string
- The current lifecycle state of the WAAS policy.
- TimeCreated string
- The date and time the policy was created, expressed in RFC 3339 timestamp format.
- WafConfigs List<GetWaas Policies Waas Policy Waf Config> 
- The Web Application Firewall configuration for the WAAS policy.
- AdditionalDomains []string
- An array of additional domains for this web application.
- Cname string
- The CNAME record to add to your DNS configuration to route traffic for the domain, and all additional domains, through the WAF.
- CompartmentId string
- The OCID of the compartment. This number is generated when the compartment is created.
- map[string]string
- Defined tags for this resource. Each key is predefined and scoped to a namespace. For more information, see Resource Tags. Example: {"Operations.CostCenter": "42"}
- DisplayName string
- The user-friendly name of the WAAS policy. The name can be changed and does not need to be unique.
- Domain string
- The domain for which the cookie is set, defaults to WAAS policy domain.
- map[string]string
- Free-form tags for this resource. Each tag is a simple key-value pair with no predefined name, type, or namespace. For more information, see Resource Tags. Example: {"Department": "Finance"}
- Id string
- The OCID of the custom protection rule.
- OriginGroups []GetWaas Policies Waas Policy Origin Group 
- The map of origin groups and their keys used to associate origins to the wafConfig. Origin groups allow you to apply weights to groups of origins for load balancing purposes. Origins with higher weights will receive larger proportions of client requests. To add additional origins to your WAAS policy, update theoriginsfield of aUpdateWaasPolicyrequest.
- Origins
[]GetWaas Policies Waas Policy Origin 
- A map of host servers (origins) and their keys for the web application. Origin keys are used to associate origins to specific protection rules. The key should be a user-friendly name for the host. Examples: primaryorsecondary.
- PolicyConfigs []GetWaas Policies Waas Policy Policy Config 
- The configuration details for the WAAS policy.
- State string
- The current lifecycle state of the WAAS policy.
- TimeCreated string
- The date and time the policy was created, expressed in RFC 3339 timestamp format.
- WafConfigs []GetWaas Policies Waas Policy Waf Config 
- The Web Application Firewall configuration for the WAAS policy.
- additionalDomains List<String>
- An array of additional domains for this web application.
- cname String
- The CNAME record to add to your DNS configuration to route traffic for the domain, and all additional domains, through the WAF.
- compartmentId String
- The OCID of the compartment. This number is generated when the compartment is created.
- Map<String,String>
- Defined tags for this resource. Each key is predefined and scoped to a namespace. For more information, see Resource Tags. Example: {"Operations.CostCenter": "42"}
- displayName String
- The user-friendly name of the WAAS policy. The name can be changed and does not need to be unique.
- domain String
- The domain for which the cookie is set, defaults to WAAS policy domain.
- Map<String,String>
- Free-form tags for this resource. Each tag is a simple key-value pair with no predefined name, type, or namespace. For more information, see Resource Tags. Example: {"Department": "Finance"}
- id String
- The OCID of the custom protection rule.
- originGroups List<GetPolicies Policy Origin Group> 
- The map of origin groups and their keys used to associate origins to the wafConfig. Origin groups allow you to apply weights to groups of origins for load balancing purposes. Origins with higher weights will receive larger proportions of client requests. To add additional origins to your WAAS policy, update theoriginsfield of aUpdateWaasPolicyrequest.
- origins
List<GetPolicies Policy Origin> 
- A map of host servers (origins) and their keys for the web application. Origin keys are used to associate origins to specific protection rules. The key should be a user-friendly name for the host. Examples: primaryorsecondary.
- policyConfigs List<GetPolicies Policy Policy Config> 
- The configuration details for the WAAS policy.
- state String
- The current lifecycle state of the WAAS policy.
- timeCreated String
- The date and time the policy was created, expressed in RFC 3339 timestamp format.
- wafConfigs List<GetPolicies Policy Waf Config> 
- The Web Application Firewall configuration for the WAAS policy.
- additionalDomains string[]
- An array of additional domains for this web application.
- cname string
- The CNAME record to add to your DNS configuration to route traffic for the domain, and all additional domains, through the WAF.
- compartmentId string
- The OCID of the compartment. This number is generated when the compartment is created.
- {[key: string]: string}
- Defined tags for this resource. Each key is predefined and scoped to a namespace. For more information, see Resource Tags. Example: {"Operations.CostCenter": "42"}
- displayName string
- The user-friendly name of the WAAS policy. The name can be changed and does not need to be unique.
- domain string
- The domain for which the cookie is set, defaults to WAAS policy domain.
- {[key: string]: string}
- Free-form tags for this resource. Each tag is a simple key-value pair with no predefined name, type, or namespace. For more information, see Resource Tags. Example: {"Department": "Finance"}
- id string
- The OCID of the custom protection rule.
- originGroups GetWaas Policies Waas Policy Origin Group[] 
- The map of origin groups and their keys used to associate origins to the wafConfig. Origin groups allow you to apply weights to groups of origins for load balancing purposes. Origins with higher weights will receive larger proportions of client requests. To add additional origins to your WAAS policy, update theoriginsfield of aUpdateWaasPolicyrequest.
- origins
GetWaas Policies Waas Policy Origin[] 
- A map of host servers (origins) and their keys for the web application. Origin keys are used to associate origins to specific protection rules. The key should be a user-friendly name for the host. Examples: primaryorsecondary.
- policyConfigs GetWaas Policies Waas Policy Policy Config[] 
- The configuration details for the WAAS policy.
- state string
- The current lifecycle state of the WAAS policy.
- timeCreated string
- The date and time the policy was created, expressed in RFC 3339 timestamp format.
- wafConfigs GetWaas Policies Waas Policy Waf Config[] 
- The Web Application Firewall configuration for the WAAS policy.
- additional_domains Sequence[str]
- An array of additional domains for this web application.
- cname str
- The CNAME record to add to your DNS configuration to route traffic for the domain, and all additional domains, through the WAF.
- compartment_id str
- The OCID of the compartment. This number is generated when the compartment is created.
- Mapping[str, str]
- Defined tags for this resource. Each key is predefined and scoped to a namespace. For more information, see Resource Tags. Example: {"Operations.CostCenter": "42"}
- display_name str
- The user-friendly name of the WAAS policy. The name can be changed and does not need to be unique.
- domain str
- The domain for which the cookie is set, defaults to WAAS policy domain.
- Mapping[str, str]
- Free-form tags for this resource. Each tag is a simple key-value pair with no predefined name, type, or namespace. For more information, see Resource Tags. Example: {"Department": "Finance"}
- id str
- The OCID of the custom protection rule.
- origin_groups Sequence[waas.Get Waas Policies Waas Policy Origin Group] 
- The map of origin groups and their keys used to associate origins to the wafConfig. Origin groups allow you to apply weights to groups of origins for load balancing purposes. Origins with higher weights will receive larger proportions of client requests. To add additional origins to your WAAS policy, update theoriginsfield of aUpdateWaasPolicyrequest.
- origins
Sequence[waas.Get Waas Policies Waas Policy Origin] 
- A map of host servers (origins) and their keys for the web application. Origin keys are used to associate origins to specific protection rules. The key should be a user-friendly name for the host. Examples: primaryorsecondary.
- policy_configs Sequence[waas.Get Waas Policies Waas Policy Policy Config] 
- The configuration details for the WAAS policy.
- state str
- The current lifecycle state of the WAAS policy.
- time_created str
- The date and time the policy was created, expressed in RFC 3339 timestamp format.
- waf_configs Sequence[waas.Get Waas Policies Waas Policy Waf Config] 
- The Web Application Firewall configuration for the WAAS policy.
- additionalDomains List<String>
- An array of additional domains for this web application.
- cname String
- The CNAME record to add to your DNS configuration to route traffic for the domain, and all additional domains, through the WAF.
- compartmentId String
- The OCID of the compartment. This number is generated when the compartment is created.
- Map<String>
- Defined tags for this resource. Each key is predefined and scoped to a namespace. For more information, see Resource Tags. Example: {"Operations.CostCenter": "42"}
- displayName String
- The user-friendly name of the WAAS policy. The name can be changed and does not need to be unique.
- domain String
- The domain for which the cookie is set, defaults to WAAS policy domain.
- Map<String>
- Free-form tags for this resource. Each tag is a simple key-value pair with no predefined name, type, or namespace. For more information, see Resource Tags. Example: {"Department": "Finance"}
- id String
- The OCID of the custom protection rule.
- originGroups List<Property Map>
- The map of origin groups and their keys used to associate origins to the wafConfig. Origin groups allow you to apply weights to groups of origins for load balancing purposes. Origins with higher weights will receive larger proportions of client requests. To add additional origins to your WAAS policy, update theoriginsfield of aUpdateWaasPolicyrequest.
- origins List<Property Map>
- A map of host servers (origins) and their keys for the web application. Origin keys are used to associate origins to specific protection rules. The key should be a user-friendly name for the host. Examples: primaryorsecondary.
- policyConfigs List<Property Map>
- The configuration details for the WAAS policy.
- state String
- The current lifecycle state of the WAAS policy.
- timeCreated String
- The date and time the policy was created, expressed in RFC 3339 timestamp format.
- wafConfigs List<Property Map>
- The Web Application Firewall configuration for the WAAS policy.
GetWaasPoliciesWaasPolicyOrigin     
- CustomHeaders List<GetWaas Policies Waas Policy Origin Custom Header> 
- A list of HTTP headers to forward to your origin.
- HttpPort int
- The HTTP port on the origin that the web application listens on. If unspecified, defaults to 80. If0is specified - the origin is not used for HTTP traffic.
- HttpsPort int
- The HTTPS port on the origin that the web application listens on. If unspecified, defaults to 443. If0is specified - the origin is not used for HTTPS traffic.
- Label string
- Uri string
- The URI of the origin. Does not support paths. Port numbers should be specified in the httpPortandhttpsPortfields.
- CustomHeaders []GetWaas Policies Waas Policy Origin Custom Header 
- A list of HTTP headers to forward to your origin.
- HttpPort int
- The HTTP port on the origin that the web application listens on. If unspecified, defaults to 80. If0is specified - the origin is not used for HTTP traffic.
- HttpsPort int
- The HTTPS port on the origin that the web application listens on. If unspecified, defaults to 443. If0is specified - the origin is not used for HTTPS traffic.
- Label string
- Uri string
- The URI of the origin. Does not support paths. Port numbers should be specified in the httpPortandhttpsPortfields.
- customHeaders List<GetPolicies Policy Origin Custom Header> 
- A list of HTTP headers to forward to your origin.
- httpPort Integer
- The HTTP port on the origin that the web application listens on. If unspecified, defaults to 80. If0is specified - the origin is not used for HTTP traffic.
- httpsPort Integer
- The HTTPS port on the origin that the web application listens on. If unspecified, defaults to 443. If0is specified - the origin is not used for HTTPS traffic.
- label String
- uri String
- The URI of the origin. Does not support paths. Port numbers should be specified in the httpPortandhttpsPortfields.
- customHeaders GetWaas Policies Waas Policy Origin Custom Header[] 
- A list of HTTP headers to forward to your origin.
- httpPort number
- The HTTP port on the origin that the web application listens on. If unspecified, defaults to 80. If0is specified - the origin is not used for HTTP traffic.
- httpsPort number
- The HTTPS port on the origin that the web application listens on. If unspecified, defaults to 443. If0is specified - the origin is not used for HTTPS traffic.
- label string
- uri string
- The URI of the origin. Does not support paths. Port numbers should be specified in the httpPortandhttpsPortfields.
- custom_headers Sequence[waas.Get Waas Policies Waas Policy Origin Custom Header] 
- A list of HTTP headers to forward to your origin.
- http_port int
- The HTTP port on the origin that the web application listens on. If unspecified, defaults to 80. If0is specified - the origin is not used for HTTP traffic.
- https_port int
- The HTTPS port on the origin that the web application listens on. If unspecified, defaults to 443. If0is specified - the origin is not used for HTTPS traffic.
- label str
- uri str
- The URI of the origin. Does not support paths. Port numbers should be specified in the httpPortandhttpsPortfields.
- customHeaders List<Property Map>
- A list of HTTP headers to forward to your origin.
- httpPort Number
- The HTTP port on the origin that the web application listens on. If unspecified, defaults to 80. If0is specified - the origin is not used for HTTP traffic.
- httpsPort Number
- The HTTPS port on the origin that the web application listens on. If unspecified, defaults to 443. If0is specified - the origin is not used for HTTPS traffic.
- label String
- uri String
- The URI of the origin. Does not support paths. Port numbers should be specified in the httpPortandhttpsPortfields.
GetWaasPoliciesWaasPolicyOriginCustomHeader       
GetWaasPoliciesWaasPolicyOriginGroup      
GetWaasPoliciesWaasPolicyOriginGroupOriginGroup        
GetWaasPoliciesWaasPolicyPolicyConfig      
- CertificateId string
- The OCID of the SSL certificate to use if HTTPS is supported.
- CipherGroup string
- The set cipher group for the configured TLS protocol. This sets the configuration for the TLS connections between clients and edge nodes only.- DEFAULT: Cipher group supports TLS 1.0, TLS 1.1, TLS 1.2, TLS 1.3 protocols. It has the following ciphers enabled: ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-AES256-GCM-SHA384:DHE-RSA-AES128-GCM-SHA256:DHE-DSS-AES128-GCM-SHA256:kEDH+AESGCM:ECDHE-RSA-AES128-SHA256:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA:ECDHE-ECDSA-AES128-SHA:ECDHE-RSA-AES256-SHA384:ECDHE-ECDSA-AES256-SHA384:ECDHE-RSA-AES256-SHA:ECDHE-ECDSA-AES256-SHA:DHE-RSA-AES128-SHA256:DHE-RSA-AES128-SHA:DHE-DSS-AES128-SHA256:DHE-RSA-AES256-SHA256:DHE-DSS-AES256-SHA:DHE-RSA-AES256-SHA:AES128-GCM-SHA256:AES256-GCM-SHA384:AES128-SHA256:AES256-SHA256:AES128-SHA:AES256-SHA:AES:CAMELLIA:!DES-CBC3-SHA:!aNULL:!eNULL:!EXPORT:!DES:!RC4:!MD5:!PSK:!aECDH:!EDH-DSS-DES-CBC3-SHA:!EDH-RSA-DES-CBC3-SHA:!KRB5-DES-CBC3-SHA
 
- DEFAULT: Cipher group supports TLS 1.0, TLS 1.1, TLS 1.2, TLS 1.3 protocols. It has the following ciphers enabled: 
- ClientAddress stringHeader 
- Specifies an HTTP header name which is treated as the connecting client's IP address. Applicable only if isBehindCdnis enabled.
- HealthChecks List<GetWaas Policies Waas Policy Policy Config Health Check> 
- Health checks monitor the status of your origin servers and only route traffic to the origins that pass the health check. If the health check fails, origin is automatically removed from the load balancing. There is roughly one health check per EDGE POP per period. Any checks that pass will be reported as "healthy".
- IsBehind boolCdn 
- Enabling isBehindCdnallows for the collection of IP addresses from client requests if the WAF is connected to a CDN.
- IsCache boolControl Respected 
- Enable or disable automatic content caching based on the response cache-controlheader. This feature enables the origin to act as a proxy cache. Caching is usually defined usingcache-controlheader. For examplecache-control: max-age=120means that the returned resource is valid for 120 seconds. Caching rules will overwrite this setting.
- IsHttps boolEnabled 
- Enable or disable HTTPS support. If true, a certificateIdis required. If unspecified, defaults tofalse.
- IsHttps boolForced 
- Force HTTP to HTTPS redirection. If unspecified, defaults to false.
- IsOrigin boolCompression Enabled 
- Enable or disable GZIP compression of origin responses. If enabled, the header Accept-Encoding: gzipis sent to origin, otherwise, the emptyAccept-Encoding:header is used.
- IsResponse boolBuffering Enabled 
- Enable or disable buffering of responses from the origin. Buffering improves overall stability in case of network issues, but slightly increases Time To First Byte.
- IsSni boolEnabled 
- SNI stands for Server Name Indication and is an extension of the TLS protocol. It indicates which hostname is being contacted by the browser at the beginning of the 'handshake'-process. This allows a server to connect multiple SSL Certificates to one IP address and port.
- LoadBalancing List<GetMethods Waas Policies Waas Policy Policy Config Load Balancing Method> 
- An object that represents a load balancing method and its properties.
- TlsProtocols List<string>
- A list of allowed TLS protocols. Only applicable when HTTPS support is enabled. The TLS protocol is negotiated while the request is connecting and the most recent protocol supported by both the edge node and client browser will be selected. If no such version exists, the connection will be aborted.- TLS_V1: corresponds to TLS 1.0 specification.
- TLS_V1_1: corresponds to TLS 1.1 specification.
- TLS_V1_2: corresponds to TLS 1.2 specification.
- TLS_V1_3: corresponds to TLS 1.3 specification.
 
- WebsocketPath List<string>Prefixes 
- ModSecurity is not capable to inspect WebSockets. Therefore paths specified here have WAF disabled if Connection request header from the client has the value Upgrade (case insensitive matching) and Upgrade request header has the value websocket (case insensitive matching). Paths matches if the concatenation of request URL path and query starts with the contents of the one of websocketPathPrefixesarray value. In All other cases challenges, like JSC, HIC and etc., remain active.
- CertificateId string
- The OCID of the SSL certificate to use if HTTPS is supported.
- CipherGroup string
- The set cipher group for the configured TLS protocol. This sets the configuration for the TLS connections between clients and edge nodes only.- DEFAULT: Cipher group supports TLS 1.0, TLS 1.1, TLS 1.2, TLS 1.3 protocols. It has the following ciphers enabled: ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-AES256-GCM-SHA384:DHE-RSA-AES128-GCM-SHA256:DHE-DSS-AES128-GCM-SHA256:kEDH+AESGCM:ECDHE-RSA-AES128-SHA256:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA:ECDHE-ECDSA-AES128-SHA:ECDHE-RSA-AES256-SHA384:ECDHE-ECDSA-AES256-SHA384:ECDHE-RSA-AES256-SHA:ECDHE-ECDSA-AES256-SHA:DHE-RSA-AES128-SHA256:DHE-RSA-AES128-SHA:DHE-DSS-AES128-SHA256:DHE-RSA-AES256-SHA256:DHE-DSS-AES256-SHA:DHE-RSA-AES256-SHA:AES128-GCM-SHA256:AES256-GCM-SHA384:AES128-SHA256:AES256-SHA256:AES128-SHA:AES256-SHA:AES:CAMELLIA:!DES-CBC3-SHA:!aNULL:!eNULL:!EXPORT:!DES:!RC4:!MD5:!PSK:!aECDH:!EDH-DSS-DES-CBC3-SHA:!EDH-RSA-DES-CBC3-SHA:!KRB5-DES-CBC3-SHA
 
- DEFAULT: Cipher group supports TLS 1.0, TLS 1.1, TLS 1.2, TLS 1.3 protocols. It has the following ciphers enabled: 
- ClientAddress stringHeader 
- Specifies an HTTP header name which is treated as the connecting client's IP address. Applicable only if isBehindCdnis enabled.
- HealthChecks []GetWaas Policies Waas Policy Policy Config Health Check 
- Health checks monitor the status of your origin servers and only route traffic to the origins that pass the health check. If the health check fails, origin is automatically removed from the load balancing. There is roughly one health check per EDGE POP per period. Any checks that pass will be reported as "healthy".
- IsBehind boolCdn 
- Enabling isBehindCdnallows for the collection of IP addresses from client requests if the WAF is connected to a CDN.
- IsCache boolControl Respected 
- Enable or disable automatic content caching based on the response cache-controlheader. This feature enables the origin to act as a proxy cache. Caching is usually defined usingcache-controlheader. For examplecache-control: max-age=120means that the returned resource is valid for 120 seconds. Caching rules will overwrite this setting.
- IsHttps boolEnabled 
- Enable or disable HTTPS support. If true, a certificateIdis required. If unspecified, defaults tofalse.
- IsHttps boolForced 
- Force HTTP to HTTPS redirection. If unspecified, defaults to false.
- IsOrigin boolCompression Enabled 
- Enable or disable GZIP compression of origin responses. If enabled, the header Accept-Encoding: gzipis sent to origin, otherwise, the emptyAccept-Encoding:header is used.
- IsResponse boolBuffering Enabled 
- Enable or disable buffering of responses from the origin. Buffering improves overall stability in case of network issues, but slightly increases Time To First Byte.
- IsSni boolEnabled 
- SNI stands for Server Name Indication and is an extension of the TLS protocol. It indicates which hostname is being contacted by the browser at the beginning of the 'handshake'-process. This allows a server to connect multiple SSL Certificates to one IP address and port.
- LoadBalancing []GetMethods Waas Policies Waas Policy Policy Config Load Balancing Method 
- An object that represents a load balancing method and its properties.
- TlsProtocols []string
- A list of allowed TLS protocols. Only applicable when HTTPS support is enabled. The TLS protocol is negotiated while the request is connecting and the most recent protocol supported by both the edge node and client browser will be selected. If no such version exists, the connection will be aborted.- TLS_V1: corresponds to TLS 1.0 specification.
- TLS_V1_1: corresponds to TLS 1.1 specification.
- TLS_V1_2: corresponds to TLS 1.2 specification.
- TLS_V1_3: corresponds to TLS 1.3 specification.
 
- WebsocketPath []stringPrefixes 
- ModSecurity is not capable to inspect WebSockets. Therefore paths specified here have WAF disabled if Connection request header from the client has the value Upgrade (case insensitive matching) and Upgrade request header has the value websocket (case insensitive matching). Paths matches if the concatenation of request URL path and query starts with the contents of the one of websocketPathPrefixesarray value. In All other cases challenges, like JSC, HIC and etc., remain active.
- certificateId String
- The OCID of the SSL certificate to use if HTTPS is supported.
- cipherGroup String
- The set cipher group for the configured TLS protocol. This sets the configuration for the TLS connections between clients and edge nodes only.- DEFAULT: Cipher group supports TLS 1.0, TLS 1.1, TLS 1.2, TLS 1.3 protocols. It has the following ciphers enabled: ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-AES256-GCM-SHA384:DHE-RSA-AES128-GCM-SHA256:DHE-DSS-AES128-GCM-SHA256:kEDH+AESGCM:ECDHE-RSA-AES128-SHA256:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA:ECDHE-ECDSA-AES128-SHA:ECDHE-RSA-AES256-SHA384:ECDHE-ECDSA-AES256-SHA384:ECDHE-RSA-AES256-SHA:ECDHE-ECDSA-AES256-SHA:DHE-RSA-AES128-SHA256:DHE-RSA-AES128-SHA:DHE-DSS-AES128-SHA256:DHE-RSA-AES256-SHA256:DHE-DSS-AES256-SHA:DHE-RSA-AES256-SHA:AES128-GCM-SHA256:AES256-GCM-SHA384:AES128-SHA256:AES256-SHA256:AES128-SHA:AES256-SHA:AES:CAMELLIA:!DES-CBC3-SHA:!aNULL:!eNULL:!EXPORT:!DES:!RC4:!MD5:!PSK:!aECDH:!EDH-DSS-DES-CBC3-SHA:!EDH-RSA-DES-CBC3-SHA:!KRB5-DES-CBC3-SHA
 
- DEFAULT: Cipher group supports TLS 1.0, TLS 1.1, TLS 1.2, TLS 1.3 protocols. It has the following ciphers enabled: 
- clientAddress StringHeader 
- Specifies an HTTP header name which is treated as the connecting client's IP address. Applicable only if isBehindCdnis enabled.
- healthChecks List<GetPolicies Policy Policy Config Health Check> 
- Health checks monitor the status of your origin servers and only route traffic to the origins that pass the health check. If the health check fails, origin is automatically removed from the load balancing. There is roughly one health check per EDGE POP per period. Any checks that pass will be reported as "healthy".
- isBehind BooleanCdn 
- Enabling isBehindCdnallows for the collection of IP addresses from client requests if the WAF is connected to a CDN.
- isCache BooleanControl Respected 
- Enable or disable automatic content caching based on the response cache-controlheader. This feature enables the origin to act as a proxy cache. Caching is usually defined usingcache-controlheader. For examplecache-control: max-age=120means that the returned resource is valid for 120 seconds. Caching rules will overwrite this setting.
- isHttps BooleanEnabled 
- Enable or disable HTTPS support. If true, a certificateIdis required. If unspecified, defaults tofalse.
- isHttps BooleanForced 
- Force HTTP to HTTPS redirection. If unspecified, defaults to false.
- isOrigin BooleanCompression Enabled 
- Enable or disable GZIP compression of origin responses. If enabled, the header Accept-Encoding: gzipis sent to origin, otherwise, the emptyAccept-Encoding:header is used.
- isResponse BooleanBuffering Enabled 
- Enable or disable buffering of responses from the origin. Buffering improves overall stability in case of network issues, but slightly increases Time To First Byte.
- isSni BooleanEnabled 
- SNI stands for Server Name Indication and is an extension of the TLS protocol. It indicates which hostname is being contacted by the browser at the beginning of the 'handshake'-process. This allows a server to connect multiple SSL Certificates to one IP address and port.
- loadBalancing List<GetMethods Policies Policy Policy Config Load Balancing Method> 
- An object that represents a load balancing method and its properties.
- tlsProtocols List<String>
- A list of allowed TLS protocols. Only applicable when HTTPS support is enabled. The TLS protocol is negotiated while the request is connecting and the most recent protocol supported by both the edge node and client browser will be selected. If no such version exists, the connection will be aborted.- TLS_V1: corresponds to TLS 1.0 specification.
- TLS_V1_1: corresponds to TLS 1.1 specification.
- TLS_V1_2: corresponds to TLS 1.2 specification.
- TLS_V1_3: corresponds to TLS 1.3 specification.
 
- websocketPath List<String>Prefixes 
- ModSecurity is not capable to inspect WebSockets. Therefore paths specified here have WAF disabled if Connection request header from the client has the value Upgrade (case insensitive matching) and Upgrade request header has the value websocket (case insensitive matching). Paths matches if the concatenation of request URL path and query starts with the contents of the one of websocketPathPrefixesarray value. In All other cases challenges, like JSC, HIC and etc., remain active.
- certificateId string
- The OCID of the SSL certificate to use if HTTPS is supported.
- cipherGroup string
- The set cipher group for the configured TLS protocol. This sets the configuration for the TLS connections between clients and edge nodes only.- DEFAULT: Cipher group supports TLS 1.0, TLS 1.1, TLS 1.2, TLS 1.3 protocols. It has the following ciphers enabled: ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-AES256-GCM-SHA384:DHE-RSA-AES128-GCM-SHA256:DHE-DSS-AES128-GCM-SHA256:kEDH+AESGCM:ECDHE-RSA-AES128-SHA256:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA:ECDHE-ECDSA-AES128-SHA:ECDHE-RSA-AES256-SHA384:ECDHE-ECDSA-AES256-SHA384:ECDHE-RSA-AES256-SHA:ECDHE-ECDSA-AES256-SHA:DHE-RSA-AES128-SHA256:DHE-RSA-AES128-SHA:DHE-DSS-AES128-SHA256:DHE-RSA-AES256-SHA256:DHE-DSS-AES256-SHA:DHE-RSA-AES256-SHA:AES128-GCM-SHA256:AES256-GCM-SHA384:AES128-SHA256:AES256-SHA256:AES128-SHA:AES256-SHA:AES:CAMELLIA:!DES-CBC3-SHA:!aNULL:!eNULL:!EXPORT:!DES:!RC4:!MD5:!PSK:!aECDH:!EDH-DSS-DES-CBC3-SHA:!EDH-RSA-DES-CBC3-SHA:!KRB5-DES-CBC3-SHA
 
- DEFAULT: Cipher group supports TLS 1.0, TLS 1.1, TLS 1.2, TLS 1.3 protocols. It has the following ciphers enabled: 
- clientAddress stringHeader 
- Specifies an HTTP header name which is treated as the connecting client's IP address. Applicable only if isBehindCdnis enabled.
- healthChecks GetWaas Policies Waas Policy Policy Config Health Check[] 
- Health checks monitor the status of your origin servers and only route traffic to the origins that pass the health check. If the health check fails, origin is automatically removed from the load balancing. There is roughly one health check per EDGE POP per period. Any checks that pass will be reported as "healthy".
- isBehind booleanCdn 
- Enabling isBehindCdnallows for the collection of IP addresses from client requests if the WAF is connected to a CDN.
- isCache booleanControl Respected 
- Enable or disable automatic content caching based on the response cache-controlheader. This feature enables the origin to act as a proxy cache. Caching is usually defined usingcache-controlheader. For examplecache-control: max-age=120means that the returned resource is valid for 120 seconds. Caching rules will overwrite this setting.
- isHttps booleanEnabled 
- Enable or disable HTTPS support. If true, a certificateIdis required. If unspecified, defaults tofalse.
- isHttps booleanForced 
- Force HTTP to HTTPS redirection. If unspecified, defaults to false.
- isOrigin booleanCompression Enabled 
- Enable or disable GZIP compression of origin responses. If enabled, the header Accept-Encoding: gzipis sent to origin, otherwise, the emptyAccept-Encoding:header is used.
- isResponse booleanBuffering Enabled 
- Enable or disable buffering of responses from the origin. Buffering improves overall stability in case of network issues, but slightly increases Time To First Byte.
- isSni booleanEnabled 
- SNI stands for Server Name Indication and is an extension of the TLS protocol. It indicates which hostname is being contacted by the browser at the beginning of the 'handshake'-process. This allows a server to connect multiple SSL Certificates to one IP address and port.
- loadBalancing GetMethods Waas Policies Waas Policy Policy Config Load Balancing Method[] 
- An object that represents a load balancing method and its properties.
- tlsProtocols string[]
- A list of allowed TLS protocols. Only applicable when HTTPS support is enabled. The TLS protocol is negotiated while the request is connecting and the most recent protocol supported by both the edge node and client browser will be selected. If no such version exists, the connection will be aborted.- TLS_V1: corresponds to TLS 1.0 specification.
- TLS_V1_1: corresponds to TLS 1.1 specification.
- TLS_V1_2: corresponds to TLS 1.2 specification.
- TLS_V1_3: corresponds to TLS 1.3 specification.
 
- websocketPath string[]Prefixes 
- ModSecurity is not capable to inspect WebSockets. Therefore paths specified here have WAF disabled if Connection request header from the client has the value Upgrade (case insensitive matching) and Upgrade request header has the value websocket (case insensitive matching). Paths matches if the concatenation of request URL path and query starts with the contents of the one of websocketPathPrefixesarray value. In All other cases challenges, like JSC, HIC and etc., remain active.
- certificate_id str
- The OCID of the SSL certificate to use if HTTPS is supported.
- cipher_group str
- The set cipher group for the configured TLS protocol. This sets the configuration for the TLS connections between clients and edge nodes only.- DEFAULT: Cipher group supports TLS 1.0, TLS 1.1, TLS 1.2, TLS 1.3 protocols. It has the following ciphers enabled: ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-AES256-GCM-SHA384:DHE-RSA-AES128-GCM-SHA256:DHE-DSS-AES128-GCM-SHA256:kEDH+AESGCM:ECDHE-RSA-AES128-SHA256:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA:ECDHE-ECDSA-AES128-SHA:ECDHE-RSA-AES256-SHA384:ECDHE-ECDSA-AES256-SHA384:ECDHE-RSA-AES256-SHA:ECDHE-ECDSA-AES256-SHA:DHE-RSA-AES128-SHA256:DHE-RSA-AES128-SHA:DHE-DSS-AES128-SHA256:DHE-RSA-AES256-SHA256:DHE-DSS-AES256-SHA:DHE-RSA-AES256-SHA:AES128-GCM-SHA256:AES256-GCM-SHA384:AES128-SHA256:AES256-SHA256:AES128-SHA:AES256-SHA:AES:CAMELLIA:!DES-CBC3-SHA:!aNULL:!eNULL:!EXPORT:!DES:!RC4:!MD5:!PSK:!aECDH:!EDH-DSS-DES-CBC3-SHA:!EDH-RSA-DES-CBC3-SHA:!KRB5-DES-CBC3-SHA
 
- DEFAULT: Cipher group supports TLS 1.0, TLS 1.1, TLS 1.2, TLS 1.3 protocols. It has the following ciphers enabled: 
- client_address_ strheader 
- Specifies an HTTP header name which is treated as the connecting client's IP address. Applicable only if isBehindCdnis enabled.
- health_checks Sequence[waas.Get Waas Policies Waas Policy Policy Config Health Check] 
- Health checks monitor the status of your origin servers and only route traffic to the origins that pass the health check. If the health check fails, origin is automatically removed from the load balancing. There is roughly one health check per EDGE POP per period. Any checks that pass will be reported as "healthy".
- is_behind_ boolcdn 
- Enabling isBehindCdnallows for the collection of IP addresses from client requests if the WAF is connected to a CDN.
- is_cache_ boolcontrol_ respected 
- Enable or disable automatic content caching based on the response cache-controlheader. This feature enables the origin to act as a proxy cache. Caching is usually defined usingcache-controlheader. For examplecache-control: max-age=120means that the returned resource is valid for 120 seconds. Caching rules will overwrite this setting.
- is_https_ boolenabled 
- Enable or disable HTTPS support. If true, a certificateIdis required. If unspecified, defaults tofalse.
- is_https_ boolforced 
- Force HTTP to HTTPS redirection. If unspecified, defaults to false.
- is_origin_ boolcompression_ enabled 
- Enable or disable GZIP compression of origin responses. If enabled, the header Accept-Encoding: gzipis sent to origin, otherwise, the emptyAccept-Encoding:header is used.
- is_response_ boolbuffering_ enabled 
- Enable or disable buffering of responses from the origin. Buffering improves overall stability in case of network issues, but slightly increases Time To First Byte.
- is_sni_ boolenabled 
- SNI stands for Server Name Indication and is an extension of the TLS protocol. It indicates which hostname is being contacted by the browser at the beginning of the 'handshake'-process. This allows a server to connect multiple SSL Certificates to one IP address and port.
- load_balancing_ Sequence[waas.methods Get Waas Policies Waas Policy Policy Config Load Balancing Method] 
- An object that represents a load balancing method and its properties.
- tls_protocols Sequence[str]
- A list of allowed TLS protocols. Only applicable when HTTPS support is enabled. The TLS protocol is negotiated while the request is connecting and the most recent protocol supported by both the edge node and client browser will be selected. If no such version exists, the connection will be aborted.- TLS_V1: corresponds to TLS 1.0 specification.
- TLS_V1_1: corresponds to TLS 1.1 specification.
- TLS_V1_2: corresponds to TLS 1.2 specification.
- TLS_V1_3: corresponds to TLS 1.3 specification.
 
- websocket_path_ Sequence[str]prefixes 
- ModSecurity is not capable to inspect WebSockets. Therefore paths specified here have WAF disabled if Connection request header from the client has the value Upgrade (case insensitive matching) and Upgrade request header has the value websocket (case insensitive matching). Paths matches if the concatenation of request URL path and query starts with the contents of the one of websocketPathPrefixesarray value. In All other cases challenges, like JSC, HIC and etc., remain active.
- certificateId String
- The OCID of the SSL certificate to use if HTTPS is supported.
- cipherGroup String
- The set cipher group for the configured TLS protocol. This sets the configuration for the TLS connections between clients and edge nodes only.- DEFAULT: Cipher group supports TLS 1.0, TLS 1.1, TLS 1.2, TLS 1.3 protocols. It has the following ciphers enabled: ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-AES256-GCM-SHA384:DHE-RSA-AES128-GCM-SHA256:DHE-DSS-AES128-GCM-SHA256:kEDH+AESGCM:ECDHE-RSA-AES128-SHA256:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA:ECDHE-ECDSA-AES128-SHA:ECDHE-RSA-AES256-SHA384:ECDHE-ECDSA-AES256-SHA384:ECDHE-RSA-AES256-SHA:ECDHE-ECDSA-AES256-SHA:DHE-RSA-AES128-SHA256:DHE-RSA-AES128-SHA:DHE-DSS-AES128-SHA256:DHE-RSA-AES256-SHA256:DHE-DSS-AES256-SHA:DHE-RSA-AES256-SHA:AES128-GCM-SHA256:AES256-GCM-SHA384:AES128-SHA256:AES256-SHA256:AES128-SHA:AES256-SHA:AES:CAMELLIA:!DES-CBC3-SHA:!aNULL:!eNULL:!EXPORT:!DES:!RC4:!MD5:!PSK:!aECDH:!EDH-DSS-DES-CBC3-SHA:!EDH-RSA-DES-CBC3-SHA:!KRB5-DES-CBC3-SHA
 
- DEFAULT: Cipher group supports TLS 1.0, TLS 1.1, TLS 1.2, TLS 1.3 protocols. It has the following ciphers enabled: 
- clientAddress StringHeader 
- Specifies an HTTP header name which is treated as the connecting client's IP address. Applicable only if isBehindCdnis enabled.
- healthChecks List<Property Map>
- Health checks monitor the status of your origin servers and only route traffic to the origins that pass the health check. If the health check fails, origin is automatically removed from the load balancing. There is roughly one health check per EDGE POP per period. Any checks that pass will be reported as "healthy".
- isBehind BooleanCdn 
- Enabling isBehindCdnallows for the collection of IP addresses from client requests if the WAF is connected to a CDN.
- isCache BooleanControl Respected 
- Enable or disable automatic content caching based on the response cache-controlheader. This feature enables the origin to act as a proxy cache. Caching is usually defined usingcache-controlheader. For examplecache-control: max-age=120means that the returned resource is valid for 120 seconds. Caching rules will overwrite this setting.
- isHttps BooleanEnabled 
- Enable or disable HTTPS support. If true, a certificateIdis required. If unspecified, defaults tofalse.
- isHttps BooleanForced 
- Force HTTP to HTTPS redirection. If unspecified, defaults to false.
- isOrigin BooleanCompression Enabled 
- Enable or disable GZIP compression of origin responses. If enabled, the header Accept-Encoding: gzipis sent to origin, otherwise, the emptyAccept-Encoding:header is used.
- isResponse BooleanBuffering Enabled 
- Enable or disable buffering of responses from the origin. Buffering improves overall stability in case of network issues, but slightly increases Time To First Byte.
- isSni BooleanEnabled 
- SNI stands for Server Name Indication and is an extension of the TLS protocol. It indicates which hostname is being contacted by the browser at the beginning of the 'handshake'-process. This allows a server to connect multiple SSL Certificates to one IP address and port.
- loadBalancing List<Property Map>Methods 
- An object that represents a load balancing method and its properties.
- tlsProtocols List<String>
- A list of allowed TLS protocols. Only applicable when HTTPS support is enabled. The TLS protocol is negotiated while the request is connecting and the most recent protocol supported by both the edge node and client browser will be selected. If no such version exists, the connection will be aborted.- TLS_V1: corresponds to TLS 1.0 specification.
- TLS_V1_1: corresponds to TLS 1.1 specification.
- TLS_V1_2: corresponds to TLS 1.2 specification.
- TLS_V1_3: corresponds to TLS 1.3 specification.
 
- websocketPath List<String>Prefixes 
- ModSecurity is not capable to inspect WebSockets. Therefore paths specified here have WAF disabled if Connection request header from the client has the value Upgrade (case insensitive matching) and Upgrade request header has the value websocket (case insensitive matching). Paths matches if the concatenation of request URL path and query starts with the contents of the one of websocketPathPrefixesarray value. In All other cases challenges, like JSC, HIC and etc., remain active.
GetWaasPoliciesWaasPolicyPolicyConfigHealthCheck        
- ExpectedResponse List<string>Code Groups 
- The HTTP response codes that signify a healthy state.- 2XX: Success response code group.
- 3XX: Redirection response code group.
- 4XX: Client errors response code group.
- 5XX: Server errors response code group.
 
- ExpectedResponse stringText 
- Health check will search for the given text in a case-sensitive manner within the response body and will fail if the text is not found.
- Headers Dictionary<string, string>
- HTTP header fields to include in health check requests, expressed as "name": "value"properties. Because HTTP header field names are case-insensitive, any use of names that are case-insensitive equal to other names will be rejected. If Host is not specified, requests will include a Host header field with value matching the policy's protected domain. If User-Agent is not specified, requests will include a User-Agent header field with value "waf health checks".
- HealthyThreshold int
- Number of successful health checks after which the server is marked up.
- IntervalIn intSeconds 
- Time between health checks of an individual origin server, in seconds.
- IsEnabled bool
- Enables or disables the JavaScript challenge Web Application Firewall feature.
- IsResponse boolText Check Enabled 
- Enables or disables additional check for predefined text in addition to response code.
- Method string
- Load balancing methods are algorithms used to efficiently distribute traffic among origin servers.- IP_HASH: All the incoming requests from the same client IP address should go to the same content origination server. IP_HASH load balancing method uses origin weights when choosing which origin should the hash be assigned to initially.
- ROUND_ROBIN: Forwards requests sequentially to the available origin servers. The first request - to the first origin server, the second request - to the next origin server, and so on. After it sends a request to the last origin server, it starts again with the first origin server. When using weights on origins, Weighted Round Robin assigns more requests to origins with a greater weight. Over a period of time, origins will receive a number of requests in proportion to their weight.
- STICKY_COOKIE: Adds a session cookie to the first response from the origin server and identifies the server that sent the response. The client's next request contains the cookie value, and nginx routes the request to the origin server that responded to the first request. STICKY_COOKIE load balancing method falls back to Round Robin for the first request.
 
- Path string
- Path to visit on your origins when performing the health check.
- TimeoutIn intSeconds 
- Response timeout represents wait time until request is considered failed, in seconds.
- UnhealthyThreshold int
- Number of failed health checks after which the server is marked down.
- ExpectedResponse []stringCode Groups 
- The HTTP response codes that signify a healthy state.- 2XX: Success response code group.
- 3XX: Redirection response code group.
- 4XX: Client errors response code group.
- 5XX: Server errors response code group.
 
- ExpectedResponse stringText 
- Health check will search for the given text in a case-sensitive manner within the response body and will fail if the text is not found.
- Headers map[string]string
- HTTP header fields to include in health check requests, expressed as "name": "value"properties. Because HTTP header field names are case-insensitive, any use of names that are case-insensitive equal to other names will be rejected. If Host is not specified, requests will include a Host header field with value matching the policy's protected domain. If User-Agent is not specified, requests will include a User-Agent header field with value "waf health checks".
- HealthyThreshold int
- Number of successful health checks after which the server is marked up.
- IntervalIn intSeconds 
- Time between health checks of an individual origin server, in seconds.
- IsEnabled bool
- Enables or disables the JavaScript challenge Web Application Firewall feature.
- IsResponse boolText Check Enabled 
- Enables or disables additional check for predefined text in addition to response code.
- Method string
- Load balancing methods are algorithms used to efficiently distribute traffic among origin servers.- IP_HASH: All the incoming requests from the same client IP address should go to the same content origination server. IP_HASH load balancing method uses origin weights when choosing which origin should the hash be assigned to initially.
- ROUND_ROBIN: Forwards requests sequentially to the available origin servers. The first request - to the first origin server, the second request - to the next origin server, and so on. After it sends a request to the last origin server, it starts again with the first origin server. When using weights on origins, Weighted Round Robin assigns more requests to origins with a greater weight. Over a period of time, origins will receive a number of requests in proportion to their weight.
- STICKY_COOKIE: Adds a session cookie to the first response from the origin server and identifies the server that sent the response. The client's next request contains the cookie value, and nginx routes the request to the origin server that responded to the first request. STICKY_COOKIE load balancing method falls back to Round Robin for the first request.
 
- Path string
- Path to visit on your origins when performing the health check.
- TimeoutIn intSeconds 
- Response timeout represents wait time until request is considered failed, in seconds.
- UnhealthyThreshold int
- Number of failed health checks after which the server is marked down.
- expectedResponse List<String>Code Groups 
- The HTTP response codes that signify a healthy state.- 2XX: Success response code group.
- 3XX: Redirection response code group.
- 4XX: Client errors response code group.
- 5XX: Server errors response code group.
 
- expectedResponse StringText 
- Health check will search for the given text in a case-sensitive manner within the response body and will fail if the text is not found.
- headers Map<String,String>
- HTTP header fields to include in health check requests, expressed as "name": "value"properties. Because HTTP header field names are case-insensitive, any use of names that are case-insensitive equal to other names will be rejected. If Host is not specified, requests will include a Host header field with value matching the policy's protected domain. If User-Agent is not specified, requests will include a User-Agent header field with value "waf health checks".
- healthyThreshold Integer
- Number of successful health checks after which the server is marked up.
- intervalIn IntegerSeconds 
- Time between health checks of an individual origin server, in seconds.
- isEnabled Boolean
- Enables or disables the JavaScript challenge Web Application Firewall feature.
- isResponse BooleanText Check Enabled 
- Enables or disables additional check for predefined text in addition to response code.
- method String
- Load balancing methods are algorithms used to efficiently distribute traffic among origin servers.- IP_HASH: All the incoming requests from the same client IP address should go to the same content origination server. IP_HASH load balancing method uses origin weights when choosing which origin should the hash be assigned to initially.
- ROUND_ROBIN: Forwards requests sequentially to the available origin servers. The first request - to the first origin server, the second request - to the next origin server, and so on. After it sends a request to the last origin server, it starts again with the first origin server. When using weights on origins, Weighted Round Robin assigns more requests to origins with a greater weight. Over a period of time, origins will receive a number of requests in proportion to their weight.
- STICKY_COOKIE: Adds a session cookie to the first response from the origin server and identifies the server that sent the response. The client's next request contains the cookie value, and nginx routes the request to the origin server that responded to the first request. STICKY_COOKIE load balancing method falls back to Round Robin for the first request.
 
- path String
- Path to visit on your origins when performing the health check.
- timeoutIn IntegerSeconds 
- Response timeout represents wait time until request is considered failed, in seconds.
- unhealthyThreshold Integer
- Number of failed health checks after which the server is marked down.
- expectedResponse string[]Code Groups 
- The HTTP response codes that signify a healthy state.- 2XX: Success response code group.
- 3XX: Redirection response code group.
- 4XX: Client errors response code group.
- 5XX: Server errors response code group.
 
- expectedResponse stringText 
- Health check will search for the given text in a case-sensitive manner within the response body and will fail if the text is not found.
- headers {[key: string]: string}
- HTTP header fields to include in health check requests, expressed as "name": "value"properties. Because HTTP header field names are case-insensitive, any use of names that are case-insensitive equal to other names will be rejected. If Host is not specified, requests will include a Host header field with value matching the policy's protected domain. If User-Agent is not specified, requests will include a User-Agent header field with value "waf health checks".
- healthyThreshold number
- Number of successful health checks after which the server is marked up.
- intervalIn numberSeconds 
- Time between health checks of an individual origin server, in seconds.
- isEnabled boolean
- Enables or disables the JavaScript challenge Web Application Firewall feature.
- isResponse booleanText Check Enabled 
- Enables or disables additional check for predefined text in addition to response code.
- method string
- Load balancing methods are algorithms used to efficiently distribute traffic among origin servers.- IP_HASH: All the incoming requests from the same client IP address should go to the same content origination server. IP_HASH load balancing method uses origin weights when choosing which origin should the hash be assigned to initially.
- ROUND_ROBIN: Forwards requests sequentially to the available origin servers. The first request - to the first origin server, the second request - to the next origin server, and so on. After it sends a request to the last origin server, it starts again with the first origin server. When using weights on origins, Weighted Round Robin assigns more requests to origins with a greater weight. Over a period of time, origins will receive a number of requests in proportion to their weight.
- STICKY_COOKIE: Adds a session cookie to the first response from the origin server and identifies the server that sent the response. The client's next request contains the cookie value, and nginx routes the request to the origin server that responded to the first request. STICKY_COOKIE load balancing method falls back to Round Robin for the first request.
 
- path string
- Path to visit on your origins when performing the health check.
- timeoutIn numberSeconds 
- Response timeout represents wait time until request is considered failed, in seconds.
- unhealthyThreshold number
- Number of failed health checks after which the server is marked down.
- expected_response_ Sequence[str]code_ groups 
- The HTTP response codes that signify a healthy state.- 2XX: Success response code group.
- 3XX: Redirection response code group.
- 4XX: Client errors response code group.
- 5XX: Server errors response code group.
 
- expected_response_ strtext 
- Health check will search for the given text in a case-sensitive manner within the response body and will fail if the text is not found.
- headers Mapping[str, str]
- HTTP header fields to include in health check requests, expressed as "name": "value"properties. Because HTTP header field names are case-insensitive, any use of names that are case-insensitive equal to other names will be rejected. If Host is not specified, requests will include a Host header field with value matching the policy's protected domain. If User-Agent is not specified, requests will include a User-Agent header field with value "waf health checks".
- healthy_threshold int
- Number of successful health checks after which the server is marked up.
- interval_in_ intseconds 
- Time between health checks of an individual origin server, in seconds.
- is_enabled bool
- Enables or disables the JavaScript challenge Web Application Firewall feature.
- is_response_ booltext_ check_ enabled 
- Enables or disables additional check for predefined text in addition to response code.
- method str
- Load balancing methods are algorithms used to efficiently distribute traffic among origin servers.- IP_HASH: All the incoming requests from the same client IP address should go to the same content origination server. IP_HASH load balancing method uses origin weights when choosing which origin should the hash be assigned to initially.
- ROUND_ROBIN: Forwards requests sequentially to the available origin servers. The first request - to the first origin server, the second request - to the next origin server, and so on. After it sends a request to the last origin server, it starts again with the first origin server. When using weights on origins, Weighted Round Robin assigns more requests to origins with a greater weight. Over a period of time, origins will receive a number of requests in proportion to their weight.
- STICKY_COOKIE: Adds a session cookie to the first response from the origin server and identifies the server that sent the response. The client's next request contains the cookie value, and nginx routes the request to the origin server that responded to the first request. STICKY_COOKIE load balancing method falls back to Round Robin for the first request.
 
- path str
- Path to visit on your origins when performing the health check.
- timeout_in_ intseconds 
- Response timeout represents wait time until request is considered failed, in seconds.
- unhealthy_threshold int
- Number of failed health checks after which the server is marked down.
- expectedResponse List<String>Code Groups 
- The HTTP response codes that signify a healthy state.- 2XX: Success response code group.
- 3XX: Redirection response code group.
- 4XX: Client errors response code group.
- 5XX: Server errors response code group.
 
- expectedResponse StringText 
- Health check will search for the given text in a case-sensitive manner within the response body and will fail if the text is not found.
- headers Map<String>
- HTTP header fields to include in health check requests, expressed as "name": "value"properties. Because HTTP header field names are case-insensitive, any use of names that are case-insensitive equal to other names will be rejected. If Host is not specified, requests will include a Host header field with value matching the policy's protected domain. If User-Agent is not specified, requests will include a User-Agent header field with value "waf health checks".
- healthyThreshold Number
- Number of successful health checks after which the server is marked up.
- intervalIn NumberSeconds 
- Time between health checks of an individual origin server, in seconds.
- isEnabled Boolean
- Enables or disables the JavaScript challenge Web Application Firewall feature.
- isResponse BooleanText Check Enabled 
- Enables or disables additional check for predefined text in addition to response code.
- method String
- Load balancing methods are algorithms used to efficiently distribute traffic among origin servers.- IP_HASH: All the incoming requests from the same client IP address should go to the same content origination server. IP_HASH load balancing method uses origin weights when choosing which origin should the hash be assigned to initially.
- ROUND_ROBIN: Forwards requests sequentially to the available origin servers. The first request - to the first origin server, the second request - to the next origin server, and so on. After it sends a request to the last origin server, it starts again with the first origin server. When using weights on origins, Weighted Round Robin assigns more requests to origins with a greater weight. Over a period of time, origins will receive a number of requests in proportion to their weight.
- STICKY_COOKIE: Adds a session cookie to the first response from the origin server and identifies the server that sent the response. The client's next request contains the cookie value, and nginx routes the request to the origin server that responded to the first request. STICKY_COOKIE load balancing method falls back to Round Robin for the first request.
 
- path String
- Path to visit on your origins when performing the health check.
- timeoutIn NumberSeconds 
- Response timeout represents wait time until request is considered failed, in seconds.
- unhealthyThreshold Number
- Number of failed health checks after which the server is marked down.
GetWaasPoliciesWaasPolicyPolicyConfigLoadBalancingMethod         
- Domain string
- The domain for which the cookie is set, defaults to WAAS policy domain.
- ExpirationTime intIn Seconds 
- The time for which a browser should keep the cookie in seconds. Empty value will cause the cookie to expire at the end of a browser session.
- Method string
- Load balancing methods are algorithms used to efficiently distribute traffic among origin servers.- IP_HASH: All the incoming requests from the same client IP address should go to the same content origination server. IP_HASH load balancing method uses origin weights when choosing which origin should the hash be assigned to initially.
- ROUND_ROBIN: Forwards requests sequentially to the available origin servers. The first request - to the first origin server, the second request - to the next origin server, and so on. After it sends a request to the last origin server, it starts again with the first origin server. When using weights on origins, Weighted Round Robin assigns more requests to origins with a greater weight. Over a period of time, origins will receive a number of requests in proportion to their weight.
- STICKY_COOKIE: Adds a session cookie to the first response from the origin server and identifies the server that sent the response. The client's next request contains the cookie value, and nginx routes the request to the origin server that responded to the first request. STICKY_COOKIE load balancing method falls back to Round Robin for the first request.
 
- Name string
- The unique name of the whitelist.
- Domain string
- The domain for which the cookie is set, defaults to WAAS policy domain.
- ExpirationTime intIn Seconds 
- The time for which a browser should keep the cookie in seconds. Empty value will cause the cookie to expire at the end of a browser session.
- Method string
- Load balancing methods are algorithms used to efficiently distribute traffic among origin servers.- IP_HASH: All the incoming requests from the same client IP address should go to the same content origination server. IP_HASH load balancing method uses origin weights when choosing which origin should the hash be assigned to initially.
- ROUND_ROBIN: Forwards requests sequentially to the available origin servers. The first request - to the first origin server, the second request - to the next origin server, and so on. After it sends a request to the last origin server, it starts again with the first origin server. When using weights on origins, Weighted Round Robin assigns more requests to origins with a greater weight. Over a period of time, origins will receive a number of requests in proportion to their weight.
- STICKY_COOKIE: Adds a session cookie to the first response from the origin server and identifies the server that sent the response. The client's next request contains the cookie value, and nginx routes the request to the origin server that responded to the first request. STICKY_COOKIE load balancing method falls back to Round Robin for the first request.
 
- Name string
- The unique name of the whitelist.
- domain String
- The domain for which the cookie is set, defaults to WAAS policy domain.
- expirationTime IntegerIn Seconds 
- The time for which a browser should keep the cookie in seconds. Empty value will cause the cookie to expire at the end of a browser session.
- method String
- Load balancing methods are algorithms used to efficiently distribute traffic among origin servers.- IP_HASH: All the incoming requests from the same client IP address should go to the same content origination server. IP_HASH load balancing method uses origin weights when choosing which origin should the hash be assigned to initially.
- ROUND_ROBIN: Forwards requests sequentially to the available origin servers. The first request - to the first origin server, the second request - to the next origin server, and so on. After it sends a request to the last origin server, it starts again with the first origin server. When using weights on origins, Weighted Round Robin assigns more requests to origins with a greater weight. Over a period of time, origins will receive a number of requests in proportion to their weight.
- STICKY_COOKIE: Adds a session cookie to the first response from the origin server and identifies the server that sent the response. The client's next request contains the cookie value, and nginx routes the request to the origin server that responded to the first request. STICKY_COOKIE load balancing method falls back to Round Robin for the first request.
 
- name String
- The unique name of the whitelist.
- domain string
- The domain for which the cookie is set, defaults to WAAS policy domain.
- expirationTime numberIn Seconds 
- The time for which a browser should keep the cookie in seconds. Empty value will cause the cookie to expire at the end of a browser session.
- method string
- Load balancing methods are algorithms used to efficiently distribute traffic among origin servers.- IP_HASH: All the incoming requests from the same client IP address should go to the same content origination server. IP_HASH load balancing method uses origin weights when choosing which origin should the hash be assigned to initially.
- ROUND_ROBIN: Forwards requests sequentially to the available origin servers. The first request - to the first origin server, the second request - to the next origin server, and so on. After it sends a request to the last origin server, it starts again with the first origin server. When using weights on origins, Weighted Round Robin assigns more requests to origins with a greater weight. Over a period of time, origins will receive a number of requests in proportion to their weight.
- STICKY_COOKIE: Adds a session cookie to the first response from the origin server and identifies the server that sent the response. The client's next request contains the cookie value, and nginx routes the request to the origin server that responded to the first request. STICKY_COOKIE load balancing method falls back to Round Robin for the first request.
 
- name string
- The unique name of the whitelist.
- domain str
- The domain for which the cookie is set, defaults to WAAS policy domain.
- expiration_time_ intin_ seconds 
- The time for which a browser should keep the cookie in seconds. Empty value will cause the cookie to expire at the end of a browser session.
- method str
- Load balancing methods are algorithms used to efficiently distribute traffic among origin servers.- IP_HASH: All the incoming requests from the same client IP address should go to the same content origination server. IP_HASH load balancing method uses origin weights when choosing which origin should the hash be assigned to initially.
- ROUND_ROBIN: Forwards requests sequentially to the available origin servers. The first request - to the first origin server, the second request - to the next origin server, and so on. After it sends a request to the last origin server, it starts again with the first origin server. When using weights on origins, Weighted Round Robin assigns more requests to origins with a greater weight. Over a period of time, origins will receive a number of requests in proportion to their weight.
- STICKY_COOKIE: Adds a session cookie to the first response from the origin server and identifies the server that sent the response. The client's next request contains the cookie value, and nginx routes the request to the origin server that responded to the first request. STICKY_COOKIE load balancing method falls back to Round Robin for the first request.
 
- name str
- The unique name of the whitelist.
- domain String
- The domain for which the cookie is set, defaults to WAAS policy domain.
- expirationTime NumberIn Seconds 
- The time for which a browser should keep the cookie in seconds. Empty value will cause the cookie to expire at the end of a browser session.
- method String
- Load balancing methods are algorithms used to efficiently distribute traffic among origin servers.- IP_HASH: All the incoming requests from the same client IP address should go to the same content origination server. IP_HASH load balancing method uses origin weights when choosing which origin should the hash be assigned to initially.
- ROUND_ROBIN: Forwards requests sequentially to the available origin servers. The first request - to the first origin server, the second request - to the next origin server, and so on. After it sends a request to the last origin server, it starts again with the first origin server. When using weights on origins, Weighted Round Robin assigns more requests to origins with a greater weight. Over a period of time, origins will receive a number of requests in proportion to their weight.
- STICKY_COOKIE: Adds a session cookie to the first response from the origin server and identifies the server that sent the response. The client's next request contains the cookie value, and nginx routes the request to the origin server that responded to the first request. STICKY_COOKIE load balancing method falls back to Round Robin for the first request.
 
- name String
- The unique name of the whitelist.
GetWaasPoliciesWaasPolicyWafConfig      
- AccessRules List<GetWaas Policies Waas Policy Waf Config Access Rule> 
- The access rules applied to the Web Application Firewall. Used for defining custom access policies with the combination of ALLOW,DETECT, andBLOCKrules, based on different criteria.
- AddressRate List<GetLimitings Waas Policies Waas Policy Waf Config Address Rate Limiting> 
- The IP address rate limiting settings used to limit the number of requests from an address.
- CachingRules List<GetWaas Policies Waas Policy Waf Config Caching Rule> 
- A list of caching rules applied to the web application.
- Captchas
List<GetWaas Policies Waas Policy Waf Config Captcha> 
- A list of CAPTCHA challenge settings. These are used to challenge requests with a CAPTCHA to block bots.
- CustomProtection List<GetRules Waas Policies Waas Policy Waf Config Custom Protection Rule> 
- A list of the custom protection rule OCIDs and their actions.
- DeviceFingerprint List<GetChallenges Waas Policies Waas Policy Waf Config Device Fingerprint Challenge> 
- The device fingerprint challenge settings. Used to detect unique devices based on the device fingerprint information collected in order to block bots.
- HumanInteraction List<GetChallenges Waas Policies Waas Policy Waf Config Human Interaction Challenge> 
- The human interaction challenge settings. Used to look for natural human interactions such as mouse movements, time on site, and page scrolling to identify bots.
- JsChallenges List<GetWaas Policies Waas Policy Waf Config Js Challenge> 
- The JavaScript challenge settings. Used to challenge requests with a JavaScript challenge and take the action if a browser has no JavaScript support in order to block bots.
- Origin string
- The key in the map of origins referencing the origin used for the Web Application Firewall. The origin must already be included in Origins. Required when creating theWafConfigresource, but not on update.
- OriginGroups List<string>
- The map of origin groups and their keys used to associate origins to the wafConfig. Origin groups allow you to apply weights to groups of origins for load balancing purposes. Origins with higher weights will receive larger proportions of client requests. To add additional origins to your WAAS policy, update theoriginsfield of aUpdateWaasPolicyrequest.
- ProtectionSettings List<GetWaas Policies Waas Policy Waf Config Protection Setting> 
- The settings to apply to protection rules.
- Whitelists
List<GetWaas Policies Waas Policy Waf Config Whitelist> 
- A list of IP addresses that bypass the Web Application Firewall.
- AccessRules []GetWaas Policies Waas Policy Waf Config Access Rule 
- The access rules applied to the Web Application Firewall. Used for defining custom access policies with the combination of ALLOW,DETECT, andBLOCKrules, based on different criteria.
- AddressRate []GetLimitings Waas Policies Waas Policy Waf Config Address Rate Limiting 
- The IP address rate limiting settings used to limit the number of requests from an address.
- CachingRules []GetWaas Policies Waas Policy Waf Config Caching Rule 
- A list of caching rules applied to the web application.
- Captchas
[]GetWaas Policies Waas Policy Waf Config Captcha 
- A list of CAPTCHA challenge settings. These are used to challenge requests with a CAPTCHA to block bots.
- CustomProtection []GetRules Waas Policies Waas Policy Waf Config Custom Protection Rule 
- A list of the custom protection rule OCIDs and their actions.
- DeviceFingerprint []GetChallenges Waas Policies Waas Policy Waf Config Device Fingerprint Challenge 
- The device fingerprint challenge settings. Used to detect unique devices based on the device fingerprint information collected in order to block bots.
- HumanInteraction []GetChallenges Waas Policies Waas Policy Waf Config Human Interaction Challenge 
- The human interaction challenge settings. Used to look for natural human interactions such as mouse movements, time on site, and page scrolling to identify bots.
- JsChallenges []GetWaas Policies Waas Policy Waf Config Js Challenge 
- The JavaScript challenge settings. Used to challenge requests with a JavaScript challenge and take the action if a browser has no JavaScript support in order to block bots.
- Origin string
- The key in the map of origins referencing the origin used for the Web Application Firewall. The origin must already be included in Origins. Required when creating theWafConfigresource, but not on update.
- OriginGroups []string
- The map of origin groups and their keys used to associate origins to the wafConfig. Origin groups allow you to apply weights to groups of origins for load balancing purposes. Origins with higher weights will receive larger proportions of client requests. To add additional origins to your WAAS policy, update theoriginsfield of aUpdateWaasPolicyrequest.
- ProtectionSettings []GetWaas Policies Waas Policy Waf Config Protection Setting 
- The settings to apply to protection rules.
- Whitelists
[]GetWaas Policies Waas Policy Waf Config Whitelist 
- A list of IP addresses that bypass the Web Application Firewall.
- accessRules List<GetPolicies Policy Waf Config Access Rule> 
- The access rules applied to the Web Application Firewall. Used for defining custom access policies with the combination of ALLOW,DETECT, andBLOCKrules, based on different criteria.
- addressRate List<GetLimitings Policies Policy Waf Config Address Rate Limiting> 
- The IP address rate limiting settings used to limit the number of requests from an address.
- cachingRules List<GetPolicies Policy Waf Config Caching Rule> 
- A list of caching rules applied to the web application.
- captchas
List<GetPolicies Policy Waf Config Captcha> 
- A list of CAPTCHA challenge settings. These are used to challenge requests with a CAPTCHA to block bots.
- customProtection List<GetRules Policies Policy Waf Config Custom Protection Rule> 
- A list of the custom protection rule OCIDs and their actions.
- deviceFingerprint List<GetChallenges Policies Policy Waf Config Device Fingerprint Challenge> 
- The device fingerprint challenge settings. Used to detect unique devices based on the device fingerprint information collected in order to block bots.
- humanInteraction List<GetChallenges Policies Policy Waf Config Human Interaction Challenge> 
- The human interaction challenge settings. Used to look for natural human interactions such as mouse movements, time on site, and page scrolling to identify bots.
- jsChallenges List<GetPolicies Policy Waf Config Js Challenge> 
- The JavaScript challenge settings. Used to challenge requests with a JavaScript challenge and take the action if a browser has no JavaScript support in order to block bots.
- origin String
- The key in the map of origins referencing the origin used for the Web Application Firewall. The origin must already be included in Origins. Required when creating theWafConfigresource, but not on update.
- originGroups List<String>
- The map of origin groups and their keys used to associate origins to the wafConfig. Origin groups allow you to apply weights to groups of origins for load balancing purposes. Origins with higher weights will receive larger proportions of client requests. To add additional origins to your WAAS policy, update theoriginsfield of aUpdateWaasPolicyrequest.
- protectionSettings List<GetPolicies Policy Waf Config Protection Setting> 
- The settings to apply to protection rules.
- whitelists
List<GetPolicies Policy Waf Config Whitelist> 
- A list of IP addresses that bypass the Web Application Firewall.
- accessRules GetWaas Policies Waas Policy Waf Config Access Rule[] 
- The access rules applied to the Web Application Firewall. Used for defining custom access policies with the combination of ALLOW,DETECT, andBLOCKrules, based on different criteria.
- addressRate GetLimitings Waas Policies Waas Policy Waf Config Address Rate Limiting[] 
- The IP address rate limiting settings used to limit the number of requests from an address.
- cachingRules GetWaas Policies Waas Policy Waf Config Caching Rule[] 
- A list of caching rules applied to the web application.
- captchas
GetWaas Policies Waas Policy Waf Config Captcha[] 
- A list of CAPTCHA challenge settings. These are used to challenge requests with a CAPTCHA to block bots.
- customProtection GetRules Waas Policies Waas Policy Waf Config Custom Protection Rule[] 
- A list of the custom protection rule OCIDs and their actions.
- deviceFingerprint GetChallenges Waas Policies Waas Policy Waf Config Device Fingerprint Challenge[] 
- The device fingerprint challenge settings. Used to detect unique devices based on the device fingerprint information collected in order to block bots.
- humanInteraction GetChallenges Waas Policies Waas Policy Waf Config Human Interaction Challenge[] 
- The human interaction challenge settings. Used to look for natural human interactions such as mouse movements, time on site, and page scrolling to identify bots.
- jsChallenges GetWaas Policies Waas Policy Waf Config Js Challenge[] 
- The JavaScript challenge settings. Used to challenge requests with a JavaScript challenge and take the action if a browser has no JavaScript support in order to block bots.
- origin string
- The key in the map of origins referencing the origin used for the Web Application Firewall. The origin must already be included in Origins. Required when creating theWafConfigresource, but not on update.
- originGroups string[]
- The map of origin groups and their keys used to associate origins to the wafConfig. Origin groups allow you to apply weights to groups of origins for load balancing purposes. Origins with higher weights will receive larger proportions of client requests. To add additional origins to your WAAS policy, update theoriginsfield of aUpdateWaasPolicyrequest.
- protectionSettings GetWaas Policies Waas Policy Waf Config Protection Setting[] 
- The settings to apply to protection rules.
- whitelists
GetWaas Policies Waas Policy Waf Config Whitelist[] 
- A list of IP addresses that bypass the Web Application Firewall.
- access_rules Sequence[waas.Get Waas Policies Waas Policy Waf Config Access Rule] 
- The access rules applied to the Web Application Firewall. Used for defining custom access policies with the combination of ALLOW,DETECT, andBLOCKrules, based on different criteria.
- address_rate_ Sequence[waas.limitings Get Waas Policies Waas Policy Waf Config Address Rate Limiting] 
- The IP address rate limiting settings used to limit the number of requests from an address.
- caching_rules Sequence[waas.Get Waas Policies Waas Policy Waf Config Caching Rule] 
- A list of caching rules applied to the web application.
- captchas
Sequence[waas.Get Waas Policies Waas Policy Waf Config Captcha] 
- A list of CAPTCHA challenge settings. These are used to challenge requests with a CAPTCHA to block bots.
- custom_protection_ Sequence[waas.rules Get Waas Policies Waas Policy Waf Config Custom Protection Rule] 
- A list of the custom protection rule OCIDs and their actions.
- device_fingerprint_ Sequence[waas.challenges Get Waas Policies Waas Policy Waf Config Device Fingerprint Challenge] 
- The device fingerprint challenge settings. Used to detect unique devices based on the device fingerprint information collected in order to block bots.
- human_interaction_ Sequence[waas.challenges Get Waas Policies Waas Policy Waf Config Human Interaction Challenge] 
- The human interaction challenge settings. Used to look for natural human interactions such as mouse movements, time on site, and page scrolling to identify bots.
- js_challenges Sequence[waas.Get Waas Policies Waas Policy Waf Config Js Challenge] 
- The JavaScript challenge settings. Used to challenge requests with a JavaScript challenge and take the action if a browser has no JavaScript support in order to block bots.
- origin str
- The key in the map of origins referencing the origin used for the Web Application Firewall. The origin must already be included in Origins. Required when creating theWafConfigresource, but not on update.
- origin_groups Sequence[str]
- The map of origin groups and their keys used to associate origins to the wafConfig. Origin groups allow you to apply weights to groups of origins for load balancing purposes. Origins with higher weights will receive larger proportions of client requests. To add additional origins to your WAAS policy, update theoriginsfield of aUpdateWaasPolicyrequest.
- protection_settings Sequence[waas.Get Waas Policies Waas Policy Waf Config Protection Setting] 
- The settings to apply to protection rules.
- whitelists
Sequence[waas.Get Waas Policies Waas Policy Waf Config Whitelist] 
- A list of IP addresses that bypass the Web Application Firewall.
- accessRules List<Property Map>
- The access rules applied to the Web Application Firewall. Used for defining custom access policies with the combination of ALLOW,DETECT, andBLOCKrules, based on different criteria.
- addressRate List<Property Map>Limitings 
- The IP address rate limiting settings used to limit the number of requests from an address.
- cachingRules List<Property Map>
- A list of caching rules applied to the web application.
- captchas List<Property Map>
- A list of CAPTCHA challenge settings. These are used to challenge requests with a CAPTCHA to block bots.
- customProtection List<Property Map>Rules 
- A list of the custom protection rule OCIDs and their actions.
- deviceFingerprint List<Property Map>Challenges 
- The device fingerprint challenge settings. Used to detect unique devices based on the device fingerprint information collected in order to block bots.
- humanInteraction List<Property Map>Challenges 
- The human interaction challenge settings. Used to look for natural human interactions such as mouse movements, time on site, and page scrolling to identify bots.
- jsChallenges List<Property Map>
- The JavaScript challenge settings. Used to challenge requests with a JavaScript challenge and take the action if a browser has no JavaScript support in order to block bots.
- origin String
- The key in the map of origins referencing the origin used for the Web Application Firewall. The origin must already be included in Origins. Required when creating theWafConfigresource, but not on update.
- originGroups List<String>
- The map of origin groups and their keys used to associate origins to the wafConfig. Origin groups allow you to apply weights to groups of origins for load balancing purposes. Origins with higher weights will receive larger proportions of client requests. To add additional origins to your WAAS policy, update theoriginsfield of aUpdateWaasPolicyrequest.
- protectionSettings List<Property Map>
- The settings to apply to protection rules.
- whitelists List<Property Map>
- A list of IP addresses that bypass the Web Application Firewall.
GetWaasPoliciesWaasPolicyWafConfigAccessRule        
- Action string
- The action to take against requests from detected bots. If unspecified, defaults to DETECT.
- BlockAction string
- If actionis set toBLOCK, this specifies how the traffic is blocked when detected as malicious by a protection rule. If unspecified, defaults toSET_RESPONSE_CODE.
- BlockError stringPage Code 
- The error code to show on the error page when actionis set toBLOCK,blockActionis set toSHOW_ERROR_PAGE, and the traffic is detected as malicious by a protection rule. If unspecified, defaults to403.
- BlockError stringPage Description 
- The description text to show on the error page when actionis set toBLOCK,blockActionis set toSHOW_ERROR_PAGE, and the traffic is detected as malicious by a protection rule. If unspecified, defaults toAccess blocked by website owner. Please contact support.
- BlockError stringPage Message 
- The message to show on the error page when actionis set toBLOCK,blockActionis set toSHOW_ERROR_PAGE, and the traffic is detected as malicious by a protection rule. If unspecified, defaults to 'Access to the website is blocked.'
- BlockResponse intCode 
- The response code returned when actionis set toBLOCK,blockActionis set toSET_RESPONSE_CODE, and the traffic is detected as malicious by a protection rule. If unspecified, defaults to403. The list of available response codes:400,401,403,405,409,411,412,413,414,415,416,500,501,502,503,504,507.
- BypassChallenges List<string>
- The list of challenges to bypass when actionis set toBYPASS. If unspecified or empty, all challenges are bypassed.- JS_CHALLENGE: Bypasses JavaScript Challenge.
- DEVICE_FINGERPRINT_CHALLENGE: Bypasses Device Fingerprint Challenge.
- HUMAN_INTERACTION_CHALLENGE: Bypasses Human Interaction Challenge.
- CAPTCHA: Bypasses CAPTCHA Challenge.
 
- string
- The text to show in the footer when showing a CAPTCHA challenge when actionis set toBLOCK,blockActionis set toSHOW_CAPTCHA, and the request is blocked. If unspecified, default toEnter the letters and numbers as they are shown in image above.
- CaptchaHeader string
- The text to show in the header when showing a CAPTCHA challenge when actionis set toBLOCK,blockActionis set toSHOW_CAPTCHA, and the request is blocked. If unspecified, defaults toWe have detected an increased number of attempts to access this webapp. To help us keep this webapp secure, please let us know that you are not a robot by entering the text from captcha below.
- CaptchaSubmit stringLabel 
- The text to show on the label of the CAPTCHA challenge submit button when actionis set toBLOCK,blockActionis set toSHOW_CAPTCHA, and the request is blocked. If unspecified, defaults toYes, I am human.
- CaptchaTitle string
- The title used when showing a CAPTCHA challenge when actionis set toBLOCK,blockActionis set toSHOW_CAPTCHA, and the request is blocked. If unspecified, defaults toAre you human?
- Criterias
List<GetWaas Policies Waas Policy Waf Config Access Rule Criteria> 
- When defined, the JavaScript Challenge would be applied only for the requests that matched all the listed conditions.
- Name string
- The unique name of the whitelist.
- RedirectResponse stringCode 
- The response status code to return when actionis set toREDIRECT.- MOVED_PERMANENTLY: Used for designating the permanent movement of a page (numerical code - 301).
- FOUND: Used for designating the temporary movement of a page (numerical code - 302).
 
- RedirectUrl string
- The target to which the request should be redirected, represented as a URI reference. Required when actionisREDIRECT.
- ResponseHeader List<GetManipulations Waas Policies Waas Policy Waf Config Access Rule Response Header Manipulation> 
- An object that represents an action to apply to an HTTP response headers if all rule criteria will be matched regardless of actionvalue.
- Action string
- The action to take against requests from detected bots. If unspecified, defaults to DETECT.
- BlockAction string
- If actionis set toBLOCK, this specifies how the traffic is blocked when detected as malicious by a protection rule. If unspecified, defaults toSET_RESPONSE_CODE.
- BlockError stringPage Code 
- The error code to show on the error page when actionis set toBLOCK,blockActionis set toSHOW_ERROR_PAGE, and the traffic is detected as malicious by a protection rule. If unspecified, defaults to403.
- BlockError stringPage Description 
- The description text to show on the error page when actionis set toBLOCK,blockActionis set toSHOW_ERROR_PAGE, and the traffic is detected as malicious by a protection rule. If unspecified, defaults toAccess blocked by website owner. Please contact support.
- BlockError stringPage Message 
- The message to show on the error page when actionis set toBLOCK,blockActionis set toSHOW_ERROR_PAGE, and the traffic is detected as malicious by a protection rule. If unspecified, defaults to 'Access to the website is blocked.'
- BlockResponse intCode 
- The response code returned when actionis set toBLOCK,blockActionis set toSET_RESPONSE_CODE, and the traffic is detected as malicious by a protection rule. If unspecified, defaults to403. The list of available response codes:400,401,403,405,409,411,412,413,414,415,416,500,501,502,503,504,507.
- BypassChallenges []string
- The list of challenges to bypass when actionis set toBYPASS. If unspecified or empty, all challenges are bypassed.- JS_CHALLENGE: Bypasses JavaScript Challenge.
- DEVICE_FINGERPRINT_CHALLENGE: Bypasses Device Fingerprint Challenge.
- HUMAN_INTERACTION_CHALLENGE: Bypasses Human Interaction Challenge.
- CAPTCHA: Bypasses CAPTCHA Challenge.
 
- string
- The text to show in the footer when showing a CAPTCHA challenge when actionis set toBLOCK,blockActionis set toSHOW_CAPTCHA, and the request is blocked. If unspecified, default toEnter the letters and numbers as they are shown in image above.
- CaptchaHeader string
- The text to show in the header when showing a CAPTCHA challenge when actionis set toBLOCK,blockActionis set toSHOW_CAPTCHA, and the request is blocked. If unspecified, defaults toWe have detected an increased number of attempts to access this webapp. To help us keep this webapp secure, please let us know that you are not a robot by entering the text from captcha below.
- CaptchaSubmit stringLabel 
- The text to show on the label of the CAPTCHA challenge submit button when actionis set toBLOCK,blockActionis set toSHOW_CAPTCHA, and the request is blocked. If unspecified, defaults toYes, I am human.
- CaptchaTitle string
- The title used when showing a CAPTCHA challenge when actionis set toBLOCK,blockActionis set toSHOW_CAPTCHA, and the request is blocked. If unspecified, defaults toAre you human?
- Criterias
[]GetWaas Policies Waas Policy Waf Config Access Rule Criteria 
- When defined, the JavaScript Challenge would be applied only for the requests that matched all the listed conditions.
- Name string
- The unique name of the whitelist.
- RedirectResponse stringCode 
- The response status code to return when actionis set toREDIRECT.- MOVED_PERMANENTLY: Used for designating the permanent movement of a page (numerical code - 301).
- FOUND: Used for designating the temporary movement of a page (numerical code - 302).
 
- RedirectUrl string
- The target to which the request should be redirected, represented as a URI reference. Required when actionisREDIRECT.
- ResponseHeader []GetManipulations Waas Policies Waas Policy Waf Config Access Rule Response Header Manipulation 
- An object that represents an action to apply to an HTTP response headers if all rule criteria will be matched regardless of actionvalue.
- action String
- The action to take against requests from detected bots. If unspecified, defaults to DETECT.
- blockAction String
- If actionis set toBLOCK, this specifies how the traffic is blocked when detected as malicious by a protection rule. If unspecified, defaults toSET_RESPONSE_CODE.
- blockError StringPage Code 
- The error code to show on the error page when actionis set toBLOCK,blockActionis set toSHOW_ERROR_PAGE, and the traffic is detected as malicious by a protection rule. If unspecified, defaults to403.
- blockError StringPage Description 
- The description text to show on the error page when actionis set toBLOCK,blockActionis set toSHOW_ERROR_PAGE, and the traffic is detected as malicious by a protection rule. If unspecified, defaults toAccess blocked by website owner. Please contact support.
- blockError StringPage Message 
- The message to show on the error page when actionis set toBLOCK,blockActionis set toSHOW_ERROR_PAGE, and the traffic is detected as malicious by a protection rule. If unspecified, defaults to 'Access to the website is blocked.'
- blockResponse IntegerCode 
- The response code returned when actionis set toBLOCK,blockActionis set toSET_RESPONSE_CODE, and the traffic is detected as malicious by a protection rule. If unspecified, defaults to403. The list of available response codes:400,401,403,405,409,411,412,413,414,415,416,500,501,502,503,504,507.
- bypassChallenges List<String>
- The list of challenges to bypass when actionis set toBYPASS. If unspecified or empty, all challenges are bypassed.- JS_CHALLENGE: Bypasses JavaScript Challenge.
- DEVICE_FINGERPRINT_CHALLENGE: Bypasses Device Fingerprint Challenge.
- HUMAN_INTERACTION_CHALLENGE: Bypasses Human Interaction Challenge.
- CAPTCHA: Bypasses CAPTCHA Challenge.
 
- String
- The text to show in the footer when showing a CAPTCHA challenge when actionis set toBLOCK,blockActionis set toSHOW_CAPTCHA, and the request is blocked. If unspecified, default toEnter the letters and numbers as they are shown in image above.
- captchaHeader String
- The text to show in the header when showing a CAPTCHA challenge when actionis set toBLOCK,blockActionis set toSHOW_CAPTCHA, and the request is blocked. If unspecified, defaults toWe have detected an increased number of attempts to access this webapp. To help us keep this webapp secure, please let us know that you are not a robot by entering the text from captcha below.
- captchaSubmit StringLabel 
- The text to show on the label of the CAPTCHA challenge submit button when actionis set toBLOCK,blockActionis set toSHOW_CAPTCHA, and the request is blocked. If unspecified, defaults toYes, I am human.
- captchaTitle String
- The title used when showing a CAPTCHA challenge when actionis set toBLOCK,blockActionis set toSHOW_CAPTCHA, and the request is blocked. If unspecified, defaults toAre you human?
- criterias
List<GetPolicies Policy Waf Config Access Rule Criteria> 
- When defined, the JavaScript Challenge would be applied only for the requests that matched all the listed conditions.
- name String
- The unique name of the whitelist.
- redirectResponse StringCode 
- The response status code to return when actionis set toREDIRECT.- MOVED_PERMANENTLY: Used for designating the permanent movement of a page (numerical code - 301).
- FOUND: Used for designating the temporary movement of a page (numerical code - 302).
 
- redirectUrl String
- The target to which the request should be redirected, represented as a URI reference. Required when actionisREDIRECT.
- responseHeader List<GetManipulations Policies Policy Waf Config Access Rule Response Header Manipulation> 
- An object that represents an action to apply to an HTTP response headers if all rule criteria will be matched regardless of actionvalue.
- action string
- The action to take against requests from detected bots. If unspecified, defaults to DETECT.
- blockAction string
- If actionis set toBLOCK, this specifies how the traffic is blocked when detected as malicious by a protection rule. If unspecified, defaults toSET_RESPONSE_CODE.
- blockError stringPage Code 
- The error code to show on the error page when actionis set toBLOCK,blockActionis set toSHOW_ERROR_PAGE, and the traffic is detected as malicious by a protection rule. If unspecified, defaults to403.
- blockError stringPage Description 
- The description text to show on the error page when actionis set toBLOCK,blockActionis set toSHOW_ERROR_PAGE, and the traffic is detected as malicious by a protection rule. If unspecified, defaults toAccess blocked by website owner. Please contact support.
- blockError stringPage Message 
- The message to show on the error page when actionis set toBLOCK,blockActionis set toSHOW_ERROR_PAGE, and the traffic is detected as malicious by a protection rule. If unspecified, defaults to 'Access to the website is blocked.'
- blockResponse numberCode 
- The response code returned when actionis set toBLOCK,blockActionis set toSET_RESPONSE_CODE, and the traffic is detected as malicious by a protection rule. If unspecified, defaults to403. The list of available response codes:400,401,403,405,409,411,412,413,414,415,416,500,501,502,503,504,507.
- bypassChallenges string[]
- The list of challenges to bypass when actionis set toBYPASS. If unspecified or empty, all challenges are bypassed.- JS_CHALLENGE: Bypasses JavaScript Challenge.
- DEVICE_FINGERPRINT_CHALLENGE: Bypasses Device Fingerprint Challenge.
- HUMAN_INTERACTION_CHALLENGE: Bypasses Human Interaction Challenge.
- CAPTCHA: Bypasses CAPTCHA Challenge.
 
- string
- The text to show in the footer when showing a CAPTCHA challenge when actionis set toBLOCK,blockActionis set toSHOW_CAPTCHA, and the request is blocked. If unspecified, default toEnter the letters and numbers as they are shown in image above.
- captchaHeader string
- The text to show in the header when showing a CAPTCHA challenge when actionis set toBLOCK,blockActionis set toSHOW_CAPTCHA, and the request is blocked. If unspecified, defaults toWe have detected an increased number of attempts to access this webapp. To help us keep this webapp secure, please let us know that you are not a robot by entering the text from captcha below.
- captchaSubmit stringLabel 
- The text to show on the label of the CAPTCHA challenge submit button when actionis set toBLOCK,blockActionis set toSHOW_CAPTCHA, and the request is blocked. If unspecified, defaults toYes, I am human.
- captchaTitle string
- The title used when showing a CAPTCHA challenge when actionis set toBLOCK,blockActionis set toSHOW_CAPTCHA, and the request is blocked. If unspecified, defaults toAre you human?
- criterias
GetWaas Policies Waas Policy Waf Config Access Rule Criteria[] 
- When defined, the JavaScript Challenge would be applied only for the requests that matched all the listed conditions.
- name string
- The unique name of the whitelist.
- redirectResponse stringCode 
- The response status code to return when actionis set toREDIRECT.- MOVED_PERMANENTLY: Used for designating the permanent movement of a page (numerical code - 301).
- FOUND: Used for designating the temporary movement of a page (numerical code - 302).
 
- redirectUrl string
- The target to which the request should be redirected, represented as a URI reference. Required when actionisREDIRECT.
- responseHeader GetManipulations Waas Policies Waas Policy Waf Config Access Rule Response Header Manipulation[] 
- An object that represents an action to apply to an HTTP response headers if all rule criteria will be matched regardless of actionvalue.
- action str
- The action to take against requests from detected bots. If unspecified, defaults to DETECT.
- block_action str
- If actionis set toBLOCK, this specifies how the traffic is blocked when detected as malicious by a protection rule. If unspecified, defaults toSET_RESPONSE_CODE.
- block_error_ strpage_ code 
- The error code to show on the error page when actionis set toBLOCK,blockActionis set toSHOW_ERROR_PAGE, and the traffic is detected as malicious by a protection rule. If unspecified, defaults to403.
- block_error_ strpage_ description 
- The description text to show on the error page when actionis set toBLOCK,blockActionis set toSHOW_ERROR_PAGE, and the traffic is detected as malicious by a protection rule. If unspecified, defaults toAccess blocked by website owner. Please contact support.
- block_error_ strpage_ message 
- The message to show on the error page when actionis set toBLOCK,blockActionis set toSHOW_ERROR_PAGE, and the traffic is detected as malicious by a protection rule. If unspecified, defaults to 'Access to the website is blocked.'
- block_response_ intcode 
- The response code returned when actionis set toBLOCK,blockActionis set toSET_RESPONSE_CODE, and the traffic is detected as malicious by a protection rule. If unspecified, defaults to403. The list of available response codes:400,401,403,405,409,411,412,413,414,415,416,500,501,502,503,504,507.
- bypass_challenges Sequence[str]
- The list of challenges to bypass when actionis set toBYPASS. If unspecified or empty, all challenges are bypassed.- JS_CHALLENGE: Bypasses JavaScript Challenge.
- DEVICE_FINGERPRINT_CHALLENGE: Bypasses Device Fingerprint Challenge.
- HUMAN_INTERACTION_CHALLENGE: Bypasses Human Interaction Challenge.
- CAPTCHA: Bypasses CAPTCHA Challenge.
 
- str
- The text to show in the footer when showing a CAPTCHA challenge when actionis set toBLOCK,blockActionis set toSHOW_CAPTCHA, and the request is blocked. If unspecified, default toEnter the letters and numbers as they are shown in image above.
- captcha_header str
- The text to show in the header when showing a CAPTCHA challenge when actionis set toBLOCK,blockActionis set toSHOW_CAPTCHA, and the request is blocked. If unspecified, defaults toWe have detected an increased number of attempts to access this webapp. To help us keep this webapp secure, please let us know that you are not a robot by entering the text from captcha below.
- captcha_submit_ strlabel 
- The text to show on the label of the CAPTCHA challenge submit button when actionis set toBLOCK,blockActionis set toSHOW_CAPTCHA, and the request is blocked. If unspecified, defaults toYes, I am human.
- captcha_title str
- The title used when showing a CAPTCHA challenge when actionis set toBLOCK,blockActionis set toSHOW_CAPTCHA, and the request is blocked. If unspecified, defaults toAre you human?
- criterias
Sequence[waas.Get Waas Policies Waas Policy Waf Config Access Rule Criteria] 
- When defined, the JavaScript Challenge would be applied only for the requests that matched all the listed conditions.
- name str
- The unique name of the whitelist.
- redirect_response_ strcode 
- The response status code to return when actionis set toREDIRECT.- MOVED_PERMANENTLY: Used for designating the permanent movement of a page (numerical code - 301).
- FOUND: Used for designating the temporary movement of a page (numerical code - 302).
 
- redirect_url str
- The target to which the request should be redirected, represented as a URI reference. Required when actionisREDIRECT.
- response_header_ Sequence[waas.manipulations Get Waas Policies Waas Policy Waf Config Access Rule Response Header Manipulation] 
- An object that represents an action to apply to an HTTP response headers if all rule criteria will be matched regardless of actionvalue.
- action String
- The action to take against requests from detected bots. If unspecified, defaults to DETECT.
- blockAction String
- If actionis set toBLOCK, this specifies how the traffic is blocked when detected as malicious by a protection rule. If unspecified, defaults toSET_RESPONSE_CODE.
- blockError StringPage Code 
- The error code to show on the error page when actionis set toBLOCK,blockActionis set toSHOW_ERROR_PAGE, and the traffic is detected as malicious by a protection rule. If unspecified, defaults to403.
- blockError StringPage Description 
- The description text to show on the error page when actionis set toBLOCK,blockActionis set toSHOW_ERROR_PAGE, and the traffic is detected as malicious by a protection rule. If unspecified, defaults toAccess blocked by website owner. Please contact support.
- blockError StringPage Message 
- The message to show on the error page when actionis set toBLOCK,blockActionis set toSHOW_ERROR_PAGE, and the traffic is detected as malicious by a protection rule. If unspecified, defaults to 'Access to the website is blocked.'
- blockResponse NumberCode 
- The response code returned when actionis set toBLOCK,blockActionis set toSET_RESPONSE_CODE, and the traffic is detected as malicious by a protection rule. If unspecified, defaults to403. The list of available response codes:400,401,403,405,409,411,412,413,414,415,416,500,501,502,503,504,507.
- bypassChallenges List<String>
- The list of challenges to bypass when actionis set toBYPASS. If unspecified or empty, all challenges are bypassed.- JS_CHALLENGE: Bypasses JavaScript Challenge.
- DEVICE_FINGERPRINT_CHALLENGE: Bypasses Device Fingerprint Challenge.
- HUMAN_INTERACTION_CHALLENGE: Bypasses Human Interaction Challenge.
- CAPTCHA: Bypasses CAPTCHA Challenge.
 
- String
- The text to show in the footer when showing a CAPTCHA challenge when actionis set toBLOCK,blockActionis set toSHOW_CAPTCHA, and the request is blocked. If unspecified, default toEnter the letters and numbers as they are shown in image above.
- captchaHeader String
- The text to show in the header when showing a CAPTCHA challenge when actionis set toBLOCK,blockActionis set toSHOW_CAPTCHA, and the request is blocked. If unspecified, defaults toWe have detected an increased number of attempts to access this webapp. To help us keep this webapp secure, please let us know that you are not a robot by entering the text from captcha below.
- captchaSubmit StringLabel 
- The text to show on the label of the CAPTCHA challenge submit button when actionis set toBLOCK,blockActionis set toSHOW_CAPTCHA, and the request is blocked. If unspecified, defaults toYes, I am human.
- captchaTitle String
- The title used when showing a CAPTCHA challenge when actionis set toBLOCK,blockActionis set toSHOW_CAPTCHA, and the request is blocked. If unspecified, defaults toAre you human?
- criterias List<Property Map>
- When defined, the JavaScript Challenge would be applied only for the requests that matched all the listed conditions.
- name String
- The unique name of the whitelist.
- redirectResponse StringCode 
- The response status code to return when actionis set toREDIRECT.- MOVED_PERMANENTLY: Used for designating the permanent movement of a page (numerical code - 301).
- FOUND: Used for designating the temporary movement of a page (numerical code - 302).
 
- redirectUrl String
- The target to which the request should be redirected, represented as a URI reference. Required when actionisREDIRECT.
- responseHeader List<Property Map>Manipulations 
- An object that represents an action to apply to an HTTP response headers if all rule criteria will be matched regardless of actionvalue.
GetWaasPoliciesWaasPolicyWafConfigAccessRuleCriteria         
- Condition string
- The criteria the access rule and JavaScript Challenge uses to determine if action should be taken on a request.- URL_IS: Matches if the concatenation of request URL path and query is identical to the contents of the valuefield. URL must start with a/.
- URL_IS_NOT: Matches if the concatenation of request URL path and query is not identical to the contents of the valuefield. URL must start with a/.
- URL_STARTS_WITH: Matches if the concatenation of request URL path and query starts with the contents of the valuefield. URL must start with a/.
- URL_PART_ENDS_WITH: Matches if the concatenation of request URL path and query ends with the contents of the valuefield.
- URL_PART_CONTAINS: Matches if the concatenation of request URL path and query contains the contents of the valuefield.
- URL_REGEX: Matches if the concatenation of request URL path and query is described by the regular expression in the value field. The value must be a valid regular expression recognized by the PCRE library in Nginx (https://www.pcre.org).
- URL_DOES_NOT_MATCH_REGEX: Matches if the concatenation of request URL path and query is not described by the regular expression in the valuefield. The value must be a valid regular expression recognized by the PCRE library in Nginx (https://www.pcre.org).
- URL_DOES_NOT_START_WITH: Matches if the concatenation of request URL path and query does not start with the contents of the valuefield.
- URL_PART_DOES_NOT_CONTAIN: Matches if the concatenation of request URL path and query does not contain the contents of the valuefield.
- URL_PART_DOES_NOT_END_WITH: Matches if the concatenation of request URL path and query does not end with the contents of the valuefield.
- IP_IS: Matches if the request originates from one of the IP addresses contained in the defined address list. The valuein this case is string with one or multiple IPs or CIDR notations separated by new line symbol \n Example: "1.1.1.1\n1.1.1.2\n1.2.2.1/30"
- IP_IS_NOT: Matches if the request does not originate from any of the IP addresses contained in the defined address list. The valuein this case is string with one or multiple IPs or CIDR notations separated by new line symbol \n Example: "1.1.1.1\n1.1.1.2\n1.2.2.1/30"
- IP_IN_LIST: Matches if the request originates from one of the IP addresses contained in the referenced address list. The valuein this case is OCID of the address list.
- IP_NOT_IN_LIST: Matches if the request does not originate from any IP address contained in the referenced address list. The valuefield in this case is OCID of the address list.
- HTTP_HEADER_CONTAINS: The HTTP_HEADER_CONTAINS criteria is defined using a compound value separated by a colon: a header field name and a header field value. host:test.example.comis an example of a criteria value wherehostis the header field name andtest.example.comis the header field value. A request matches when the header field name is a case insensitive match and the header field value is a case insensitive, substring match. Example: With a criteria value ofhost:test.example.com, wherehostis the name of the field andtest.example.comis the value of the host field, a request with the header values,Host: www.test.example.comwill match, where as a request with header values ofhost: www.example.comorhost: test.sub.example.comwill not match.
- HTTP_METHOD_IS: Matches if the request method is identical to one of the values listed in field. The valuein this case is string with one or multiple HTTP methods separated by new line symbol \n The list of available methods:GET,HEAD,POST,PUT,DELETE,CONNECT,OPTIONS,TRACE,PATCH
 
- URL_IS: Matches if the concatenation of request URL path and query is identical to the contents of the 
- IsCase boolSensitive 
- When enabled, the condition will be matched with case-sensitive rules.
- Value string
- The value of the header.
- Condition string
- The criteria the access rule and JavaScript Challenge uses to determine if action should be taken on a request.- URL_IS: Matches if the concatenation of request URL path and query is identical to the contents of the valuefield. URL must start with a/.
- URL_IS_NOT: Matches if the concatenation of request URL path and query is not identical to the contents of the valuefield. URL must start with a/.
- URL_STARTS_WITH: Matches if the concatenation of request URL path and query starts with the contents of the valuefield. URL must start with a/.
- URL_PART_ENDS_WITH: Matches if the concatenation of request URL path and query ends with the contents of the valuefield.
- URL_PART_CONTAINS: Matches if the concatenation of request URL path and query contains the contents of the valuefield.
- URL_REGEX: Matches if the concatenation of request URL path and query is described by the regular expression in the value field. The value must be a valid regular expression recognized by the PCRE library in Nginx (https://www.pcre.org).
- URL_DOES_NOT_MATCH_REGEX: Matches if the concatenation of request URL path and query is not described by the regular expression in the valuefield. The value must be a valid regular expression recognized by the PCRE library in Nginx (https://www.pcre.org).
- URL_DOES_NOT_START_WITH: Matches if the concatenation of request URL path and query does not start with the contents of the valuefield.
- URL_PART_DOES_NOT_CONTAIN: Matches if the concatenation of request URL path and query does not contain the contents of the valuefield.
- URL_PART_DOES_NOT_END_WITH: Matches if the concatenation of request URL path and query does not end with the contents of the valuefield.
- IP_IS: Matches if the request originates from one of the IP addresses contained in the defined address list. The valuein this case is string with one or multiple IPs or CIDR notations separated by new line symbol \n Example: "1.1.1.1\n1.1.1.2\n1.2.2.1/30"
- IP_IS_NOT: Matches if the request does not originate from any of the IP addresses contained in the defined address list. The valuein this case is string with one or multiple IPs or CIDR notations separated by new line symbol \n Example: "1.1.1.1\n1.1.1.2\n1.2.2.1/30"
- IP_IN_LIST: Matches if the request originates from one of the IP addresses contained in the referenced address list. The valuein this case is OCID of the address list.
- IP_NOT_IN_LIST: Matches if the request does not originate from any IP address contained in the referenced address list. The valuefield in this case is OCID of the address list.
- HTTP_HEADER_CONTAINS: The HTTP_HEADER_CONTAINS criteria is defined using a compound value separated by a colon: a header field name and a header field value. host:test.example.comis an example of a criteria value wherehostis the header field name andtest.example.comis the header field value. A request matches when the header field name is a case insensitive match and the header field value is a case insensitive, substring match. Example: With a criteria value ofhost:test.example.com, wherehostis the name of the field andtest.example.comis the value of the host field, a request with the header values,Host: www.test.example.comwill match, where as a request with header values ofhost: www.example.comorhost: test.sub.example.comwill not match.
- HTTP_METHOD_IS: Matches if the request method is identical to one of the values listed in field. The valuein this case is string with one or multiple HTTP methods separated by new line symbol \n The list of available methods:GET,HEAD,POST,PUT,DELETE,CONNECT,OPTIONS,TRACE,PATCH
 
- URL_IS: Matches if the concatenation of request URL path and query is identical to the contents of the 
- IsCase boolSensitive 
- When enabled, the condition will be matched with case-sensitive rules.
- Value string
- The value of the header.
- condition String
- The criteria the access rule and JavaScript Challenge uses to determine if action should be taken on a request.- URL_IS: Matches if the concatenation of request URL path and query is identical to the contents of the valuefield. URL must start with a/.
- URL_IS_NOT: Matches if the concatenation of request URL path and query is not identical to the contents of the valuefield. URL must start with a/.
- URL_STARTS_WITH: Matches if the concatenation of request URL path and query starts with the contents of the valuefield. URL must start with a/.
- URL_PART_ENDS_WITH: Matches if the concatenation of request URL path and query ends with the contents of the valuefield.
- URL_PART_CONTAINS: Matches if the concatenation of request URL path and query contains the contents of the valuefield.
- URL_REGEX: Matches if the concatenation of request URL path and query is described by the regular expression in the value field. The value must be a valid regular expression recognized by the PCRE library in Nginx (https://www.pcre.org).
- URL_DOES_NOT_MATCH_REGEX: Matches if the concatenation of request URL path and query is not described by the regular expression in the valuefield. The value must be a valid regular expression recognized by the PCRE library in Nginx (https://www.pcre.org).
- URL_DOES_NOT_START_WITH: Matches if the concatenation of request URL path and query does not start with the contents of the valuefield.
- URL_PART_DOES_NOT_CONTAIN: Matches if the concatenation of request URL path and query does not contain the contents of the valuefield.
- URL_PART_DOES_NOT_END_WITH: Matches if the concatenation of request URL path and query does not end with the contents of the valuefield.
- IP_IS: Matches if the request originates from one of the IP addresses contained in the defined address list. The valuein this case is string with one or multiple IPs or CIDR notations separated by new line symbol \n Example: "1.1.1.1\n1.1.1.2\n1.2.2.1/30"
- IP_IS_NOT: Matches if the request does not originate from any of the IP addresses contained in the defined address list. The valuein this case is string with one or multiple IPs or CIDR notations separated by new line symbol \n Example: "1.1.1.1\n1.1.1.2\n1.2.2.1/30"
- IP_IN_LIST: Matches if the request originates from one of the IP addresses contained in the referenced address list. The valuein this case is OCID of the address list.
- IP_NOT_IN_LIST: Matches if the request does not originate from any IP address contained in the referenced address list. The valuefield in this case is OCID of the address list.
- HTTP_HEADER_CONTAINS: The HTTP_HEADER_CONTAINS criteria is defined using a compound value separated by a colon: a header field name and a header field value. host:test.example.comis an example of a criteria value wherehostis the header field name andtest.example.comis the header field value. A request matches when the header field name is a case insensitive match and the header field value is a case insensitive, substring match. Example: With a criteria value ofhost:test.example.com, wherehostis the name of the field andtest.example.comis the value of the host field, a request with the header values,Host: www.test.example.comwill match, where as a request with header values ofhost: www.example.comorhost: test.sub.example.comwill not match.
- HTTP_METHOD_IS: Matches if the request method is identical to one of the values listed in field. The valuein this case is string with one or multiple HTTP methods separated by new line symbol \n The list of available methods:GET,HEAD,POST,PUT,DELETE,CONNECT,OPTIONS,TRACE,PATCH
 
- URL_IS: Matches if the concatenation of request URL path and query is identical to the contents of the 
- isCase BooleanSensitive 
- When enabled, the condition will be matched with case-sensitive rules.
- value String
- The value of the header.
- condition string
- The criteria the access rule and JavaScript Challenge uses to determine if action should be taken on a request.- URL_IS: Matches if the concatenation of request URL path and query is identical to the contents of the valuefield. URL must start with a/.
- URL_IS_NOT: Matches if the concatenation of request URL path and query is not identical to the contents of the valuefield. URL must start with a/.
- URL_STARTS_WITH: Matches if the concatenation of request URL path and query starts with the contents of the valuefield. URL must start with a/.
- URL_PART_ENDS_WITH: Matches if the concatenation of request URL path and query ends with the contents of the valuefield.
- URL_PART_CONTAINS: Matches if the concatenation of request URL path and query contains the contents of the valuefield.
- URL_REGEX: Matches if the concatenation of request URL path and query is described by the regular expression in the value field. The value must be a valid regular expression recognized by the PCRE library in Nginx (https://www.pcre.org).
- URL_DOES_NOT_MATCH_REGEX: Matches if the concatenation of request URL path and query is not described by the regular expression in the valuefield. The value must be a valid regular expression recognized by the PCRE library in Nginx (https://www.pcre.org).
- URL_DOES_NOT_START_WITH: Matches if the concatenation of request URL path and query does not start with the contents of the valuefield.
- URL_PART_DOES_NOT_CONTAIN: Matches if the concatenation of request URL path and query does not contain the contents of the valuefield.
- URL_PART_DOES_NOT_END_WITH: Matches if the concatenation of request URL path and query does not end with the contents of the valuefield.
- IP_IS: Matches if the request originates from one of the IP addresses contained in the defined address list. The valuein this case is string with one or multiple IPs or CIDR notations separated by new line symbol \n Example: "1.1.1.1\n1.1.1.2\n1.2.2.1/30"
- IP_IS_NOT: Matches if the request does not originate from any of the IP addresses contained in the defined address list. The valuein this case is string with one or multiple IPs or CIDR notations separated by new line symbol \n Example: "1.1.1.1\n1.1.1.2\n1.2.2.1/30"
- IP_IN_LIST: Matches if the request originates from one of the IP addresses contained in the referenced address list. The valuein this case is OCID of the address list.
- IP_NOT_IN_LIST: Matches if the request does not originate from any IP address contained in the referenced address list. The valuefield in this case is OCID of the address list.
- HTTP_HEADER_CONTAINS: The HTTP_HEADER_CONTAINS criteria is defined using a compound value separated by a colon: a header field name and a header field value. host:test.example.comis an example of a criteria value wherehostis the header field name andtest.example.comis the header field value. A request matches when the header field name is a case insensitive match and the header field value is a case insensitive, substring match. Example: With a criteria value ofhost:test.example.com, wherehostis the name of the field andtest.example.comis the value of the host field, a request with the header values,Host: www.test.example.comwill match, where as a request with header values ofhost: www.example.comorhost: test.sub.example.comwill not match.
- HTTP_METHOD_IS: Matches if the request method is identical to one of the values listed in field. The valuein this case is string with one or multiple HTTP methods separated by new line symbol \n The list of available methods:GET,HEAD,POST,PUT,DELETE,CONNECT,OPTIONS,TRACE,PATCH
 
- URL_IS: Matches if the concatenation of request URL path and query is identical to the contents of the 
- isCase booleanSensitive 
- When enabled, the condition will be matched with case-sensitive rules.
- value string
- The value of the header.
- condition str
- The criteria the access rule and JavaScript Challenge uses to determine if action should be taken on a request.- URL_IS: Matches if the concatenation of request URL path and query is identical to the contents of the valuefield. URL must start with a/.
- URL_IS_NOT: Matches if the concatenation of request URL path and query is not identical to the contents of the valuefield. URL must start with a/.
- URL_STARTS_WITH: Matches if the concatenation of request URL path and query starts with the contents of the valuefield. URL must start with a/.
- URL_PART_ENDS_WITH: Matches if the concatenation of request URL path and query ends with the contents of the valuefield.
- URL_PART_CONTAINS: Matches if the concatenation of request URL path and query contains the contents of the valuefield.
- URL_REGEX: Matches if the concatenation of request URL path and query is described by the regular expression in the value field. The value must be a valid regular expression recognized by the PCRE library in Nginx (https://www.pcre.org).
- URL_DOES_NOT_MATCH_REGEX: Matches if the concatenation of request URL path and query is not described by the regular expression in the valuefield. The value must be a valid regular expression recognized by the PCRE library in Nginx (https://www.pcre.org).
- URL_DOES_NOT_START_WITH: Matches if the concatenation of request URL path and query does not start with the contents of the valuefield.
- URL_PART_DOES_NOT_CONTAIN: Matches if the concatenation of request URL path and query does not contain the contents of the valuefield.
- URL_PART_DOES_NOT_END_WITH: Matches if the concatenation of request URL path and query does not end with the contents of the valuefield.
- IP_IS: Matches if the request originates from one of the IP addresses contained in the defined address list. The valuein this case is string with one or multiple IPs or CIDR notations separated by new line symbol \n Example: "1.1.1.1\n1.1.1.2\n1.2.2.1/30"
- IP_IS_NOT: Matches if the request does not originate from any of the IP addresses contained in the defined address list. The valuein this case is string with one or multiple IPs or CIDR notations separated by new line symbol \n Example: "1.1.1.1\n1.1.1.2\n1.2.2.1/30"
- IP_IN_LIST: Matches if the request originates from one of the IP addresses contained in the referenced address list. The valuein this case is OCID of the address list.
- IP_NOT_IN_LIST: Matches if the request does not originate from any IP address contained in the referenced address list. The valuefield in this case is OCID of the address list.
- HTTP_HEADER_CONTAINS: The HTTP_HEADER_CONTAINS criteria is defined using a compound value separated by a colon: a header field name and a header field value. host:test.example.comis an example of a criteria value wherehostis the header field name andtest.example.comis the header field value. A request matches when the header field name is a case insensitive match and the header field value is a case insensitive, substring match. Example: With a criteria value ofhost:test.example.com, wherehostis the name of the field andtest.example.comis the value of the host field, a request with the header values,Host: www.test.example.comwill match, where as a request with header values ofhost: www.example.comorhost: test.sub.example.comwill not match.
- HTTP_METHOD_IS: Matches if the request method is identical to one of the values listed in field. The valuein this case is string with one or multiple HTTP methods separated by new line symbol \n The list of available methods:GET,HEAD,POST,PUT,DELETE,CONNECT,OPTIONS,TRACE,PATCH
 
- URL_IS: Matches if the concatenation of request URL path and query is identical to the contents of the 
- is_case_ boolsensitive 
- When enabled, the condition will be matched with case-sensitive rules.
- value str
- The value of the header.
- condition String
- The criteria the access rule and JavaScript Challenge uses to determine if action should be taken on a request.- URL_IS: Matches if the concatenation of request URL path and query is identical to the contents of the valuefield. URL must start with a/.
- URL_IS_NOT: Matches if the concatenation of request URL path and query is not identical to the contents of the valuefield. URL must start with a/.
- URL_STARTS_WITH: Matches if the concatenation of request URL path and query starts with the contents of the valuefield. URL must start with a/.
- URL_PART_ENDS_WITH: Matches if the concatenation of request URL path and query ends with the contents of the valuefield.
- URL_PART_CONTAINS: Matches if the concatenation of request URL path and query contains the contents of the valuefield.
- URL_REGEX: Matches if the concatenation of request URL path and query is described by the regular expression in the value field. The value must be a valid regular expression recognized by the PCRE library in Nginx (https://www.pcre.org).
- URL_DOES_NOT_MATCH_REGEX: Matches if the concatenation of request URL path and query is not described by the regular expression in the valuefield. The value must be a valid regular expression recognized by the PCRE library in Nginx (https://www.pcre.org).
- URL_DOES_NOT_START_WITH: Matches if the concatenation of request URL path and query does not start with the contents of the valuefield.
- URL_PART_DOES_NOT_CONTAIN: Matches if the concatenation of request URL path and query does not contain the contents of the valuefield.
- URL_PART_DOES_NOT_END_WITH: Matches if the concatenation of request URL path and query does not end with the contents of the valuefield.
- IP_IS: Matches if the request originates from one of the IP addresses contained in the defined address list. The valuein this case is string with one or multiple IPs or CIDR notations separated by new line symbol \n Example: "1.1.1.1\n1.1.1.2\n1.2.2.1/30"
- IP_IS_NOT: Matches if the request does not originate from any of the IP addresses contained in the defined address list. The valuein this case is string with one or multiple IPs or CIDR notations separated by new line symbol \n Example: "1.1.1.1\n1.1.1.2\n1.2.2.1/30"
- IP_IN_LIST: Matches if the request originates from one of the IP addresses contained in the referenced address list. The valuein this case is OCID of the address list.
- IP_NOT_IN_LIST: Matches if the request does not originate from any IP address contained in the referenced address list. The valuefield in this case is OCID of the address list.
- HTTP_HEADER_CONTAINS: The HTTP_HEADER_CONTAINS criteria is defined using a compound value separated by a colon: a header field name and a header field value. host:test.example.comis an example of a criteria value wherehostis the header field name andtest.example.comis the header field value. A request matches when the header field name is a case insensitive match and the header field value is a case insensitive, substring match. Example: With a criteria value ofhost:test.example.com, wherehostis the name of the field andtest.example.comis the value of the host field, a request with the header values,Host: www.test.example.comwill match, where as a request with header values ofhost: www.example.comorhost: test.sub.example.comwill not match.
- HTTP_METHOD_IS: Matches if the request method is identical to one of the values listed in field. The valuein this case is string with one or multiple HTTP methods separated by new line symbol \n The list of available methods:GET,HEAD,POST,PUT,DELETE,CONNECT,OPTIONS,TRACE,PATCH
 
- URL_IS: Matches if the concatenation of request URL path and query is identical to the contents of the 
- isCase BooleanSensitive 
- When enabled, the condition will be matched with case-sensitive rules.
- value String
- The value of the header.
GetWaasPoliciesWaasPolicyWafConfigAccessRuleResponseHeaderManipulation           
GetWaasPoliciesWaasPolicyWafConfigAddressRateLimiting         
- AllowedRate intPer Address 
- The number of allowed requests per second from one IP address. If unspecified, defaults to 1.
- BlockResponse intCode 
- The response code returned when actionis set toBLOCK,blockActionis set toSET_RESPONSE_CODE, and the traffic is detected as malicious by a protection rule. If unspecified, defaults to403. The list of available response codes:400,401,403,405,409,411,412,413,414,415,416,500,501,502,503,504,507.
- IsEnabled bool
- Enables or disables the JavaScript challenge Web Application Firewall feature.
- MaxDelayed intCount Per Address 
- The maximum number of requests allowed to be queued before subsequent requests are dropped. If unspecified, defaults to 10.
- AllowedRate intPer Address 
- The number of allowed requests per second from one IP address. If unspecified, defaults to 1.
- BlockResponse intCode 
- The response code returned when actionis set toBLOCK,blockActionis set toSET_RESPONSE_CODE, and the traffic is detected as malicious by a protection rule. If unspecified, defaults to403. The list of available response codes:400,401,403,405,409,411,412,413,414,415,416,500,501,502,503,504,507.
- IsEnabled bool
- Enables or disables the JavaScript challenge Web Application Firewall feature.
- MaxDelayed intCount Per Address 
- The maximum number of requests allowed to be queued before subsequent requests are dropped. If unspecified, defaults to 10.
- allowedRate IntegerPer Address 
- The number of allowed requests per second from one IP address. If unspecified, defaults to 1.
- blockResponse IntegerCode 
- The response code returned when actionis set toBLOCK,blockActionis set toSET_RESPONSE_CODE, and the traffic is detected as malicious by a protection rule. If unspecified, defaults to403. The list of available response codes:400,401,403,405,409,411,412,413,414,415,416,500,501,502,503,504,507.
- isEnabled Boolean
- Enables or disables the JavaScript challenge Web Application Firewall feature.
- maxDelayed IntegerCount Per Address 
- The maximum number of requests allowed to be queued before subsequent requests are dropped. If unspecified, defaults to 10.
- allowedRate numberPer Address 
- The number of allowed requests per second from one IP address. If unspecified, defaults to 1.
- blockResponse numberCode 
- The response code returned when actionis set toBLOCK,blockActionis set toSET_RESPONSE_CODE, and the traffic is detected as malicious by a protection rule. If unspecified, defaults to403. The list of available response codes:400,401,403,405,409,411,412,413,414,415,416,500,501,502,503,504,507.
- isEnabled boolean
- Enables or disables the JavaScript challenge Web Application Firewall feature.
- maxDelayed numberCount Per Address 
- The maximum number of requests allowed to be queued before subsequent requests are dropped. If unspecified, defaults to 10.
- allowed_rate_ intper_ address 
- The number of allowed requests per second from one IP address. If unspecified, defaults to 1.
- block_response_ intcode 
- The response code returned when actionis set toBLOCK,blockActionis set toSET_RESPONSE_CODE, and the traffic is detected as malicious by a protection rule. If unspecified, defaults to403. The list of available response codes:400,401,403,405,409,411,412,413,414,415,416,500,501,502,503,504,507.
- is_enabled bool
- Enables or disables the JavaScript challenge Web Application Firewall feature.
- max_delayed_ intcount_ per_ address 
- The maximum number of requests allowed to be queued before subsequent requests are dropped. If unspecified, defaults to 10.
- allowedRate NumberPer Address 
- The number of allowed requests per second from one IP address. If unspecified, defaults to 1.
- blockResponse NumberCode 
- The response code returned when actionis set toBLOCK,blockActionis set toSET_RESPONSE_CODE, and the traffic is detected as malicious by a protection rule. If unspecified, defaults to403. The list of available response codes:400,401,403,405,409,411,412,413,414,415,416,500,501,502,503,504,507.
- isEnabled Boolean
- Enables or disables the JavaScript challenge Web Application Firewall feature.
- maxDelayed NumberCount Per Address 
- The maximum number of requests allowed to be queued before subsequent requests are dropped. If unspecified, defaults to 10.
GetWaasPoliciesWaasPolicyWafConfigCachingRule        
- Action string
- The action to take against requests from detected bots. If unspecified, defaults to DETECT.
- CachingDuration string
- The duration to cache content for the caching rule, specified in ISO 8601 extended format. Supported units: seconds, minutes, hours, days, weeks, months. The maximum value that can be set for any unit is 99. Mixing of multiple units is not supported. Only applies when theactionis set toCACHE. Example:PT1H
- ClientCaching stringDuration 
- The duration to cache content in the user's browser, specified in ISO 8601 extended format. Supported units: seconds, minutes, hours, days, weeks, months. The maximum value that can be set for any unit is 99. Mixing of multiple units is not supported. Only applies when theactionis set toCACHE. Example:PT1H
- Criterias
List<GetWaas Policies Waas Policy Waf Config Caching Rule Criteria> 
- When defined, the JavaScript Challenge would be applied only for the requests that matched all the listed conditions.
- IsClient boolCaching Enabled 
- Enables or disables client caching. Browsers use the Cache-Controlheader value for caching content locally in the browser. This setting overrides the addition of aCache-Controlheader in responses.
- Key string
- The unique key for the caching rule.
- Name string
- The unique name of the whitelist.
- Action string
- The action to take against requests from detected bots. If unspecified, defaults to DETECT.
- CachingDuration string
- The duration to cache content for the caching rule, specified in ISO 8601 extended format. Supported units: seconds, minutes, hours, days, weeks, months. The maximum value that can be set for any unit is 99. Mixing of multiple units is not supported. Only applies when theactionis set toCACHE. Example:PT1H
- ClientCaching stringDuration 
- The duration to cache content in the user's browser, specified in ISO 8601 extended format. Supported units: seconds, minutes, hours, days, weeks, months. The maximum value that can be set for any unit is 99. Mixing of multiple units is not supported. Only applies when theactionis set toCACHE. Example:PT1H
- Criterias
[]GetWaas Policies Waas Policy Waf Config Caching Rule Criteria 
- When defined, the JavaScript Challenge would be applied only for the requests that matched all the listed conditions.
- IsClient boolCaching Enabled 
- Enables or disables client caching. Browsers use the Cache-Controlheader value for caching content locally in the browser. This setting overrides the addition of aCache-Controlheader in responses.
- Key string
- The unique key for the caching rule.
- Name string
- The unique name of the whitelist.
- action String
- The action to take against requests from detected bots. If unspecified, defaults to DETECT.
- cachingDuration String
- The duration to cache content for the caching rule, specified in ISO 8601 extended format. Supported units: seconds, minutes, hours, days, weeks, months. The maximum value that can be set for any unit is 99. Mixing of multiple units is not supported. Only applies when theactionis set toCACHE. Example:PT1H
- clientCaching StringDuration 
- The duration to cache content in the user's browser, specified in ISO 8601 extended format. Supported units: seconds, minutes, hours, days, weeks, months. The maximum value that can be set for any unit is 99. Mixing of multiple units is not supported. Only applies when theactionis set toCACHE. Example:PT1H
- criterias
List<GetPolicies Policy Waf Config Caching Rule Criteria> 
- When defined, the JavaScript Challenge would be applied only for the requests that matched all the listed conditions.
- isClient BooleanCaching Enabled 
- Enables or disables client caching. Browsers use the Cache-Controlheader value for caching content locally in the browser. This setting overrides the addition of aCache-Controlheader in responses.
- key String
- The unique key for the caching rule.
- name String
- The unique name of the whitelist.
- action string
- The action to take against requests from detected bots. If unspecified, defaults to DETECT.
- cachingDuration string
- The duration to cache content for the caching rule, specified in ISO 8601 extended format. Supported units: seconds, minutes, hours, days, weeks, months. The maximum value that can be set for any unit is 99. Mixing of multiple units is not supported. Only applies when theactionis set toCACHE. Example:PT1H
- clientCaching stringDuration 
- The duration to cache content in the user's browser, specified in ISO 8601 extended format. Supported units: seconds, minutes, hours, days, weeks, months. The maximum value that can be set for any unit is 99. Mixing of multiple units is not supported. Only applies when theactionis set toCACHE. Example:PT1H
- criterias
GetWaas Policies Waas Policy Waf Config Caching Rule Criteria[] 
- When defined, the JavaScript Challenge would be applied only for the requests that matched all the listed conditions.
- isClient booleanCaching Enabled 
- Enables or disables client caching. Browsers use the Cache-Controlheader value for caching content locally in the browser. This setting overrides the addition of aCache-Controlheader in responses.
- key string
- The unique key for the caching rule.
- name string
- The unique name of the whitelist.
- action str
- The action to take against requests from detected bots. If unspecified, defaults to DETECT.
- caching_duration str
- The duration to cache content for the caching rule, specified in ISO 8601 extended format. Supported units: seconds, minutes, hours, days, weeks, months. The maximum value that can be set for any unit is 99. Mixing of multiple units is not supported. Only applies when theactionis set toCACHE. Example:PT1H
- client_caching_ strduration 
- The duration to cache content in the user's browser, specified in ISO 8601 extended format. Supported units: seconds, minutes, hours, days, weeks, months. The maximum value that can be set for any unit is 99. Mixing of multiple units is not supported. Only applies when theactionis set toCACHE. Example:PT1H
- criterias
Sequence[waas.Get Waas Policies Waas Policy Waf Config Caching Rule Criteria] 
- When defined, the JavaScript Challenge would be applied only for the requests that matched all the listed conditions.
- is_client_ boolcaching_ enabled 
- Enables or disables client caching. Browsers use the Cache-Controlheader value for caching content locally in the browser. This setting overrides the addition of aCache-Controlheader in responses.
- key str
- The unique key for the caching rule.
- name str
- The unique name of the whitelist.
- action String
- The action to take against requests from detected bots. If unspecified, defaults to DETECT.
- cachingDuration String
- The duration to cache content for the caching rule, specified in ISO 8601 extended format. Supported units: seconds, minutes, hours, days, weeks, months. The maximum value that can be set for any unit is 99. Mixing of multiple units is not supported. Only applies when theactionis set toCACHE. Example:PT1H
- clientCaching StringDuration 
- The duration to cache content in the user's browser, specified in ISO 8601 extended format. Supported units: seconds, minutes, hours, days, weeks, months. The maximum value that can be set for any unit is 99. Mixing of multiple units is not supported. Only applies when theactionis set toCACHE. Example:PT1H
- criterias List<Property Map>
- When defined, the JavaScript Challenge would be applied only for the requests that matched all the listed conditions.
- isClient BooleanCaching Enabled 
- Enables or disables client caching. Browsers use the Cache-Controlheader value for caching content locally in the browser. This setting overrides the addition of aCache-Controlheader in responses.
- key String
- The unique key for the caching rule.
- name String
- The unique name of the whitelist.
GetWaasPoliciesWaasPolicyWafConfigCachingRuleCriteria         
- Condition string
- The criteria the access rule and JavaScript Challenge uses to determine if action should be taken on a request.- URL_IS: Matches if the concatenation of request URL path and query is identical to the contents of the valuefield. URL must start with a/.
- URL_IS_NOT: Matches if the concatenation of request URL path and query is not identical to the contents of the valuefield. URL must start with a/.
- URL_STARTS_WITH: Matches if the concatenation of request URL path and query starts with the contents of the valuefield. URL must start with a/.
- URL_PART_ENDS_WITH: Matches if the concatenation of request URL path and query ends with the contents of the valuefield.
- URL_PART_CONTAINS: Matches if the concatenation of request URL path and query contains the contents of the valuefield.
- URL_REGEX: Matches if the concatenation of request URL path and query is described by the regular expression in the value field. The value must be a valid regular expression recognized by the PCRE library in Nginx (https://www.pcre.org).
- URL_DOES_NOT_MATCH_REGEX: Matches if the concatenation of request URL path and query is not described by the regular expression in the valuefield. The value must be a valid regular expression recognized by the PCRE library in Nginx (https://www.pcre.org).
- URL_DOES_NOT_START_WITH: Matches if the concatenation of request URL path and query does not start with the contents of the valuefield.
- URL_PART_DOES_NOT_CONTAIN: Matches if the concatenation of request URL path and query does not contain the contents of the valuefield.
- URL_PART_DOES_NOT_END_WITH: Matches if the concatenation of request URL path and query does not end with the contents of the valuefield.
- IP_IS: Matches if the request originates from one of the IP addresses contained in the defined address list. The valuein this case is string with one or multiple IPs or CIDR notations separated by new line symbol \n Example: "1.1.1.1\n1.1.1.2\n1.2.2.1/30"
- IP_IS_NOT: Matches if the request does not originate from any of the IP addresses contained in the defined address list. The valuein this case is string with one or multiple IPs or CIDR notations separated by new line symbol \n Example: "1.1.1.1\n1.1.1.2\n1.2.2.1/30"
- IP_IN_LIST: Matches if the request originates from one of the IP addresses contained in the referenced address list. The valuein this case is OCID of the address list.
- IP_NOT_IN_LIST: Matches if the request does not originate from any IP address contained in the referenced address list. The valuefield in this case is OCID of the address list.
- HTTP_HEADER_CONTAINS: The HTTP_HEADER_CONTAINS criteria is defined using a compound value separated by a colon: a header field name and a header field value. host:test.example.comis an example of a criteria value wherehostis the header field name andtest.example.comis the header field value. A request matches when the header field name is a case insensitive match and the header field value is a case insensitive, substring match. Example: With a criteria value ofhost:test.example.com, wherehostis the name of the field andtest.example.comis the value of the host field, a request with the header values,Host: www.test.example.comwill match, where as a request with header values ofhost: www.example.comorhost: test.sub.example.comwill not match.
- HTTP_METHOD_IS: Matches if the request method is identical to one of the values listed in field. The valuein this case is string with one or multiple HTTP methods separated by new line symbol \n The list of available methods:GET,HEAD,POST,PUT,DELETE,CONNECT,OPTIONS,TRACE,PATCH
 
- URL_IS: Matches if the concatenation of request URL path and query is identical to the contents of the 
- Value string
- The value of the header.
- Condition string
- The criteria the access rule and JavaScript Challenge uses to determine if action should be taken on a request.- URL_IS: Matches if the concatenation of request URL path and query is identical to the contents of the valuefield. URL must start with a/.
- URL_IS_NOT: Matches if the concatenation of request URL path and query is not identical to the contents of the valuefield. URL must start with a/.
- URL_STARTS_WITH: Matches if the concatenation of request URL path and query starts with the contents of the valuefield. URL must start with a/.
- URL_PART_ENDS_WITH: Matches if the concatenation of request URL path and query ends with the contents of the valuefield.
- URL_PART_CONTAINS: Matches if the concatenation of request URL path and query contains the contents of the valuefield.
- URL_REGEX: Matches if the concatenation of request URL path and query is described by the regular expression in the value field. The value must be a valid regular expression recognized by the PCRE library in Nginx (https://www.pcre.org).
- URL_DOES_NOT_MATCH_REGEX: Matches if the concatenation of request URL path and query is not described by the regular expression in the valuefield. The value must be a valid regular expression recognized by the PCRE library in Nginx (https://www.pcre.org).
- URL_DOES_NOT_START_WITH: Matches if the concatenation of request URL path and query does not start with the contents of the valuefield.
- URL_PART_DOES_NOT_CONTAIN: Matches if the concatenation of request URL path and query does not contain the contents of the valuefield.
- URL_PART_DOES_NOT_END_WITH: Matches if the concatenation of request URL path and query does not end with the contents of the valuefield.
- IP_IS: Matches if the request originates from one of the IP addresses contained in the defined address list. The valuein this case is string with one or multiple IPs or CIDR notations separated by new line symbol \n Example: "1.1.1.1\n1.1.1.2\n1.2.2.1/30"
- IP_IS_NOT: Matches if the request does not originate from any of the IP addresses contained in the defined address list. The valuein this case is string with one or multiple IPs or CIDR notations separated by new line symbol \n Example: "1.1.1.1\n1.1.1.2\n1.2.2.1/30"
- IP_IN_LIST: Matches if the request originates from one of the IP addresses contained in the referenced address list. The valuein this case is OCID of the address list.
- IP_NOT_IN_LIST: Matches if the request does not originate from any IP address contained in the referenced address list. The valuefield in this case is OCID of the address list.
- HTTP_HEADER_CONTAINS: The HTTP_HEADER_CONTAINS criteria is defined using a compound value separated by a colon: a header field name and a header field value. host:test.example.comis an example of a criteria value wherehostis the header field name andtest.example.comis the header field value. A request matches when the header field name is a case insensitive match and the header field value is a case insensitive, substring match. Example: With a criteria value ofhost:test.example.com, wherehostis the name of the field andtest.example.comis the value of the host field, a request with the header values,Host: www.test.example.comwill match, where as a request with header values ofhost: www.example.comorhost: test.sub.example.comwill not match.
- HTTP_METHOD_IS: Matches if the request method is identical to one of the values listed in field. The valuein this case is string with one or multiple HTTP methods separated by new line symbol \n The list of available methods:GET,HEAD,POST,PUT,DELETE,CONNECT,OPTIONS,TRACE,PATCH
 
- URL_IS: Matches if the concatenation of request URL path and query is identical to the contents of the 
- Value string
- The value of the header.
- condition String
- The criteria the access rule and JavaScript Challenge uses to determine if action should be taken on a request.- URL_IS: Matches if the concatenation of request URL path and query is identical to the contents of the valuefield. URL must start with a/.
- URL_IS_NOT: Matches if the concatenation of request URL path and query is not identical to the contents of the valuefield. URL must start with a/.
- URL_STARTS_WITH: Matches if the concatenation of request URL path and query starts with the contents of the valuefield. URL must start with a/.
- URL_PART_ENDS_WITH: Matches if the concatenation of request URL path and query ends with the contents of the valuefield.
- URL_PART_CONTAINS: Matches if the concatenation of request URL path and query contains the contents of the valuefield.
- URL_REGEX: Matches if the concatenation of request URL path and query is described by the regular expression in the value field. The value must be a valid regular expression recognized by the PCRE library in Nginx (https://www.pcre.org).
- URL_DOES_NOT_MATCH_REGEX: Matches if the concatenation of request URL path and query is not described by the regular expression in the valuefield. The value must be a valid regular expression recognized by the PCRE library in Nginx (https://www.pcre.org).
- URL_DOES_NOT_START_WITH: Matches if the concatenation of request URL path and query does not start with the contents of the valuefield.
- URL_PART_DOES_NOT_CONTAIN: Matches if the concatenation of request URL path and query does not contain the contents of the valuefield.
- URL_PART_DOES_NOT_END_WITH: Matches if the concatenation of request URL path and query does not end with the contents of the valuefield.
- IP_IS: Matches if the request originates from one of the IP addresses contained in the defined address list. The valuein this case is string with one or multiple IPs or CIDR notations separated by new line symbol \n Example: "1.1.1.1\n1.1.1.2\n1.2.2.1/30"
- IP_IS_NOT: Matches if the request does not originate from any of the IP addresses contained in the defined address list. The valuein this case is string with one or multiple IPs or CIDR notations separated by new line symbol \n Example: "1.1.1.1\n1.1.1.2\n1.2.2.1/30"
- IP_IN_LIST: Matches if the request originates from one of the IP addresses contained in the referenced address list. The valuein this case is OCID of the address list.
- IP_NOT_IN_LIST: Matches if the request does not originate from any IP address contained in the referenced address list. The valuefield in this case is OCID of the address list.
- HTTP_HEADER_CONTAINS: The HTTP_HEADER_CONTAINS criteria is defined using a compound value separated by a colon: a header field name and a header field value. host:test.example.comis an example of a criteria value wherehostis the header field name andtest.example.comis the header field value. A request matches when the header field name is a case insensitive match and the header field value is a case insensitive, substring match. Example: With a criteria value ofhost:test.example.com, wherehostis the name of the field andtest.example.comis the value of the host field, a request with the header values,Host: www.test.example.comwill match, where as a request with header values ofhost: www.example.comorhost: test.sub.example.comwill not match.
- HTTP_METHOD_IS: Matches if the request method is identical to one of the values listed in field. The valuein this case is string with one or multiple HTTP methods separated by new line symbol \n The list of available methods:GET,HEAD,POST,PUT,DELETE,CONNECT,OPTIONS,TRACE,PATCH
 
- URL_IS: Matches if the concatenation of request URL path and query is identical to the contents of the 
- value String
- The value of the header.
- condition string
- The criteria the access rule and JavaScript Challenge uses to determine if action should be taken on a request.- URL_IS: Matches if the concatenation of request URL path and query is identical to the contents of the valuefield. URL must start with a/.
- URL_IS_NOT: Matches if the concatenation of request URL path and query is not identical to the contents of the valuefield. URL must start with a/.
- URL_STARTS_WITH: Matches if the concatenation of request URL path and query starts with the contents of the valuefield. URL must start with a/.
- URL_PART_ENDS_WITH: Matches if the concatenation of request URL path and query ends with the contents of the valuefield.
- URL_PART_CONTAINS: Matches if the concatenation of request URL path and query contains the contents of the valuefield.
- URL_REGEX: Matches if the concatenation of request URL path and query is described by the regular expression in the value field. The value must be a valid regular expression recognized by the PCRE library in Nginx (https://www.pcre.org).
- URL_DOES_NOT_MATCH_REGEX: Matches if the concatenation of request URL path and query is not described by the regular expression in the valuefield. The value must be a valid regular expression recognized by the PCRE library in Nginx (https://www.pcre.org).
- URL_DOES_NOT_START_WITH: Matches if the concatenation of request URL path and query does not start with the contents of the valuefield.
- URL_PART_DOES_NOT_CONTAIN: Matches if the concatenation of request URL path and query does not contain the contents of the valuefield.
- URL_PART_DOES_NOT_END_WITH: Matches if the concatenation of request URL path and query does not end with the contents of the valuefield.
- IP_IS: Matches if the request originates from one of the IP addresses contained in the defined address list. The valuein this case is string with one or multiple IPs or CIDR notations separated by new line symbol \n Example: "1.1.1.1\n1.1.1.2\n1.2.2.1/30"
- IP_IS_NOT: Matches if the request does not originate from any of the IP addresses contained in the defined address list. The valuein this case is string with one or multiple IPs or CIDR notations separated by new line symbol \n Example: "1.1.1.1\n1.1.1.2\n1.2.2.1/30"
- IP_IN_LIST: Matches if the request originates from one of the IP addresses contained in the referenced address list. The valuein this case is OCID of the address list.
- IP_NOT_IN_LIST: Matches if the request does not originate from any IP address contained in the referenced address list. The valuefield in this case is OCID of the address list.
- HTTP_HEADER_CONTAINS: The HTTP_HEADER_CONTAINS criteria is defined using a compound value separated by a colon: a header field name and a header field value. host:test.example.comis an example of a criteria value wherehostis the header field name andtest.example.comis the header field value. A request matches when the header field name is a case insensitive match and the header field value is a case insensitive, substring match. Example: With a criteria value ofhost:test.example.com, wherehostis the name of the field andtest.example.comis the value of the host field, a request with the header values,Host: www.test.example.comwill match, where as a request with header values ofhost: www.example.comorhost: test.sub.example.comwill not match.
- HTTP_METHOD_IS: Matches if the request method is identical to one of the values listed in field. The valuein this case is string with one or multiple HTTP methods separated by new line symbol \n The list of available methods:GET,HEAD,POST,PUT,DELETE,CONNECT,OPTIONS,TRACE,PATCH
 
- URL_IS: Matches if the concatenation of request URL path and query is identical to the contents of the 
- value string
- The value of the header.
- condition str
- The criteria the access rule and JavaScript Challenge uses to determine if action should be taken on a request.- URL_IS: Matches if the concatenation of request URL path and query is identical to the contents of the valuefield. URL must start with a/.
- URL_IS_NOT: Matches if the concatenation of request URL path and query is not identical to the contents of the valuefield. URL must start with a/.
- URL_STARTS_WITH: Matches if the concatenation of request URL path and query starts with the contents of the valuefield. URL must start with a/.
- URL_PART_ENDS_WITH: Matches if the concatenation of request URL path and query ends with the contents of the valuefield.
- URL_PART_CONTAINS: Matches if the concatenation of request URL path and query contains the contents of the valuefield.
- URL_REGEX: Matches if the concatenation of request URL path and query is described by the regular expression in the value field. The value must be a valid regular expression recognized by the PCRE library in Nginx (https://www.pcre.org).
- URL_DOES_NOT_MATCH_REGEX: Matches if the concatenation of request URL path and query is not described by the regular expression in the valuefield. The value must be a valid regular expression recognized by the PCRE library in Nginx (https://www.pcre.org).
- URL_DOES_NOT_START_WITH: Matches if the concatenation of request URL path and query does not start with the contents of the valuefield.
- URL_PART_DOES_NOT_CONTAIN: Matches if the concatenation of request URL path and query does not contain the contents of the valuefield.
- URL_PART_DOES_NOT_END_WITH: Matches if the concatenation of request URL path and query does not end with the contents of the valuefield.
- IP_IS: Matches if the request originates from one of the IP addresses contained in the defined address list. The valuein this case is string with one or multiple IPs or CIDR notations separated by new line symbol \n Example: "1.1.1.1\n1.1.1.2\n1.2.2.1/30"
- IP_IS_NOT: Matches if the request does not originate from any of the IP addresses contained in the defined address list. The valuein this case is string with one or multiple IPs or CIDR notations separated by new line symbol \n Example: "1.1.1.1\n1.1.1.2\n1.2.2.1/30"
- IP_IN_LIST: Matches if the request originates from one of the IP addresses contained in the referenced address list. The valuein this case is OCID of the address list.
- IP_NOT_IN_LIST: Matches if the request does not originate from any IP address contained in the referenced address list. The valuefield in this case is OCID of the address list.
- HTTP_HEADER_CONTAINS: The HTTP_HEADER_CONTAINS criteria is defined using a compound value separated by a colon: a header field name and a header field value. host:test.example.comis an example of a criteria value wherehostis the header field name andtest.example.comis the header field value. A request matches when the header field name is a case insensitive match and the header field value is a case insensitive, substring match. Example: With a criteria value ofhost:test.example.com, wherehostis the name of the field andtest.example.comis the value of the host field, a request with the header values,Host: www.test.example.comwill match, where as a request with header values ofhost: www.example.comorhost: test.sub.example.comwill not match.
- HTTP_METHOD_IS: Matches if the request method is identical to one of the values listed in field. The valuein this case is string with one or multiple HTTP methods separated by new line symbol \n The list of available methods:GET,HEAD,POST,PUT,DELETE,CONNECT,OPTIONS,TRACE,PATCH
 
- URL_IS: Matches if the concatenation of request URL path and query is identical to the contents of the 
- value str
- The value of the header.
- condition String
- The criteria the access rule and JavaScript Challenge uses to determine if action should be taken on a request.- URL_IS: Matches if the concatenation of request URL path and query is identical to the contents of the valuefield. URL must start with a/.
- URL_IS_NOT: Matches if the concatenation of request URL path and query is not identical to the contents of the valuefield. URL must start with a/.
- URL_STARTS_WITH: Matches if the concatenation of request URL path and query starts with the contents of the valuefield. URL must start with a/.
- URL_PART_ENDS_WITH: Matches if the concatenation of request URL path and query ends with the contents of the valuefield.
- URL_PART_CONTAINS: Matches if the concatenation of request URL path and query contains the contents of the valuefield.
- URL_REGEX: Matches if the concatenation of request URL path and query is described by the regular expression in the value field. The value must be a valid regular expression recognized by the PCRE library in Nginx (https://www.pcre.org).
- URL_DOES_NOT_MATCH_REGEX: Matches if the concatenation of request URL path and query is not described by the regular expression in the valuefield. The value must be a valid regular expression recognized by the PCRE library in Nginx (https://www.pcre.org).
- URL_DOES_NOT_START_WITH: Matches if the concatenation of request URL path and query does not start with the contents of the valuefield.
- URL_PART_DOES_NOT_CONTAIN: Matches if the concatenation of request URL path and query does not contain the contents of the valuefield.
- URL_PART_DOES_NOT_END_WITH: Matches if the concatenation of request URL path and query does not end with the contents of the valuefield.
- IP_IS: Matches if the request originates from one of the IP addresses contained in the defined address list. The valuein this case is string with one or multiple IPs or CIDR notations separated by new line symbol \n Example: "1.1.1.1\n1.1.1.2\n1.2.2.1/30"
- IP_IS_NOT: Matches if the request does not originate from any of the IP addresses contained in the defined address list. The valuein this case is string with one or multiple IPs or CIDR notations separated by new line symbol \n Example: "1.1.1.1\n1.1.1.2\n1.2.2.1/30"
- IP_IN_LIST: Matches if the request originates from one of the IP addresses contained in the referenced address list. The valuein this case is OCID of the address list.
- IP_NOT_IN_LIST: Matches if the request does not originate from any IP address contained in the referenced address list. The valuefield in this case is OCID of the address list.
- HTTP_HEADER_CONTAINS: The HTTP_HEADER_CONTAINS criteria is defined using a compound value separated by a colon: a header field name and a header field value. host:test.example.comis an example of a criteria value wherehostis the header field name andtest.example.comis the header field value. A request matches when the header field name is a case insensitive match and the header field value is a case insensitive, substring match. Example: With a criteria value ofhost:test.example.com, wherehostis the name of the field andtest.example.comis the value of the host field, a request with the header values,Host: www.test.example.comwill match, where as a request with header values ofhost: www.example.comorhost: test.sub.example.comwill not match.
- HTTP_METHOD_IS: Matches if the request method is identical to one of the values listed in field. The valuein this case is string with one or multiple HTTP methods separated by new line symbol \n The list of available methods:GET,HEAD,POST,PUT,DELETE,CONNECT,OPTIONS,TRACE,PATCH
 
- URL_IS: Matches if the concatenation of request URL path and query is identical to the contents of the 
- value String
- The value of the header.
GetWaasPoliciesWaasPolicyWafConfigCaptcha       
- FailureMessage string
- The text to show when incorrect CAPTCHA text is entered. If unspecified, defaults to The CAPTCHA was incorrect. Try again.
- string
- The text to show in the footer when showing a CAPTCHA challenge. If unspecified, defaults to 'Enter the letters and numbers as they are shown in the image above.'
- HeaderText string
- The text to show in the header when showing a CAPTCHA challenge. If unspecified, defaults to 'We have detected an increased number of attempts to access this website. To help us keep this site secure, please let us know that you are not a robot by entering the text from the image below.'
- SessionExpiration intIn Seconds 
- The amount of time before the CAPTCHA expires, in seconds. If unspecified, defaults to 300.
- SubmitLabel string
- The text to show on the label of the CAPTCHA challenge submit button. If unspecified, defaults to Yes, I am human.
- Title string
- The title used when displaying a CAPTCHA challenge. If unspecified, defaults to Are you human?
- Url string
- The unique URL path at which to show the CAPTCHA challenge.
- FailureMessage string
- The text to show when incorrect CAPTCHA text is entered. If unspecified, defaults to The CAPTCHA was incorrect. Try again.
- string
- The text to show in the footer when showing a CAPTCHA challenge. If unspecified, defaults to 'Enter the letters and numbers as they are shown in the image above.'
- HeaderText string
- The text to show in the header when showing a CAPTCHA challenge. If unspecified, defaults to 'We have detected an increased number of attempts to access this website. To help us keep this site secure, please let us know that you are not a robot by entering the text from the image below.'
- SessionExpiration intIn Seconds 
- The amount of time before the CAPTCHA expires, in seconds. If unspecified, defaults to 300.
- SubmitLabel string
- The text to show on the label of the CAPTCHA challenge submit button. If unspecified, defaults to Yes, I am human.
- Title string
- The title used when displaying a CAPTCHA challenge. If unspecified, defaults to Are you human?
- Url string
- The unique URL path at which to show the CAPTCHA challenge.
- failureMessage String
- The text to show when incorrect CAPTCHA text is entered. If unspecified, defaults to The CAPTCHA was incorrect. Try again.
- String
- The text to show in the footer when showing a CAPTCHA challenge. If unspecified, defaults to 'Enter the letters and numbers as they are shown in the image above.'
- headerText String
- The text to show in the header when showing a CAPTCHA challenge. If unspecified, defaults to 'We have detected an increased number of attempts to access this website. To help us keep this site secure, please let us know that you are not a robot by entering the text from the image below.'
- sessionExpiration IntegerIn Seconds 
- The amount of time before the CAPTCHA expires, in seconds. If unspecified, defaults to 300.
- submitLabel String
- The text to show on the label of the CAPTCHA challenge submit button. If unspecified, defaults to Yes, I am human.
- title String
- The title used when displaying a CAPTCHA challenge. If unspecified, defaults to Are you human?
- url String
- The unique URL path at which to show the CAPTCHA challenge.
- failureMessage string
- The text to show when incorrect CAPTCHA text is entered. If unspecified, defaults to The CAPTCHA was incorrect. Try again.
- string
- The text to show in the footer when showing a CAPTCHA challenge. If unspecified, defaults to 'Enter the letters and numbers as they are shown in the image above.'
- headerText string
- The text to show in the header when showing a CAPTCHA challenge. If unspecified, defaults to 'We have detected an increased number of attempts to access this website. To help us keep this site secure, please let us know that you are not a robot by entering the text from the image below.'
- sessionExpiration numberIn Seconds 
- The amount of time before the CAPTCHA expires, in seconds. If unspecified, defaults to 300.
- submitLabel string
- The text to show on the label of the CAPTCHA challenge submit button. If unspecified, defaults to Yes, I am human.
- title string
- The title used when displaying a CAPTCHA challenge. If unspecified, defaults to Are you human?
- url string
- The unique URL path at which to show the CAPTCHA challenge.
- failure_message str
- The text to show when incorrect CAPTCHA text is entered. If unspecified, defaults to The CAPTCHA was incorrect. Try again.
- str
- The text to show in the footer when showing a CAPTCHA challenge. If unspecified, defaults to 'Enter the letters and numbers as they are shown in the image above.'
- header_text str
- The text to show in the header when showing a CAPTCHA challenge. If unspecified, defaults to 'We have detected an increased number of attempts to access this website. To help us keep this site secure, please let us know that you are not a robot by entering the text from the image below.'
- session_expiration_ intin_ seconds 
- The amount of time before the CAPTCHA expires, in seconds. If unspecified, defaults to 300.
- submit_label str
- The text to show on the label of the CAPTCHA challenge submit button. If unspecified, defaults to Yes, I am human.
- title str
- The title used when displaying a CAPTCHA challenge. If unspecified, defaults to Are you human?
- url str
- The unique URL path at which to show the CAPTCHA challenge.
- failureMessage String
- The text to show when incorrect CAPTCHA text is entered. If unspecified, defaults to The CAPTCHA was incorrect. Try again.
- String
- The text to show in the footer when showing a CAPTCHA challenge. If unspecified, defaults to 'Enter the letters and numbers as they are shown in the image above.'
- headerText String
- The text to show in the header when showing a CAPTCHA challenge. If unspecified, defaults to 'We have detected an increased number of attempts to access this website. To help us keep this site secure, please let us know that you are not a robot by entering the text from the image below.'
- sessionExpiration NumberIn Seconds 
- The amount of time before the CAPTCHA expires, in seconds. If unspecified, defaults to 300.
- submitLabel String
- The text to show on the label of the CAPTCHA challenge submit button. If unspecified, defaults to Yes, I am human.
- title String
- The title used when displaying a CAPTCHA challenge. If unspecified, defaults to Are you human?
- url String
- The unique URL path at which to show the CAPTCHA challenge.
GetWaasPoliciesWaasPolicyWafConfigCustomProtectionRule         
- Action string
- The action to take against requests from detected bots. If unspecified, defaults to DETECT.
- Exclusions
List<GetWaas Policies Waas Policy Waf Config Custom Protection Rule Exclusion> 
- An array of The target property of a request that would allow it to bypass the protection rule. For example, when targetisREQUEST_COOKIE_NAMES, the list may include names of cookies to exclude from the protection rule. When the target isARGS, the list may include strings of URL query parameters and values from form-urlencoded XML, JSON, AMP, or POST payloads to exclude from the protection rule.Exclusionsproperties must not contain whitespace, comma or |. Note: If protection rules have been enabled that utilize themaxArgumentCountormaxTotalNameLengthOfArgumentsproperties, and thetargetproperty has been set toARGS, it is important that theexclusionsproperties be defined to honor those protection rule settings in a consistent manner.
- Id string
- The OCID of the custom protection rule.
- Action string
- The action to take against requests from detected bots. If unspecified, defaults to DETECT.
- Exclusions
[]GetWaas Policies Waas Policy Waf Config Custom Protection Rule Exclusion 
- An array of The target property of a request that would allow it to bypass the protection rule. For example, when targetisREQUEST_COOKIE_NAMES, the list may include names of cookies to exclude from the protection rule. When the target isARGS, the list may include strings of URL query parameters and values from form-urlencoded XML, JSON, AMP, or POST payloads to exclude from the protection rule.Exclusionsproperties must not contain whitespace, comma or |. Note: If protection rules have been enabled that utilize themaxArgumentCountormaxTotalNameLengthOfArgumentsproperties, and thetargetproperty has been set toARGS, it is important that theexclusionsproperties be defined to honor those protection rule settings in a consistent manner.
- Id string
- The OCID of the custom protection rule.
- action String
- The action to take against requests from detected bots. If unspecified, defaults to DETECT.
- exclusions
List<GetPolicies Policy Waf Config Custom Protection Rule Exclusion> 
- An array of The target property of a request that would allow it to bypass the protection rule. For example, when targetisREQUEST_COOKIE_NAMES, the list may include names of cookies to exclude from the protection rule. When the target isARGS, the list may include strings of URL query parameters and values from form-urlencoded XML, JSON, AMP, or POST payloads to exclude from the protection rule.Exclusionsproperties must not contain whitespace, comma or |. Note: If protection rules have been enabled that utilize themaxArgumentCountormaxTotalNameLengthOfArgumentsproperties, and thetargetproperty has been set toARGS, it is important that theexclusionsproperties be defined to honor those protection rule settings in a consistent manner.
- id String
- The OCID of the custom protection rule.
- action string
- The action to take against requests from detected bots. If unspecified, defaults to DETECT.
- exclusions
GetWaas Policies Waas Policy Waf Config Custom Protection Rule Exclusion[] 
- An array of The target property of a request that would allow it to bypass the protection rule. For example, when targetisREQUEST_COOKIE_NAMES, the list may include names of cookies to exclude from the protection rule. When the target isARGS, the list may include strings of URL query parameters and values from form-urlencoded XML, JSON, AMP, or POST payloads to exclude from the protection rule.Exclusionsproperties must not contain whitespace, comma or |. Note: If protection rules have been enabled that utilize themaxArgumentCountormaxTotalNameLengthOfArgumentsproperties, and thetargetproperty has been set toARGS, it is important that theexclusionsproperties be defined to honor those protection rule settings in a consistent manner.
- id string
- The OCID of the custom protection rule.
- action str
- The action to take against requests from detected bots. If unspecified, defaults to DETECT.
- exclusions
Sequence[waas.Get Waas Policies Waas Policy Waf Config Custom Protection Rule Exclusion] 
- An array of The target property of a request that would allow it to bypass the protection rule. For example, when targetisREQUEST_COOKIE_NAMES, the list may include names of cookies to exclude from the protection rule. When the target isARGS, the list may include strings of URL query parameters and values from form-urlencoded XML, JSON, AMP, or POST payloads to exclude from the protection rule.Exclusionsproperties must not contain whitespace, comma or |. Note: If protection rules have been enabled that utilize themaxArgumentCountormaxTotalNameLengthOfArgumentsproperties, and thetargetproperty has been set toARGS, it is important that theexclusionsproperties be defined to honor those protection rule settings in a consistent manner.
- id str
- The OCID of the custom protection rule.
- action String
- The action to take against requests from detected bots. If unspecified, defaults to DETECT.
- exclusions List<Property Map>
- An array of The target property of a request that would allow it to bypass the protection rule. For example, when targetisREQUEST_COOKIE_NAMES, the list may include names of cookies to exclude from the protection rule. When the target isARGS, the list may include strings of URL query parameters and values from form-urlencoded XML, JSON, AMP, or POST payloads to exclude from the protection rule.Exclusionsproperties must not contain whitespace, comma or |. Note: If protection rules have been enabled that utilize themaxArgumentCountormaxTotalNameLengthOfArgumentsproperties, and thetargetproperty has been set toARGS, it is important that theexclusionsproperties be defined to honor those protection rule settings in a consistent manner.
- id String
- The OCID of the custom protection rule.
GetWaasPoliciesWaasPolicyWafConfigCustomProtectionRuleExclusion          
- Exclusions List<string>
- An array of The target property of a request that would allow it to bypass the protection rule. For example, when targetisREQUEST_COOKIE_NAMES, the list may include names of cookies to exclude from the protection rule. When the target isARGS, the list may include strings of URL query parameters and values from form-urlencoded XML, JSON, AMP, or POST payloads to exclude from the protection rule.Exclusionsproperties must not contain whitespace, comma or |. Note: If protection rules have been enabled that utilize themaxArgumentCountormaxTotalNameLengthOfArgumentsproperties, and thetargetproperty has been set toARGS, it is important that theexclusionsproperties be defined to honor those protection rule settings in a consistent manner.
- Target string
- The target of the exclusion.
- Exclusions []string
- An array of The target property of a request that would allow it to bypass the protection rule. For example, when targetisREQUEST_COOKIE_NAMES, the list may include names of cookies to exclude from the protection rule. When the target isARGS, the list may include strings of URL query parameters and values from form-urlencoded XML, JSON, AMP, or POST payloads to exclude from the protection rule.Exclusionsproperties must not contain whitespace, comma or |. Note: If protection rules have been enabled that utilize themaxArgumentCountormaxTotalNameLengthOfArgumentsproperties, and thetargetproperty has been set toARGS, it is important that theexclusionsproperties be defined to honor those protection rule settings in a consistent manner.
- Target string
- The target of the exclusion.
- exclusions List<String>
- An array of The target property of a request that would allow it to bypass the protection rule. For example, when targetisREQUEST_COOKIE_NAMES, the list may include names of cookies to exclude from the protection rule. When the target isARGS, the list may include strings of URL query parameters and values from form-urlencoded XML, JSON, AMP, or POST payloads to exclude from the protection rule.Exclusionsproperties must not contain whitespace, comma or |. Note: If protection rules have been enabled that utilize themaxArgumentCountormaxTotalNameLengthOfArgumentsproperties, and thetargetproperty has been set toARGS, it is important that theexclusionsproperties be defined to honor those protection rule settings in a consistent manner.
- target String
- The target of the exclusion.
- exclusions string[]
- An array of The target property of a request that would allow it to bypass the protection rule. For example, when targetisREQUEST_COOKIE_NAMES, the list may include names of cookies to exclude from the protection rule. When the target isARGS, the list may include strings of URL query parameters and values from form-urlencoded XML, JSON, AMP, or POST payloads to exclude from the protection rule.Exclusionsproperties must not contain whitespace, comma or |. Note: If protection rules have been enabled that utilize themaxArgumentCountormaxTotalNameLengthOfArgumentsproperties, and thetargetproperty has been set toARGS, it is important that theexclusionsproperties be defined to honor those protection rule settings in a consistent manner.
- target string
- The target of the exclusion.
- exclusions Sequence[str]
- An array of The target property of a request that would allow it to bypass the protection rule. For example, when targetisREQUEST_COOKIE_NAMES, the list may include names of cookies to exclude from the protection rule. When the target isARGS, the list may include strings of URL query parameters and values from form-urlencoded XML, JSON, AMP, or POST payloads to exclude from the protection rule.Exclusionsproperties must not contain whitespace, comma or |. Note: If protection rules have been enabled that utilize themaxArgumentCountormaxTotalNameLengthOfArgumentsproperties, and thetargetproperty has been set toARGS, it is important that theexclusionsproperties be defined to honor those protection rule settings in a consistent manner.
- target str
- The target of the exclusion.
- exclusions List<String>
- An array of The target property of a request that would allow it to bypass the protection rule. For example, when targetisREQUEST_COOKIE_NAMES, the list may include names of cookies to exclude from the protection rule. When the target isARGS, the list may include strings of URL query parameters and values from form-urlencoded XML, JSON, AMP, or POST payloads to exclude from the protection rule.Exclusionsproperties must not contain whitespace, comma or |. Note: If protection rules have been enabled that utilize themaxArgumentCountormaxTotalNameLengthOfArgumentsproperties, and thetargetproperty has been set toARGS, it is important that theexclusionsproperties be defined to honor those protection rule settings in a consistent manner.
- target String
- The target of the exclusion.
GetWaasPoliciesWaasPolicyWafConfigDeviceFingerprintChallenge         
- Action string
- The action to take against requests from detected bots. If unspecified, defaults to DETECT.
- ActionExpiration intIn Seconds 
- The number of seconds between challenges from the same IP address. If unspecified, defaults to 60.
- ChallengeSettings List<GetWaas Policies Waas Policy Waf Config Device Fingerprint Challenge Challenge Setting> 
- The challenge settings if actionis set toBLOCK.
- FailureThreshold int
- The number of failed requests before taking action. If unspecified, defaults to 10.
- FailureThreshold intExpiration In Seconds 
- The number of seconds before the failure threshold resets. If unspecified, defaults to 60.
- IsEnabled bool
- Enables or disables the JavaScript challenge Web Application Firewall feature.
- MaxAddress intCount 
- The maximum number of IP addresses permitted with the same device fingerprint. If unspecified, defaults to 20.
- MaxAddress intCount Expiration In Seconds 
- The number of seconds before the maximum addresses count resets. If unspecified, defaults to 60.
- Action string
- The action to take against requests from detected bots. If unspecified, defaults to DETECT.
- ActionExpiration intIn Seconds 
- The number of seconds between challenges from the same IP address. If unspecified, defaults to 60.
- ChallengeSettings []GetWaas Policies Waas Policy Waf Config Device Fingerprint Challenge Challenge Setting 
- The challenge settings if actionis set toBLOCK.
- FailureThreshold int
- The number of failed requests before taking action. If unspecified, defaults to 10.
- FailureThreshold intExpiration In Seconds 
- The number of seconds before the failure threshold resets. If unspecified, defaults to 60.
- IsEnabled bool
- Enables or disables the JavaScript challenge Web Application Firewall feature.
- MaxAddress intCount 
- The maximum number of IP addresses permitted with the same device fingerprint. If unspecified, defaults to 20.
- MaxAddress intCount Expiration In Seconds 
- The number of seconds before the maximum addresses count resets. If unspecified, defaults to 60.
- action String
- The action to take against requests from detected bots. If unspecified, defaults to DETECT.
- actionExpiration IntegerIn Seconds 
- The number of seconds between challenges from the same IP address. If unspecified, defaults to 60.
- challengeSettings List<GetPolicies Policy Waf Config Device Fingerprint Challenge Challenge Setting> 
- The challenge settings if actionis set toBLOCK.
- failureThreshold Integer
- The number of failed requests before taking action. If unspecified, defaults to 10.
- failureThreshold IntegerExpiration In Seconds 
- The number of seconds before the failure threshold resets. If unspecified, defaults to 60.
- isEnabled Boolean
- Enables or disables the JavaScript challenge Web Application Firewall feature.
- maxAddress IntegerCount 
- The maximum number of IP addresses permitted with the same device fingerprint. If unspecified, defaults to 20.
- maxAddress IntegerCount Expiration In Seconds 
- The number of seconds before the maximum addresses count resets. If unspecified, defaults to 60.
- action string
- The action to take against requests from detected bots. If unspecified, defaults to DETECT.
- actionExpiration numberIn Seconds 
- The number of seconds between challenges from the same IP address. If unspecified, defaults to 60.
- challengeSettings GetWaas Policies Waas Policy Waf Config Device Fingerprint Challenge Challenge Setting[] 
- The challenge settings if actionis set toBLOCK.
- failureThreshold number
- The number of failed requests before taking action. If unspecified, defaults to 10.
- failureThreshold numberExpiration In Seconds 
- The number of seconds before the failure threshold resets. If unspecified, defaults to 60.
- isEnabled boolean
- Enables or disables the JavaScript challenge Web Application Firewall feature.
- maxAddress numberCount 
- The maximum number of IP addresses permitted with the same device fingerprint. If unspecified, defaults to 20.
- maxAddress numberCount Expiration In Seconds 
- The number of seconds before the maximum addresses count resets. If unspecified, defaults to 60.
- action str
- The action to take against requests from detected bots. If unspecified, defaults to DETECT.
- action_expiration_ intin_ seconds 
- The number of seconds between challenges from the same IP address. If unspecified, defaults to 60.
- challenge_settings Sequence[waas.Get Waas Policies Waas Policy Waf Config Device Fingerprint Challenge Challenge Setting] 
- The challenge settings if actionis set toBLOCK.
- failure_threshold int
- The number of failed requests before taking action. If unspecified, defaults to 10.
- failure_threshold_ intexpiration_ in_ seconds 
- The number of seconds before the failure threshold resets. If unspecified, defaults to 60.
- is_enabled bool
- Enables or disables the JavaScript challenge Web Application Firewall feature.
- max_address_ intcount 
- The maximum number of IP addresses permitted with the same device fingerprint. If unspecified, defaults to 20.
- max_address_ intcount_ expiration_ in_ seconds 
- The number of seconds before the maximum addresses count resets. If unspecified, defaults to 60.
- action String
- The action to take against requests from detected bots. If unspecified, defaults to DETECT.
- actionExpiration NumberIn Seconds 
- The number of seconds between challenges from the same IP address. If unspecified, defaults to 60.
- challengeSettings List<Property Map>
- The challenge settings if actionis set toBLOCK.
- failureThreshold Number
- The number of failed requests before taking action. If unspecified, defaults to 10.
- failureThreshold NumberExpiration In Seconds 
- The number of seconds before the failure threshold resets. If unspecified, defaults to 60.
- isEnabled Boolean
- Enables or disables the JavaScript challenge Web Application Firewall feature.
- maxAddress NumberCount 
- The maximum number of IP addresses permitted with the same device fingerprint. If unspecified, defaults to 20.
- maxAddress NumberCount Expiration In Seconds 
- The number of seconds before the maximum addresses count resets. If unspecified, defaults to 60.
GetWaasPoliciesWaasPolicyWafConfigDeviceFingerprintChallengeChallengeSetting           
- BlockAction string
- If actionis set toBLOCK, this specifies how the traffic is blocked when detected as malicious by a protection rule. If unspecified, defaults toSET_RESPONSE_CODE.
- BlockError stringPage Code 
- The error code to show on the error page when actionis set toBLOCK,blockActionis set toSHOW_ERROR_PAGE, and the traffic is detected as malicious by a protection rule. If unspecified, defaults to403.
- BlockError stringPage Description 
- The description text to show on the error page when actionis set toBLOCK,blockActionis set toSHOW_ERROR_PAGE, and the traffic is detected as malicious by a protection rule. If unspecified, defaults toAccess blocked by website owner. Please contact support.
- BlockError stringPage Message 
- The message to show on the error page when actionis set toBLOCK,blockActionis set toSHOW_ERROR_PAGE, and the traffic is detected as malicious by a protection rule. If unspecified, defaults to 'Access to the website is blocked.'
- BlockResponse intCode 
- The response code returned when actionis set toBLOCK,blockActionis set toSET_RESPONSE_CODE, and the traffic is detected as malicious by a protection rule. If unspecified, defaults to403. The list of available response codes:400,401,403,405,409,411,412,413,414,415,416,500,501,502,503,504,507.
- string
- The text to show in the footer when showing a CAPTCHA challenge when actionis set toBLOCK,blockActionis set toSHOW_CAPTCHA, and the request is blocked. If unspecified, default toEnter the letters and numbers as they are shown in image above.
- CaptchaHeader string
- The text to show in the header when showing a CAPTCHA challenge when actionis set toBLOCK,blockActionis set toSHOW_CAPTCHA, and the request is blocked. If unspecified, defaults toWe have detected an increased number of attempts to access this webapp. To help us keep this webapp secure, please let us know that you are not a robot by entering the text from captcha below.
- CaptchaSubmit stringLabel 
- The text to show on the label of the CAPTCHA challenge submit button when actionis set toBLOCK,blockActionis set toSHOW_CAPTCHA, and the request is blocked. If unspecified, defaults toYes, I am human.
- CaptchaTitle string
- The title used when showing a CAPTCHA challenge when actionis set toBLOCK,blockActionis set toSHOW_CAPTCHA, and the request is blocked. If unspecified, defaults toAre you human?
- BlockAction string
- If actionis set toBLOCK, this specifies how the traffic is blocked when detected as malicious by a protection rule. If unspecified, defaults toSET_RESPONSE_CODE.
- BlockError stringPage Code 
- The error code to show on the error page when actionis set toBLOCK,blockActionis set toSHOW_ERROR_PAGE, and the traffic is detected as malicious by a protection rule. If unspecified, defaults to403.
- BlockError stringPage Description 
- The description text to show on the error page when actionis set toBLOCK,blockActionis set toSHOW_ERROR_PAGE, and the traffic is detected as malicious by a protection rule. If unspecified, defaults toAccess blocked by website owner. Please contact support.
- BlockError stringPage Message 
- The message to show on the error page when actionis set toBLOCK,blockActionis set toSHOW_ERROR_PAGE, and the traffic is detected as malicious by a protection rule. If unspecified, defaults to 'Access to the website is blocked.'
- BlockResponse intCode 
- The response code returned when actionis set toBLOCK,blockActionis set toSET_RESPONSE_CODE, and the traffic is detected as malicious by a protection rule. If unspecified, defaults to403. The list of available response codes:400,401,403,405,409,411,412,413,414,415,416,500,501,502,503,504,507.
- string
- The text to show in the footer when showing a CAPTCHA challenge when actionis set toBLOCK,blockActionis set toSHOW_CAPTCHA, and the request is blocked. If unspecified, default toEnter the letters and numbers as they are shown in image above.
- CaptchaHeader string
- The text to show in the header when showing a CAPTCHA challenge when actionis set toBLOCK,blockActionis set toSHOW_CAPTCHA, and the request is blocked. If unspecified, defaults toWe have detected an increased number of attempts to access this webapp. To help us keep this webapp secure, please let us know that you are not a robot by entering the text from captcha below.
- CaptchaSubmit stringLabel 
- The text to show on the label of the CAPTCHA challenge submit button when actionis set toBLOCK,blockActionis set toSHOW_CAPTCHA, and the request is blocked. If unspecified, defaults toYes, I am human.
- CaptchaTitle string
- The title used when showing a CAPTCHA challenge when actionis set toBLOCK,blockActionis set toSHOW_CAPTCHA, and the request is blocked. If unspecified, defaults toAre you human?
- blockAction String
- If actionis set toBLOCK, this specifies how the traffic is blocked when detected as malicious by a protection rule. If unspecified, defaults toSET_RESPONSE_CODE.
- blockError StringPage Code 
- The error code to show on the error page when actionis set toBLOCK,blockActionis set toSHOW_ERROR_PAGE, and the traffic is detected as malicious by a protection rule. If unspecified, defaults to403.
- blockError StringPage Description 
- The description text to show on the error page when actionis set toBLOCK,blockActionis set toSHOW_ERROR_PAGE, and the traffic is detected as malicious by a protection rule. If unspecified, defaults toAccess blocked by website owner. Please contact support.
- blockError StringPage Message 
- The message to show on the error page when actionis set toBLOCK,blockActionis set toSHOW_ERROR_PAGE, and the traffic is detected as malicious by a protection rule. If unspecified, defaults to 'Access to the website is blocked.'
- blockResponse IntegerCode 
- The response code returned when actionis set toBLOCK,blockActionis set toSET_RESPONSE_CODE, and the traffic is detected as malicious by a protection rule. If unspecified, defaults to403. The list of available response codes:400,401,403,405,409,411,412,413,414,415,416,500,501,502,503,504,507.
- String
- The text to show in the footer when showing a CAPTCHA challenge when actionis set toBLOCK,blockActionis set toSHOW_CAPTCHA, and the request is blocked. If unspecified, default toEnter the letters and numbers as they are shown in image above.
- captchaHeader String
- The text to show in the header when showing a CAPTCHA challenge when actionis set toBLOCK,blockActionis set toSHOW_CAPTCHA, and the request is blocked. If unspecified, defaults toWe have detected an increased number of attempts to access this webapp. To help us keep this webapp secure, please let us know that you are not a robot by entering the text from captcha below.
- captchaSubmit StringLabel 
- The text to show on the label of the CAPTCHA challenge submit button when actionis set toBLOCK,blockActionis set toSHOW_CAPTCHA, and the request is blocked. If unspecified, defaults toYes, I am human.
- captchaTitle String
- The title used when showing a CAPTCHA challenge when actionis set toBLOCK,blockActionis set toSHOW_CAPTCHA, and the request is blocked. If unspecified, defaults toAre you human?
- blockAction string
- If actionis set toBLOCK, this specifies how the traffic is blocked when detected as malicious by a protection rule. If unspecified, defaults toSET_RESPONSE_CODE.
- blockError stringPage Code 
- The error code to show on the error page when actionis set toBLOCK,blockActionis set toSHOW_ERROR_PAGE, and the traffic is detected as malicious by a protection rule. If unspecified, defaults to403.
- blockError stringPage Description 
- The description text to show on the error page when actionis set toBLOCK,blockActionis set toSHOW_ERROR_PAGE, and the traffic is detected as malicious by a protection rule. If unspecified, defaults toAccess blocked by website owner. Please contact support.
- blockError stringPage Message 
- The message to show on the error page when actionis set toBLOCK,blockActionis set toSHOW_ERROR_PAGE, and the traffic is detected as malicious by a protection rule. If unspecified, defaults to 'Access to the website is blocked.'
- blockResponse numberCode 
- The response code returned when actionis set toBLOCK,blockActionis set toSET_RESPONSE_CODE, and the traffic is detected as malicious by a protection rule. If unspecified, defaults to403. The list of available response codes:400,401,403,405,409,411,412,413,414,415,416,500,501,502,503,504,507.
- string
- The text to show in the footer when showing a CAPTCHA challenge when actionis set toBLOCK,blockActionis set toSHOW_CAPTCHA, and the request is blocked. If unspecified, default toEnter the letters and numbers as they are shown in image above.
- captchaHeader string
- The text to show in the header when showing a CAPTCHA challenge when actionis set toBLOCK,blockActionis set toSHOW_CAPTCHA, and the request is blocked. If unspecified, defaults toWe have detected an increased number of attempts to access this webapp. To help us keep this webapp secure, please let us know that you are not a robot by entering the text from captcha below.
- captchaSubmit stringLabel 
- The text to show on the label of the CAPTCHA challenge submit button when actionis set toBLOCK,blockActionis set toSHOW_CAPTCHA, and the request is blocked. If unspecified, defaults toYes, I am human.
- captchaTitle string
- The title used when showing a CAPTCHA challenge when actionis set toBLOCK,blockActionis set toSHOW_CAPTCHA, and the request is blocked. If unspecified, defaults toAre you human?
- block_action str
- If actionis set toBLOCK, this specifies how the traffic is blocked when detected as malicious by a protection rule. If unspecified, defaults toSET_RESPONSE_CODE.
- block_error_ strpage_ code 
- The error code to show on the error page when actionis set toBLOCK,blockActionis set toSHOW_ERROR_PAGE, and the traffic is detected as malicious by a protection rule. If unspecified, defaults to403.
- block_error_ strpage_ description 
- The description text to show on the error page when actionis set toBLOCK,blockActionis set toSHOW_ERROR_PAGE, and the traffic is detected as malicious by a protection rule. If unspecified, defaults toAccess blocked by website owner. Please contact support.
- block_error_ strpage_ message 
- The message to show on the error page when actionis set toBLOCK,blockActionis set toSHOW_ERROR_PAGE, and the traffic is detected as malicious by a protection rule. If unspecified, defaults to 'Access to the website is blocked.'
- block_response_ intcode 
- The response code returned when actionis set toBLOCK,blockActionis set toSET_RESPONSE_CODE, and the traffic is detected as malicious by a protection rule. If unspecified, defaults to403. The list of available response codes:400,401,403,405,409,411,412,413,414,415,416,500,501,502,503,504,507.
- str
- The text to show in the footer when showing a CAPTCHA challenge when actionis set toBLOCK,blockActionis set toSHOW_CAPTCHA, and the request is blocked. If unspecified, default toEnter the letters and numbers as they are shown in image above.
- captcha_header str
- The text to show in the header when showing a CAPTCHA challenge when actionis set toBLOCK,blockActionis set toSHOW_CAPTCHA, and the request is blocked. If unspecified, defaults toWe have detected an increased number of attempts to access this webapp. To help us keep this webapp secure, please let us know that you are not a robot by entering the text from captcha below.
- captcha_submit_ strlabel 
- The text to show on the label of the CAPTCHA challenge submit button when actionis set toBLOCK,blockActionis set toSHOW_CAPTCHA, and the request is blocked. If unspecified, defaults toYes, I am human.
- captcha_title str
- The title used when showing a CAPTCHA challenge when actionis set toBLOCK,blockActionis set toSHOW_CAPTCHA, and the request is blocked. If unspecified, defaults toAre you human?
- blockAction String
- If actionis set toBLOCK, this specifies how the traffic is blocked when detected as malicious by a protection rule. If unspecified, defaults toSET_RESPONSE_CODE.
- blockError StringPage Code 
- The error code to show on the error page when actionis set toBLOCK,blockActionis set toSHOW_ERROR_PAGE, and the traffic is detected as malicious by a protection rule. If unspecified, defaults to403.
- blockError StringPage Description 
- The description text to show on the error page when actionis set toBLOCK,blockActionis set toSHOW_ERROR_PAGE, and the traffic is detected as malicious by a protection rule. If unspecified, defaults toAccess blocked by website owner. Please contact support.
- blockError StringPage Message 
- The message to show on the error page when actionis set toBLOCK,blockActionis set toSHOW_ERROR_PAGE, and the traffic is detected as malicious by a protection rule. If unspecified, defaults to 'Access to the website is blocked.'
- blockResponse NumberCode 
- The response code returned when actionis set toBLOCK,blockActionis set toSET_RESPONSE_CODE, and the traffic is detected as malicious by a protection rule. If unspecified, defaults to403. The list of available response codes:400,401,403,405,409,411,412,413,414,415,416,500,501,502,503,504,507.
- String
- The text to show in the footer when showing a CAPTCHA challenge when actionis set toBLOCK,blockActionis set toSHOW_CAPTCHA, and the request is blocked. If unspecified, default toEnter the letters and numbers as they are shown in image above.
- captchaHeader String
- The text to show in the header when showing a CAPTCHA challenge when actionis set toBLOCK,blockActionis set toSHOW_CAPTCHA, and the request is blocked. If unspecified, defaults toWe have detected an increased number of attempts to access this webapp. To help us keep this webapp secure, please let us know that you are not a robot by entering the text from captcha below.
- captchaSubmit StringLabel 
- The text to show on the label of the CAPTCHA challenge submit button when actionis set toBLOCK,blockActionis set toSHOW_CAPTCHA, and the request is blocked. If unspecified, defaults toYes, I am human.
- captchaTitle String
- The title used when showing a CAPTCHA challenge when actionis set toBLOCK,blockActionis set toSHOW_CAPTCHA, and the request is blocked. If unspecified, defaults toAre you human?
GetWaasPoliciesWaasPolicyWafConfigHumanInteractionChallenge         
- Action string
- The action to take against requests from detected bots. If unspecified, defaults to DETECT.
- ActionExpiration intIn Seconds 
- The number of seconds between challenges from the same IP address. If unspecified, defaults to 60.
- ChallengeSettings List<GetWaas Policies Waas Policy Waf Config Human Interaction Challenge Challenge Setting> 
- The challenge settings if actionis set toBLOCK.
- FailureThreshold int
- The number of failed requests before taking action. If unspecified, defaults to 10.
- FailureThreshold intExpiration In Seconds 
- The number of seconds before the failure threshold resets. If unspecified, defaults to 60.
- InteractionThreshold int
- The number of interactions required to pass the challenge. If unspecified, defaults to 3.
- IsEnabled bool
- Enables or disables the JavaScript challenge Web Application Firewall feature.
- IsNat boolEnabled 
- When enabled, the user is identified not only by the IP address but also by an unique additional hash, which prevents blocking visitors with shared IP addresses.
- RecordingPeriod intIn Seconds 
- The number of seconds to record the interactions from the user. If unspecified, defaults to 15.
- SetHttp List<GetHeaders Waas Policies Waas Policy Waf Config Human Interaction Challenge Set Http Header> 
- Adds an additional HTTP header to requests that fail the challenge before being passed to the origin. Only applicable when the actionis set toDETECT.
- Action string
- The action to take against requests from detected bots. If unspecified, defaults to DETECT.
- ActionExpiration intIn Seconds 
- The number of seconds between challenges from the same IP address. If unspecified, defaults to 60.
- ChallengeSettings []GetWaas Policies Waas Policy Waf Config Human Interaction Challenge Challenge Setting 
- The challenge settings if actionis set toBLOCK.
- FailureThreshold int
- The number of failed requests before taking action. If unspecified, defaults to 10.
- FailureThreshold intExpiration In Seconds 
- The number of seconds before the failure threshold resets. If unspecified, defaults to 60.
- InteractionThreshold int
- The number of interactions required to pass the challenge. If unspecified, defaults to 3.
- IsEnabled bool
- Enables or disables the JavaScript challenge Web Application Firewall feature.
- IsNat boolEnabled 
- When enabled, the user is identified not only by the IP address but also by an unique additional hash, which prevents blocking visitors with shared IP addresses.
- RecordingPeriod intIn Seconds 
- The number of seconds to record the interactions from the user. If unspecified, defaults to 15.
- SetHttp []GetHeaders Waas Policies Waas Policy Waf Config Human Interaction Challenge Set Http Header 
- Adds an additional HTTP header to requests that fail the challenge before being passed to the origin. Only applicable when the actionis set toDETECT.
- action String
- The action to take against requests from detected bots. If unspecified, defaults to DETECT.
- actionExpiration IntegerIn Seconds 
- The number of seconds between challenges from the same IP address. If unspecified, defaults to 60.
- challengeSettings List<GetPolicies Policy Waf Config Human Interaction Challenge Challenge Setting> 
- The challenge settings if actionis set toBLOCK.
- failureThreshold Integer
- The number of failed requests before taking action. If unspecified, defaults to 10.
- failureThreshold IntegerExpiration In Seconds 
- The number of seconds before the failure threshold resets. If unspecified, defaults to 60.
- interactionThreshold Integer
- The number of interactions required to pass the challenge. If unspecified, defaults to 3.
- isEnabled Boolean
- Enables or disables the JavaScript challenge Web Application Firewall feature.
- isNat BooleanEnabled 
- When enabled, the user is identified not only by the IP address but also by an unique additional hash, which prevents blocking visitors with shared IP addresses.
- recordingPeriod IntegerIn Seconds 
- The number of seconds to record the interactions from the user. If unspecified, defaults to 15.
- setHttp List<GetHeaders Policies Policy Waf Config Human Interaction Challenge Set Http Header> 
- Adds an additional HTTP header to requests that fail the challenge before being passed to the origin. Only applicable when the actionis set toDETECT.
- action string
- The action to take against requests from detected bots. If unspecified, defaults to DETECT.
- actionExpiration numberIn Seconds 
- The number of seconds between challenges from the same IP address. If unspecified, defaults to 60.
- challengeSettings GetWaas Policies Waas Policy Waf Config Human Interaction Challenge Challenge Setting[] 
- The challenge settings if actionis set toBLOCK.
- failureThreshold number
- The number of failed requests before taking action. If unspecified, defaults to 10.
- failureThreshold numberExpiration In Seconds 
- The number of seconds before the failure threshold resets. If unspecified, defaults to 60.
- interactionThreshold number
- The number of interactions required to pass the challenge. If unspecified, defaults to 3.
- isEnabled boolean
- Enables or disables the JavaScript challenge Web Application Firewall feature.
- isNat booleanEnabled 
- When enabled, the user is identified not only by the IP address but also by an unique additional hash, which prevents blocking visitors with shared IP addresses.
- recordingPeriod numberIn Seconds 
- The number of seconds to record the interactions from the user. If unspecified, defaults to 15.
- setHttp GetHeaders Waas Policies Waas Policy Waf Config Human Interaction Challenge Set Http Header[] 
- Adds an additional HTTP header to requests that fail the challenge before being passed to the origin. Only applicable when the actionis set toDETECT.
- action str
- The action to take against requests from detected bots. If unspecified, defaults to DETECT.
- action_expiration_ intin_ seconds 
- The number of seconds between challenges from the same IP address. If unspecified, defaults to 60.
- challenge_settings Sequence[waas.Get Waas Policies Waas Policy Waf Config Human Interaction Challenge Challenge Setting] 
- The challenge settings if actionis set toBLOCK.
- failure_threshold int
- The number of failed requests before taking action. If unspecified, defaults to 10.
- failure_threshold_ intexpiration_ in_ seconds 
- The number of seconds before the failure threshold resets. If unspecified, defaults to 60.
- interaction_threshold int
- The number of interactions required to pass the challenge. If unspecified, defaults to 3.
- is_enabled bool
- Enables or disables the JavaScript challenge Web Application Firewall feature.
- is_nat_ boolenabled 
- When enabled, the user is identified not only by the IP address but also by an unique additional hash, which prevents blocking visitors with shared IP addresses.
- recording_period_ intin_ seconds 
- The number of seconds to record the interactions from the user. If unspecified, defaults to 15.
- set_http_ Sequence[waas.headers Get Waas Policies Waas Policy Waf Config Human Interaction Challenge Set Http Header] 
- Adds an additional HTTP header to requests that fail the challenge before being passed to the origin. Only applicable when the actionis set toDETECT.
- action String
- The action to take against requests from detected bots. If unspecified, defaults to DETECT.
- actionExpiration NumberIn Seconds 
- The number of seconds between challenges from the same IP address. If unspecified, defaults to 60.
- challengeSettings List<Property Map>
- The challenge settings if actionis set toBLOCK.
- failureThreshold Number
- The number of failed requests before taking action. If unspecified, defaults to 10.
- failureThreshold NumberExpiration In Seconds 
- The number of seconds before the failure threshold resets. If unspecified, defaults to 60.
- interactionThreshold Number
- The number of interactions required to pass the challenge. If unspecified, defaults to 3.
- isEnabled Boolean
- Enables or disables the JavaScript challenge Web Application Firewall feature.
- isNat BooleanEnabled 
- When enabled, the user is identified not only by the IP address but also by an unique additional hash, which prevents blocking visitors with shared IP addresses.
- recordingPeriod NumberIn Seconds 
- The number of seconds to record the interactions from the user. If unspecified, defaults to 15.
- setHttp List<Property Map>Headers 
- Adds an additional HTTP header to requests that fail the challenge before being passed to the origin. Only applicable when the actionis set toDETECT.
GetWaasPoliciesWaasPolicyWafConfigHumanInteractionChallengeChallengeSetting           
- BlockAction string
- If actionis set toBLOCK, this specifies how the traffic is blocked when detected as malicious by a protection rule. If unspecified, defaults toSET_RESPONSE_CODE.
- BlockError stringPage Code 
- The error code to show on the error page when actionis set toBLOCK,blockActionis set toSHOW_ERROR_PAGE, and the traffic is detected as malicious by a protection rule. If unspecified, defaults to403.
- BlockError stringPage Description 
- The description text to show on the error page when actionis set toBLOCK,blockActionis set toSHOW_ERROR_PAGE, and the traffic is detected as malicious by a protection rule. If unspecified, defaults toAccess blocked by website owner. Please contact support.
- BlockError stringPage Message 
- The message to show on the error page when actionis set toBLOCK,blockActionis set toSHOW_ERROR_PAGE, and the traffic is detected as malicious by a protection rule. If unspecified, defaults to 'Access to the website is blocked.'
- BlockResponse intCode 
- The response code returned when actionis set toBLOCK,blockActionis set toSET_RESPONSE_CODE, and the traffic is detected as malicious by a protection rule. If unspecified, defaults to403. The list of available response codes:400,401,403,405,409,411,412,413,414,415,416,500,501,502,503,504,507.
- string
- The text to show in the footer when showing a CAPTCHA challenge when actionis set toBLOCK,blockActionis set toSHOW_CAPTCHA, and the request is blocked. If unspecified, default toEnter the letters and numbers as they are shown in image above.
- CaptchaHeader string
- The text to show in the header when showing a CAPTCHA challenge when actionis set toBLOCK,blockActionis set toSHOW_CAPTCHA, and the request is blocked. If unspecified, defaults toWe have detected an increased number of attempts to access this webapp. To help us keep this webapp secure, please let us know that you are not a robot by entering the text from captcha below.
- CaptchaSubmit stringLabel 
- The text to show on the label of the CAPTCHA challenge submit button when actionis set toBLOCK,blockActionis set toSHOW_CAPTCHA, and the request is blocked. If unspecified, defaults toYes, I am human.
- CaptchaTitle string
- The title used when showing a CAPTCHA challenge when actionis set toBLOCK,blockActionis set toSHOW_CAPTCHA, and the request is blocked. If unspecified, defaults toAre you human?
- BlockAction string
- If actionis set toBLOCK, this specifies how the traffic is blocked when detected as malicious by a protection rule. If unspecified, defaults toSET_RESPONSE_CODE.
- BlockError stringPage Code 
- The error code to show on the error page when actionis set toBLOCK,blockActionis set toSHOW_ERROR_PAGE, and the traffic is detected as malicious by a protection rule. If unspecified, defaults to403.
- BlockError stringPage Description 
- The description text to show on the error page when actionis set toBLOCK,blockActionis set toSHOW_ERROR_PAGE, and the traffic is detected as malicious by a protection rule. If unspecified, defaults toAccess blocked by website owner. Please contact support.
- BlockError stringPage Message 
- The message to show on the error page when actionis set toBLOCK,blockActionis set toSHOW_ERROR_PAGE, and the traffic is detected as malicious by a protection rule. If unspecified, defaults to 'Access to the website is blocked.'
- BlockResponse intCode 
- The response code returned when actionis set toBLOCK,blockActionis set toSET_RESPONSE_CODE, and the traffic is detected as malicious by a protection rule. If unspecified, defaults to403. The list of available response codes:400,401,403,405,409,411,412,413,414,415,416,500,501,502,503,504,507.
- string
- The text to show in the footer when showing a CAPTCHA challenge when actionis set toBLOCK,blockActionis set toSHOW_CAPTCHA, and the request is blocked. If unspecified, default toEnter the letters and numbers as they are shown in image above.
- CaptchaHeader string
- The text to show in the header when showing a CAPTCHA challenge when actionis set toBLOCK,blockActionis set toSHOW_CAPTCHA, and the request is blocked. If unspecified, defaults toWe have detected an increased number of attempts to access this webapp. To help us keep this webapp secure, please let us know that you are not a robot by entering the text from captcha below.
- CaptchaSubmit stringLabel 
- The text to show on the label of the CAPTCHA challenge submit button when actionis set toBLOCK,blockActionis set toSHOW_CAPTCHA, and the request is blocked. If unspecified, defaults toYes, I am human.
- CaptchaTitle string
- The title used when showing a CAPTCHA challenge when actionis set toBLOCK,blockActionis set toSHOW_CAPTCHA, and the request is blocked. If unspecified, defaults toAre you human?
- blockAction String
- If actionis set toBLOCK, this specifies how the traffic is blocked when detected as malicious by a protection rule. If unspecified, defaults toSET_RESPONSE_CODE.
- blockError StringPage Code 
- The error code to show on the error page when actionis set toBLOCK,blockActionis set toSHOW_ERROR_PAGE, and the traffic is detected as malicious by a protection rule. If unspecified, defaults to403.
- blockError StringPage Description 
- The description text to show on the error page when actionis set toBLOCK,blockActionis set toSHOW_ERROR_PAGE, and the traffic is detected as malicious by a protection rule. If unspecified, defaults toAccess blocked by website owner. Please contact support.
- blockError StringPage Message 
- The message to show on the error page when actionis set toBLOCK,blockActionis set toSHOW_ERROR_PAGE, and the traffic is detected as malicious by a protection rule. If unspecified, defaults to 'Access to the website is blocked.'
- blockResponse IntegerCode 
- The response code returned when actionis set toBLOCK,blockActionis set toSET_RESPONSE_CODE, and the traffic is detected as malicious by a protection rule. If unspecified, defaults to403. The list of available response codes:400,401,403,405,409,411,412,413,414,415,416,500,501,502,503,504,507.
- String
- The text to show in the footer when showing a CAPTCHA challenge when actionis set toBLOCK,blockActionis set toSHOW_CAPTCHA, and the request is blocked. If unspecified, default toEnter the letters and numbers as they are shown in image above.
- captchaHeader String
- The text to show in the header when showing a CAPTCHA challenge when actionis set toBLOCK,blockActionis set toSHOW_CAPTCHA, and the request is blocked. If unspecified, defaults toWe have detected an increased number of attempts to access this webapp. To help us keep this webapp secure, please let us know that you are not a robot by entering the text from captcha below.
- captchaSubmit StringLabel 
- The text to show on the label of the CAPTCHA challenge submit button when actionis set toBLOCK,blockActionis set toSHOW_CAPTCHA, and the request is blocked. If unspecified, defaults toYes, I am human.
- captchaTitle String
- The title used when showing a CAPTCHA challenge when actionis set toBLOCK,blockActionis set toSHOW_CAPTCHA, and the request is blocked. If unspecified, defaults toAre you human?
- blockAction string
- If actionis set toBLOCK, this specifies how the traffic is blocked when detected as malicious by a protection rule. If unspecified, defaults toSET_RESPONSE_CODE.
- blockError stringPage Code 
- The error code to show on the error page when actionis set toBLOCK,blockActionis set toSHOW_ERROR_PAGE, and the traffic is detected as malicious by a protection rule. If unspecified, defaults to403.
- blockError stringPage Description 
- The description text to show on the error page when actionis set toBLOCK,blockActionis set toSHOW_ERROR_PAGE, and the traffic is detected as malicious by a protection rule. If unspecified, defaults toAccess blocked by website owner. Please contact support.
- blockError stringPage Message 
- The message to show on the error page when actionis set toBLOCK,blockActionis set toSHOW_ERROR_PAGE, and the traffic is detected as malicious by a protection rule. If unspecified, defaults to 'Access to the website is blocked.'
- blockResponse numberCode 
- The response code returned when actionis set toBLOCK,blockActionis set toSET_RESPONSE_CODE, and the traffic is detected as malicious by a protection rule. If unspecified, defaults to403. The list of available response codes:400,401,403,405,409,411,412,413,414,415,416,500,501,502,503,504,507.
- string
- The text to show in the footer when showing a CAPTCHA challenge when actionis set toBLOCK,blockActionis set toSHOW_CAPTCHA, and the request is blocked. If unspecified, default toEnter the letters and numbers as they are shown in image above.
- captchaHeader string
- The text to show in the header when showing a CAPTCHA challenge when actionis set toBLOCK,blockActionis set toSHOW_CAPTCHA, and the request is blocked. If unspecified, defaults toWe have detected an increased number of attempts to access this webapp. To help us keep this webapp secure, please let us know that you are not a robot by entering the text from captcha below.
- captchaSubmit stringLabel 
- The text to show on the label of the CAPTCHA challenge submit button when actionis set toBLOCK,blockActionis set toSHOW_CAPTCHA, and the request is blocked. If unspecified, defaults toYes, I am human.
- captchaTitle string
- The title used when showing a CAPTCHA challenge when actionis set toBLOCK,blockActionis set toSHOW_CAPTCHA, and the request is blocked. If unspecified, defaults toAre you human?
- block_action str
- If actionis set toBLOCK, this specifies how the traffic is blocked when detected as malicious by a protection rule. If unspecified, defaults toSET_RESPONSE_CODE.
- block_error_ strpage_ code 
- The error code to show on the error page when actionis set toBLOCK,blockActionis set toSHOW_ERROR_PAGE, and the traffic is detected as malicious by a protection rule. If unspecified, defaults to403.
- block_error_ strpage_ description 
- The description text to show on the error page when actionis set toBLOCK,blockActionis set toSHOW_ERROR_PAGE, and the traffic is detected as malicious by a protection rule. If unspecified, defaults toAccess blocked by website owner. Please contact support.
- block_error_ strpage_ message 
- The message to show on the error page when actionis set toBLOCK,blockActionis set toSHOW_ERROR_PAGE, and the traffic is detected as malicious by a protection rule. If unspecified, defaults to 'Access to the website is blocked.'
- block_response_ intcode 
- The response code returned when actionis set toBLOCK,blockActionis set toSET_RESPONSE_CODE, and the traffic is detected as malicious by a protection rule. If unspecified, defaults to403. The list of available response codes:400,401,403,405,409,411,412,413,414,415,416,500,501,502,503,504,507.
- str
- The text to show in the footer when showing a CAPTCHA challenge when actionis set toBLOCK,blockActionis set toSHOW_CAPTCHA, and the request is blocked. If unspecified, default toEnter the letters and numbers as they are shown in image above.
- captcha_header str
- The text to show in the header when showing a CAPTCHA challenge when actionis set toBLOCK,blockActionis set toSHOW_CAPTCHA, and the request is blocked. If unspecified, defaults toWe have detected an increased number of attempts to access this webapp. To help us keep this webapp secure, please let us know that you are not a robot by entering the text from captcha below.
- captcha_submit_ strlabel 
- The text to show on the label of the CAPTCHA challenge submit button when actionis set toBLOCK,blockActionis set toSHOW_CAPTCHA, and the request is blocked. If unspecified, defaults toYes, I am human.
- captcha_title str
- The title used when showing a CAPTCHA challenge when actionis set toBLOCK,blockActionis set toSHOW_CAPTCHA, and the request is blocked. If unspecified, defaults toAre you human?
- blockAction String
- If actionis set toBLOCK, this specifies how the traffic is blocked when detected as malicious by a protection rule. If unspecified, defaults toSET_RESPONSE_CODE.
- blockError StringPage Code 
- The error code to show on the error page when actionis set toBLOCK,blockActionis set toSHOW_ERROR_PAGE, and the traffic is detected as malicious by a protection rule. If unspecified, defaults to403.
- blockError StringPage Description 
- The description text to show on the error page when actionis set toBLOCK,blockActionis set toSHOW_ERROR_PAGE, and the traffic is detected as malicious by a protection rule. If unspecified, defaults toAccess blocked by website owner. Please contact support.
- blockError StringPage Message 
- The message to show on the error page when actionis set toBLOCK,blockActionis set toSHOW_ERROR_PAGE, and the traffic is detected as malicious by a protection rule. If unspecified, defaults to 'Access to the website is blocked.'
- blockResponse NumberCode 
- The response code returned when actionis set toBLOCK,blockActionis set toSET_RESPONSE_CODE, and the traffic is detected as malicious by a protection rule. If unspecified, defaults to403. The list of available response codes:400,401,403,405,409,411,412,413,414,415,416,500,501,502,503,504,507.
- String
- The text to show in the footer when showing a CAPTCHA challenge when actionis set toBLOCK,blockActionis set toSHOW_CAPTCHA, and the request is blocked. If unspecified, default toEnter the letters and numbers as they are shown in image above.
- captchaHeader String
- The text to show in the header when showing a CAPTCHA challenge when actionis set toBLOCK,blockActionis set toSHOW_CAPTCHA, and the request is blocked. If unspecified, defaults toWe have detected an increased number of attempts to access this webapp. To help us keep this webapp secure, please let us know that you are not a robot by entering the text from captcha below.
- captchaSubmit StringLabel 
- The text to show on the label of the CAPTCHA challenge submit button when actionis set toBLOCK,blockActionis set toSHOW_CAPTCHA, and the request is blocked. If unspecified, defaults toYes, I am human.
- captchaTitle String
- The title used when showing a CAPTCHA challenge when actionis set toBLOCK,blockActionis set toSHOW_CAPTCHA, and the request is blocked. If unspecified, defaults toAre you human?
GetWaasPoliciesWaasPolicyWafConfigHumanInteractionChallengeSetHttpHeader            
GetWaasPoliciesWaasPolicyWafConfigJsChallenge        
- Action string
- The action to take against requests from detected bots. If unspecified, defaults to DETECT.
- ActionExpiration intIn Seconds 
- The number of seconds between challenges from the same IP address. If unspecified, defaults to 60.
- AreRedirects boolChallenged 
- When enabled, redirect responses from the origin will also be challenged. This will change HTTP 301/302 responses from origin to HTTP 200 with an HTML body containing JavaScript page redirection.
- ChallengeSettings List<GetWaas Policies Waas Policy Waf Config Js Challenge Challenge Setting> 
- The challenge settings if actionis set toBLOCK.
- Criterias
List<GetWaas Policies Waas Policy Waf Config Js Challenge Criteria> 
- When defined, the JavaScript Challenge would be applied only for the requests that matched all the listed conditions.
- FailureThreshold int
- The number of failed requests before taking action. If unspecified, defaults to 10.
- IsEnabled bool
- Enables or disables the JavaScript challenge Web Application Firewall feature.
- IsNat boolEnabled 
- When enabled, the user is identified not only by the IP address but also by an unique additional hash, which prevents blocking visitors with shared IP addresses.
- SetHttp List<GetHeaders Waas Policies Waas Policy Waf Config Js Challenge Set Http Header> 
- Adds an additional HTTP header to requests that fail the challenge before being passed to the origin. Only applicable when the actionis set toDETECT.
- Action string
- The action to take against requests from detected bots. If unspecified, defaults to DETECT.
- ActionExpiration intIn Seconds 
- The number of seconds between challenges from the same IP address. If unspecified, defaults to 60.
- AreRedirects boolChallenged 
- When enabled, redirect responses from the origin will also be challenged. This will change HTTP 301/302 responses from origin to HTTP 200 with an HTML body containing JavaScript page redirection.
- ChallengeSettings []GetWaas Policies Waas Policy Waf Config Js Challenge Challenge Setting 
- The challenge settings if actionis set toBLOCK.
- Criterias
[]GetWaas Policies Waas Policy Waf Config Js Challenge Criteria 
- When defined, the JavaScript Challenge would be applied only for the requests that matched all the listed conditions.
- FailureThreshold int
- The number of failed requests before taking action. If unspecified, defaults to 10.
- IsEnabled bool
- Enables or disables the JavaScript challenge Web Application Firewall feature.
- IsNat boolEnabled 
- When enabled, the user is identified not only by the IP address but also by an unique additional hash, which prevents blocking visitors with shared IP addresses.
- SetHttp []GetHeaders Waas Policies Waas Policy Waf Config Js Challenge Set Http Header 
- Adds an additional HTTP header to requests that fail the challenge before being passed to the origin. Only applicable when the actionis set toDETECT.
- action String
- The action to take against requests from detected bots. If unspecified, defaults to DETECT.
- actionExpiration IntegerIn Seconds 
- The number of seconds between challenges from the same IP address. If unspecified, defaults to 60.
- areRedirects BooleanChallenged 
- When enabled, redirect responses from the origin will also be challenged. This will change HTTP 301/302 responses from origin to HTTP 200 with an HTML body containing JavaScript page redirection.
- challengeSettings List<GetPolicies Policy Waf Config Js Challenge Challenge Setting> 
- The challenge settings if actionis set toBLOCK.
- criterias
List<GetPolicies Policy Waf Config Js Challenge Criteria> 
- When defined, the JavaScript Challenge would be applied only for the requests that matched all the listed conditions.
- failureThreshold Integer
- The number of failed requests before taking action. If unspecified, defaults to 10.
- isEnabled Boolean
- Enables or disables the JavaScript challenge Web Application Firewall feature.
- isNat BooleanEnabled 
- When enabled, the user is identified not only by the IP address but also by an unique additional hash, which prevents blocking visitors with shared IP addresses.
- setHttp List<GetHeaders Policies Policy Waf Config Js Challenge Set Http Header> 
- Adds an additional HTTP header to requests that fail the challenge before being passed to the origin. Only applicable when the actionis set toDETECT.
- action string
- The action to take against requests from detected bots. If unspecified, defaults to DETECT.
- actionExpiration numberIn Seconds 
- The number of seconds between challenges from the same IP address. If unspecified, defaults to 60.
- areRedirects booleanChallenged 
- When enabled, redirect responses from the origin will also be challenged. This will change HTTP 301/302 responses from origin to HTTP 200 with an HTML body containing JavaScript page redirection.
- challengeSettings GetWaas Policies Waas Policy Waf Config Js Challenge Challenge Setting[] 
- The challenge settings if actionis set toBLOCK.
- criterias
GetWaas Policies Waas Policy Waf Config Js Challenge Criteria[] 
- When defined, the JavaScript Challenge would be applied only for the requests that matched all the listed conditions.
- failureThreshold number
- The number of failed requests before taking action. If unspecified, defaults to 10.
- isEnabled boolean
- Enables or disables the JavaScript challenge Web Application Firewall feature.
- isNat booleanEnabled 
- When enabled, the user is identified not only by the IP address but also by an unique additional hash, which prevents blocking visitors with shared IP addresses.
- setHttp GetHeaders Waas Policies Waas Policy Waf Config Js Challenge Set Http Header[] 
- Adds an additional HTTP header to requests that fail the challenge before being passed to the origin. Only applicable when the actionis set toDETECT.
- action str
- The action to take against requests from detected bots. If unspecified, defaults to DETECT.
- action_expiration_ intin_ seconds 
- The number of seconds between challenges from the same IP address. If unspecified, defaults to 60.
- are_redirects_ boolchallenged 
- When enabled, redirect responses from the origin will also be challenged. This will change HTTP 301/302 responses from origin to HTTP 200 with an HTML body containing JavaScript page redirection.
- challenge_settings Sequence[waas.Get Waas Policies Waas Policy Waf Config Js Challenge Challenge Setting] 
- The challenge settings if actionis set toBLOCK.
- criterias
Sequence[waas.Get Waas Policies Waas Policy Waf Config Js Challenge Criteria] 
- When defined, the JavaScript Challenge would be applied only for the requests that matched all the listed conditions.
- failure_threshold int
- The number of failed requests before taking action. If unspecified, defaults to 10.
- is_enabled bool
- Enables or disables the JavaScript challenge Web Application Firewall feature.
- is_nat_ boolenabled 
- When enabled, the user is identified not only by the IP address but also by an unique additional hash, which prevents blocking visitors with shared IP addresses.
- set_http_ Sequence[waas.headers Get Waas Policies Waas Policy Waf Config Js Challenge Set Http Header] 
- Adds an additional HTTP header to requests that fail the challenge before being passed to the origin. Only applicable when the actionis set toDETECT.
- action String
- The action to take against requests from detected bots. If unspecified, defaults to DETECT.
- actionExpiration NumberIn Seconds 
- The number of seconds between challenges from the same IP address. If unspecified, defaults to 60.
- areRedirects BooleanChallenged 
- When enabled, redirect responses from the origin will also be challenged. This will change HTTP 301/302 responses from origin to HTTP 200 with an HTML body containing JavaScript page redirection.
- challengeSettings List<Property Map>
- The challenge settings if actionis set toBLOCK.
- criterias List<Property Map>
- When defined, the JavaScript Challenge would be applied only for the requests that matched all the listed conditions.
- failureThreshold Number
- The number of failed requests before taking action. If unspecified, defaults to 10.
- isEnabled Boolean
- Enables or disables the JavaScript challenge Web Application Firewall feature.
- isNat BooleanEnabled 
- When enabled, the user is identified not only by the IP address but also by an unique additional hash, which prevents blocking visitors with shared IP addresses.
- setHttp List<Property Map>Headers 
- Adds an additional HTTP header to requests that fail the challenge before being passed to the origin. Only applicable when the actionis set toDETECT.
GetWaasPoliciesWaasPolicyWafConfigJsChallengeChallengeSetting          
- BlockAction string
- If actionis set toBLOCK, this specifies how the traffic is blocked when detected as malicious by a protection rule. If unspecified, defaults toSET_RESPONSE_CODE.
- BlockError stringPage Code 
- The error code to show on the error page when actionis set toBLOCK,blockActionis set toSHOW_ERROR_PAGE, and the traffic is detected as malicious by a protection rule. If unspecified, defaults to403.
- BlockError stringPage Description 
- The description text to show on the error page when actionis set toBLOCK,blockActionis set toSHOW_ERROR_PAGE, and the traffic is detected as malicious by a protection rule. If unspecified, defaults toAccess blocked by website owner. Please contact support.
- BlockError stringPage Message 
- The message to show on the error page when actionis set toBLOCK,blockActionis set toSHOW_ERROR_PAGE, and the traffic is detected as malicious by a protection rule. If unspecified, defaults to 'Access to the website is blocked.'
- BlockResponse intCode 
- The response code returned when actionis set toBLOCK,blockActionis set toSET_RESPONSE_CODE, and the traffic is detected as malicious by a protection rule. If unspecified, defaults to403. The list of available response codes:400,401,403,405,409,411,412,413,414,415,416,500,501,502,503,504,507.
- string
- The text to show in the footer when showing a CAPTCHA challenge when actionis set toBLOCK,blockActionis set toSHOW_CAPTCHA, and the request is blocked. If unspecified, default toEnter the letters and numbers as they are shown in image above.
- CaptchaHeader string
- The text to show in the header when showing a CAPTCHA challenge when actionis set toBLOCK,blockActionis set toSHOW_CAPTCHA, and the request is blocked. If unspecified, defaults toWe have detected an increased number of attempts to access this webapp. To help us keep this webapp secure, please let us know that you are not a robot by entering the text from captcha below.
- CaptchaSubmit stringLabel 
- The text to show on the label of the CAPTCHA challenge submit button when actionis set toBLOCK,blockActionis set toSHOW_CAPTCHA, and the request is blocked. If unspecified, defaults toYes, I am human.
- CaptchaTitle string
- The title used when showing a CAPTCHA challenge when actionis set toBLOCK,blockActionis set toSHOW_CAPTCHA, and the request is blocked. If unspecified, defaults toAre you human?
- BlockAction string
- If actionis set toBLOCK, this specifies how the traffic is blocked when detected as malicious by a protection rule. If unspecified, defaults toSET_RESPONSE_CODE.
- BlockError stringPage Code 
- The error code to show on the error page when actionis set toBLOCK,blockActionis set toSHOW_ERROR_PAGE, and the traffic is detected as malicious by a protection rule. If unspecified, defaults to403.
- BlockError stringPage Description 
- The description text to show on the error page when actionis set toBLOCK,blockActionis set toSHOW_ERROR_PAGE, and the traffic is detected as malicious by a protection rule. If unspecified, defaults toAccess blocked by website owner. Please contact support.
- BlockError stringPage Message 
- The message to show on the error page when actionis set toBLOCK,blockActionis set toSHOW_ERROR_PAGE, and the traffic is detected as malicious by a protection rule. If unspecified, defaults to 'Access to the website is blocked.'
- BlockResponse intCode 
- The response code returned when actionis set toBLOCK,blockActionis set toSET_RESPONSE_CODE, and the traffic is detected as malicious by a protection rule. If unspecified, defaults to403. The list of available response codes:400,401,403,405,409,411,412,413,414,415,416,500,501,502,503,504,507.
- string
- The text to show in the footer when showing a CAPTCHA challenge when actionis set toBLOCK,blockActionis set toSHOW_CAPTCHA, and the request is blocked. If unspecified, default toEnter the letters and numbers as they are shown in image above.
- CaptchaHeader string
- The text to show in the header when showing a CAPTCHA challenge when actionis set toBLOCK,blockActionis set toSHOW_CAPTCHA, and the request is blocked. If unspecified, defaults toWe have detected an increased number of attempts to access this webapp. To help us keep this webapp secure, please let us know that you are not a robot by entering the text from captcha below.
- CaptchaSubmit stringLabel 
- The text to show on the label of the CAPTCHA challenge submit button when actionis set toBLOCK,blockActionis set toSHOW_CAPTCHA, and the request is blocked. If unspecified, defaults toYes, I am human.
- CaptchaTitle string
- The title used when showing a CAPTCHA challenge when actionis set toBLOCK,blockActionis set toSHOW_CAPTCHA, and the request is blocked. If unspecified, defaults toAre you human?
- blockAction String
- If actionis set toBLOCK, this specifies how the traffic is blocked when detected as malicious by a protection rule. If unspecified, defaults toSET_RESPONSE_CODE.
- blockError StringPage Code 
- The error code to show on the error page when actionis set toBLOCK,blockActionis set toSHOW_ERROR_PAGE, and the traffic is detected as malicious by a protection rule. If unspecified, defaults to403.
- blockError StringPage Description 
- The description text to show on the error page when actionis set toBLOCK,blockActionis set toSHOW_ERROR_PAGE, and the traffic is detected as malicious by a protection rule. If unspecified, defaults toAccess blocked by website owner. Please contact support.
- blockError StringPage Message 
- The message to show on the error page when actionis set toBLOCK,blockActionis set toSHOW_ERROR_PAGE, and the traffic is detected as malicious by a protection rule. If unspecified, defaults to 'Access to the website is blocked.'
- blockResponse IntegerCode 
- The response code returned when actionis set toBLOCK,blockActionis set toSET_RESPONSE_CODE, and the traffic is detected as malicious by a protection rule. If unspecified, defaults to403. The list of available response codes:400,401,403,405,409,411,412,413,414,415,416,500,501,502,503,504,507.
- String
- The text to show in the footer when showing a CAPTCHA challenge when actionis set toBLOCK,blockActionis set toSHOW_CAPTCHA, and the request is blocked. If unspecified, default toEnter the letters and numbers as they are shown in image above.
- captchaHeader String
- The text to show in the header when showing a CAPTCHA challenge when actionis set toBLOCK,blockActionis set toSHOW_CAPTCHA, and the request is blocked. If unspecified, defaults toWe have detected an increased number of attempts to access this webapp. To help us keep this webapp secure, please let us know that you are not a robot by entering the text from captcha below.
- captchaSubmit StringLabel 
- The text to show on the label of the CAPTCHA challenge submit button when actionis set toBLOCK,blockActionis set toSHOW_CAPTCHA, and the request is blocked. If unspecified, defaults toYes, I am human.
- captchaTitle String
- The title used when showing a CAPTCHA challenge when actionis set toBLOCK,blockActionis set toSHOW_CAPTCHA, and the request is blocked. If unspecified, defaults toAre you human?
- blockAction string
- If actionis set toBLOCK, this specifies how the traffic is blocked when detected as malicious by a protection rule. If unspecified, defaults toSET_RESPONSE_CODE.
- blockError stringPage Code 
- The error code to show on the error page when actionis set toBLOCK,blockActionis set toSHOW_ERROR_PAGE, and the traffic is detected as malicious by a protection rule. If unspecified, defaults to403.
- blockError stringPage Description 
- The description text to show on the error page when actionis set toBLOCK,blockActionis set toSHOW_ERROR_PAGE, and the traffic is detected as malicious by a protection rule. If unspecified, defaults toAccess blocked by website owner. Please contact support.
- blockError stringPage Message 
- The message to show on the error page when actionis set toBLOCK,blockActionis set toSHOW_ERROR_PAGE, and the traffic is detected as malicious by a protection rule. If unspecified, defaults to 'Access to the website is blocked.'
- blockResponse numberCode 
- The response code returned when actionis set toBLOCK,blockActionis set toSET_RESPONSE_CODE, and the traffic is detected as malicious by a protection rule. If unspecified, defaults to403. The list of available response codes:400,401,403,405,409,411,412,413,414,415,416,500,501,502,503,504,507.
- string
- The text to show in the footer when showing a CAPTCHA challenge when actionis set toBLOCK,blockActionis set toSHOW_CAPTCHA, and the request is blocked. If unspecified, default toEnter the letters and numbers as they are shown in image above.
- captchaHeader string
- The text to show in the header when showing a CAPTCHA challenge when actionis set toBLOCK,blockActionis set toSHOW_CAPTCHA, and the request is blocked. If unspecified, defaults toWe have detected an increased number of attempts to access this webapp. To help us keep this webapp secure, please let us know that you are not a robot by entering the text from captcha below.
- captchaSubmit stringLabel 
- The text to show on the label of the CAPTCHA challenge submit button when actionis set toBLOCK,blockActionis set toSHOW_CAPTCHA, and the request is blocked. If unspecified, defaults toYes, I am human.
- captchaTitle string
- The title used when showing a CAPTCHA challenge when actionis set toBLOCK,blockActionis set toSHOW_CAPTCHA, and the request is blocked. If unspecified, defaults toAre you human?
- block_action str
- If actionis set toBLOCK, this specifies how the traffic is blocked when detected as malicious by a protection rule. If unspecified, defaults toSET_RESPONSE_CODE.
- block_error_ strpage_ code 
- The error code to show on the error page when actionis set toBLOCK,blockActionis set toSHOW_ERROR_PAGE, and the traffic is detected as malicious by a protection rule. If unspecified, defaults to403.
- block_error_ strpage_ description 
- The description text to show on the error page when actionis set toBLOCK,blockActionis set toSHOW_ERROR_PAGE, and the traffic is detected as malicious by a protection rule. If unspecified, defaults toAccess blocked by website owner. Please contact support.
- block_error_ strpage_ message 
- The message to show on the error page when actionis set toBLOCK,blockActionis set toSHOW_ERROR_PAGE, and the traffic is detected as malicious by a protection rule. If unspecified, defaults to 'Access to the website is blocked.'
- block_response_ intcode 
- The response code returned when actionis set toBLOCK,blockActionis set toSET_RESPONSE_CODE, and the traffic is detected as malicious by a protection rule. If unspecified, defaults to403. The list of available response codes:400,401,403,405,409,411,412,413,414,415,416,500,501,502,503,504,507.
- str
- The text to show in the footer when showing a CAPTCHA challenge when actionis set toBLOCK,blockActionis set toSHOW_CAPTCHA, and the request is blocked. If unspecified, default toEnter the letters and numbers as they are shown in image above.
- captcha_header str
- The text to show in the header when showing a CAPTCHA challenge when actionis set toBLOCK,blockActionis set toSHOW_CAPTCHA, and the request is blocked. If unspecified, defaults toWe have detected an increased number of attempts to access this webapp. To help us keep this webapp secure, please let us know that you are not a robot by entering the text from captcha below.
- captcha_submit_ strlabel 
- The text to show on the label of the CAPTCHA challenge submit button when actionis set toBLOCK,blockActionis set toSHOW_CAPTCHA, and the request is blocked. If unspecified, defaults toYes, I am human.
- captcha_title str
- The title used when showing a CAPTCHA challenge when actionis set toBLOCK,blockActionis set toSHOW_CAPTCHA, and the request is blocked. If unspecified, defaults toAre you human?
- blockAction String
- If actionis set toBLOCK, this specifies how the traffic is blocked when detected as malicious by a protection rule. If unspecified, defaults toSET_RESPONSE_CODE.
- blockError StringPage Code 
- The error code to show on the error page when actionis set toBLOCK,blockActionis set toSHOW_ERROR_PAGE, and the traffic is detected as malicious by a protection rule. If unspecified, defaults to403.
- blockError StringPage Description 
- The description text to show on the error page when actionis set toBLOCK,blockActionis set toSHOW_ERROR_PAGE, and the traffic is detected as malicious by a protection rule. If unspecified, defaults toAccess blocked by website owner. Please contact support.
- blockError StringPage Message 
- The message to show on the error page when actionis set toBLOCK,blockActionis set toSHOW_ERROR_PAGE, and the traffic is detected as malicious by a protection rule. If unspecified, defaults to 'Access to the website is blocked.'
- blockResponse NumberCode 
- The response code returned when actionis set toBLOCK,blockActionis set toSET_RESPONSE_CODE, and the traffic is detected as malicious by a protection rule. If unspecified, defaults to403. The list of available response codes:400,401,403,405,409,411,412,413,414,415,416,500,501,502,503,504,507.
- String
- The text to show in the footer when showing a CAPTCHA challenge when actionis set toBLOCK,blockActionis set toSHOW_CAPTCHA, and the request is blocked. If unspecified, default toEnter the letters and numbers as they are shown in image above.
- captchaHeader String
- The text to show in the header when showing a CAPTCHA challenge when actionis set toBLOCK,blockActionis set toSHOW_CAPTCHA, and the request is blocked. If unspecified, defaults toWe have detected an increased number of attempts to access this webapp. To help us keep this webapp secure, please let us know that you are not a robot by entering the text from captcha below.
- captchaSubmit StringLabel 
- The text to show on the label of the CAPTCHA challenge submit button when actionis set toBLOCK,blockActionis set toSHOW_CAPTCHA, and the request is blocked. If unspecified, defaults toYes, I am human.
- captchaTitle String
- The title used when showing a CAPTCHA challenge when actionis set toBLOCK,blockActionis set toSHOW_CAPTCHA, and the request is blocked. If unspecified, defaults toAre you human?
GetWaasPoliciesWaasPolicyWafConfigJsChallengeCriteria         
- Condition string
- The criteria the access rule and JavaScript Challenge uses to determine if action should be taken on a request.- URL_IS: Matches if the concatenation of request URL path and query is identical to the contents of the valuefield. URL must start with a/.
- URL_IS_NOT: Matches if the concatenation of request URL path and query is not identical to the contents of the valuefield. URL must start with a/.
- URL_STARTS_WITH: Matches if the concatenation of request URL path and query starts with the contents of the valuefield. URL must start with a/.
- URL_PART_ENDS_WITH: Matches if the concatenation of request URL path and query ends with the contents of the valuefield.
- URL_PART_CONTAINS: Matches if the concatenation of request URL path and query contains the contents of the valuefield.
- URL_REGEX: Matches if the concatenation of request URL path and query is described by the regular expression in the value field. The value must be a valid regular expression recognized by the PCRE library in Nginx (https://www.pcre.org).
- URL_DOES_NOT_MATCH_REGEX: Matches if the concatenation of request URL path and query is not described by the regular expression in the valuefield. The value must be a valid regular expression recognized by the PCRE library in Nginx (https://www.pcre.org).
- URL_DOES_NOT_START_WITH: Matches if the concatenation of request URL path and query does not start with the contents of the valuefield.
- URL_PART_DOES_NOT_CONTAIN: Matches if the concatenation of request URL path and query does not contain the contents of the valuefield.
- URL_PART_DOES_NOT_END_WITH: Matches if the concatenation of request URL path and query does not end with the contents of the valuefield.
- IP_IS: Matches if the request originates from one of the IP addresses contained in the defined address list. The valuein this case is string with one or multiple IPs or CIDR notations separated by new line symbol \n Example: "1.1.1.1\n1.1.1.2\n1.2.2.1/30"
- IP_IS_NOT: Matches if the request does not originate from any of the IP addresses contained in the defined address list. The valuein this case is string with one or multiple IPs or CIDR notations separated by new line symbol \n Example: "1.1.1.1\n1.1.1.2\n1.2.2.1/30"
- IP_IN_LIST: Matches if the request originates from one of the IP addresses contained in the referenced address list. The valuein this case is OCID of the address list.
- IP_NOT_IN_LIST: Matches if the request does not originate from any IP address contained in the referenced address list. The valuefield in this case is OCID of the address list.
- HTTP_HEADER_CONTAINS: The HTTP_HEADER_CONTAINS criteria is defined using a compound value separated by a colon: a header field name and a header field value. host:test.example.comis an example of a criteria value wherehostis the header field name andtest.example.comis the header field value. A request matches when the header field name is a case insensitive match and the header field value is a case insensitive, substring match. Example: With a criteria value ofhost:test.example.com, wherehostis the name of the field andtest.example.comis the value of the host field, a request with the header values,Host: www.test.example.comwill match, where as a request with header values ofhost: www.example.comorhost: test.sub.example.comwill not match.
- HTTP_METHOD_IS: Matches if the request method is identical to one of the values listed in field. The valuein this case is string with one or multiple HTTP methods separated by new line symbol \n The list of available methods:GET,HEAD,POST,PUT,DELETE,CONNECT,OPTIONS,TRACE,PATCH
 
- URL_IS: Matches if the concatenation of request URL path and query is identical to the contents of the 
- IsCase boolSensitive 
- When enabled, the condition will be matched with case-sensitive rules.
- Value string
- The value of the header.
- Condition string
- The criteria the access rule and JavaScript Challenge uses to determine if action should be taken on a request.- URL_IS: Matches if the concatenation of request URL path and query is identical to the contents of the valuefield. URL must start with a/.
- URL_IS_NOT: Matches if the concatenation of request URL path and query is not identical to the contents of the valuefield. URL must start with a/.
- URL_STARTS_WITH: Matches if the concatenation of request URL path and query starts with the contents of the valuefield. URL must start with a/.
- URL_PART_ENDS_WITH: Matches if the concatenation of request URL path and query ends with the contents of the valuefield.
- URL_PART_CONTAINS: Matches if the concatenation of request URL path and query contains the contents of the valuefield.
- URL_REGEX: Matches if the concatenation of request URL path and query is described by the regular expression in the value field. The value must be a valid regular expression recognized by the PCRE library in Nginx (https://www.pcre.org).
- URL_DOES_NOT_MATCH_REGEX: Matches if the concatenation of request URL path and query is not described by the regular expression in the valuefield. The value must be a valid regular expression recognized by the PCRE library in Nginx (https://www.pcre.org).
- URL_DOES_NOT_START_WITH: Matches if the concatenation of request URL path and query does not start with the contents of the valuefield.
- URL_PART_DOES_NOT_CONTAIN: Matches if the concatenation of request URL path and query does not contain the contents of the valuefield.
- URL_PART_DOES_NOT_END_WITH: Matches if the concatenation of request URL path and query does not end with the contents of the valuefield.
- IP_IS: Matches if the request originates from one of the IP addresses contained in the defined address list. The valuein this case is string with one or multiple IPs or CIDR notations separated by new line symbol \n Example: "1.1.1.1\n1.1.1.2\n1.2.2.1/30"
- IP_IS_NOT: Matches if the request does not originate from any of the IP addresses contained in the defined address list. The valuein this case is string with one or multiple IPs or CIDR notations separated by new line symbol \n Example: "1.1.1.1\n1.1.1.2\n1.2.2.1/30"
- IP_IN_LIST: Matches if the request originates from one of the IP addresses contained in the referenced address list. The valuein this case is OCID of the address list.
- IP_NOT_IN_LIST: Matches if the request does not originate from any IP address contained in the referenced address list. The valuefield in this case is OCID of the address list.
- HTTP_HEADER_CONTAINS: The HTTP_HEADER_CONTAINS criteria is defined using a compound value separated by a colon: a header field name and a header field value. host:test.example.comis an example of a criteria value wherehostis the header field name andtest.example.comis the header field value. A request matches when the header field name is a case insensitive match and the header field value is a case insensitive, substring match. Example: With a criteria value ofhost:test.example.com, wherehostis the name of the field andtest.example.comis the value of the host field, a request with the header values,Host: www.test.example.comwill match, where as a request with header values ofhost: www.example.comorhost: test.sub.example.comwill not match.
- HTTP_METHOD_IS: Matches if the request method is identical to one of the values listed in field. The valuein this case is string with one or multiple HTTP methods separated by new line symbol \n The list of available methods:GET,HEAD,POST,PUT,DELETE,CONNECT,OPTIONS,TRACE,PATCH
 
- URL_IS: Matches if the concatenation of request URL path and query is identical to the contents of the 
- IsCase boolSensitive 
- When enabled, the condition will be matched with case-sensitive rules.
- Value string
- The value of the header.
- condition String
- The criteria the access rule and JavaScript Challenge uses to determine if action should be taken on a request.- URL_IS: Matches if the concatenation of request URL path and query is identical to the contents of the valuefield. URL must start with a/.
- URL_IS_NOT: Matches if the concatenation of request URL path and query is not identical to the contents of the valuefield. URL must start with a/.
- URL_STARTS_WITH: Matches if the concatenation of request URL path and query starts with the contents of the valuefield. URL must start with a/.
- URL_PART_ENDS_WITH: Matches if the concatenation of request URL path and query ends with the contents of the valuefield.
- URL_PART_CONTAINS: Matches if the concatenation of request URL path and query contains the contents of the valuefield.
- URL_REGEX: Matches if the concatenation of request URL path and query is described by the regular expression in the value field. The value must be a valid regular expression recognized by the PCRE library in Nginx (https://www.pcre.org).
- URL_DOES_NOT_MATCH_REGEX: Matches if the concatenation of request URL path and query is not described by the regular expression in the valuefield. The value must be a valid regular expression recognized by the PCRE library in Nginx (https://www.pcre.org).
- URL_DOES_NOT_START_WITH: Matches if the concatenation of request URL path and query does not start with the contents of the valuefield.
- URL_PART_DOES_NOT_CONTAIN: Matches if the concatenation of request URL path and query does not contain the contents of the valuefield.
- URL_PART_DOES_NOT_END_WITH: Matches if the concatenation of request URL path and query does not end with the contents of the valuefield.
- IP_IS: Matches if the request originates from one of the IP addresses contained in the defined address list. The valuein this case is string with one or multiple IPs or CIDR notations separated by new line symbol \n Example: "1.1.1.1\n1.1.1.2\n1.2.2.1/30"
- IP_IS_NOT: Matches if the request does not originate from any of the IP addresses contained in the defined address list. The valuein this case is string with one or multiple IPs or CIDR notations separated by new line symbol \n Example: "1.1.1.1\n1.1.1.2\n1.2.2.1/30"
- IP_IN_LIST: Matches if the request originates from one of the IP addresses contained in the referenced address list. The valuein this case is OCID of the address list.
- IP_NOT_IN_LIST: Matches if the request does not originate from any IP address contained in the referenced address list. The valuefield in this case is OCID of the address list.
- HTTP_HEADER_CONTAINS: The HTTP_HEADER_CONTAINS criteria is defined using a compound value separated by a colon: a header field name and a header field value. host:test.example.comis an example of a criteria value wherehostis the header field name andtest.example.comis the header field value. A request matches when the header field name is a case insensitive match and the header field value is a case insensitive, substring match. Example: With a criteria value ofhost:test.example.com, wherehostis the name of the field andtest.example.comis the value of the host field, a request with the header values,Host: www.test.example.comwill match, where as a request with header values ofhost: www.example.comorhost: test.sub.example.comwill not match.
- HTTP_METHOD_IS: Matches if the request method is identical to one of the values listed in field. The valuein this case is string with one or multiple HTTP methods separated by new line symbol \n The list of available methods:GET,HEAD,POST,PUT,DELETE,CONNECT,OPTIONS,TRACE,PATCH
 
- URL_IS: Matches if the concatenation of request URL path and query is identical to the contents of the 
- isCase BooleanSensitive 
- When enabled, the condition will be matched with case-sensitive rules.
- value String
- The value of the header.
- condition string
- The criteria the access rule and JavaScript Challenge uses to determine if action should be taken on a request.- URL_IS: Matches if the concatenation of request URL path and query is identical to the contents of the valuefield. URL must start with a/.
- URL_IS_NOT: Matches if the concatenation of request URL path and query is not identical to the contents of the valuefield. URL must start with a/.
- URL_STARTS_WITH: Matches if the concatenation of request URL path and query starts with the contents of the valuefield. URL must start with a/.
- URL_PART_ENDS_WITH: Matches if the concatenation of request URL path and query ends with the contents of the valuefield.
- URL_PART_CONTAINS: Matches if the concatenation of request URL path and query contains the contents of the valuefield.
- URL_REGEX: Matches if the concatenation of request URL path and query is described by the regular expression in the value field. The value must be a valid regular expression recognized by the PCRE library in Nginx (https://www.pcre.org).
- URL_DOES_NOT_MATCH_REGEX: Matches if the concatenation of request URL path and query is not described by the regular expression in the valuefield. The value must be a valid regular expression recognized by the PCRE library in Nginx (https://www.pcre.org).
- URL_DOES_NOT_START_WITH: Matches if the concatenation of request URL path and query does not start with the contents of the valuefield.
- URL_PART_DOES_NOT_CONTAIN: Matches if the concatenation of request URL path and query does not contain the contents of the valuefield.
- URL_PART_DOES_NOT_END_WITH: Matches if the concatenation of request URL path and query does not end with the contents of the valuefield.
- IP_IS: Matches if the request originates from one of the IP addresses contained in the defined address list. The valuein this case is string with one or multiple IPs or CIDR notations separated by new line symbol \n Example: "1.1.1.1\n1.1.1.2\n1.2.2.1/30"
- IP_IS_NOT: Matches if the request does not originate from any of the IP addresses contained in the defined address list. The valuein this case is string with one or multiple IPs or CIDR notations separated by new line symbol \n Example: "1.1.1.1\n1.1.1.2\n1.2.2.1/30"
- IP_IN_LIST: Matches if the request originates from one of the IP addresses contained in the referenced address list. The valuein this case is OCID of the address list.
- IP_NOT_IN_LIST: Matches if the request does not originate from any IP address contained in the referenced address list. The valuefield in this case is OCID of the address list.
- HTTP_HEADER_CONTAINS: The HTTP_HEADER_CONTAINS criteria is defined using a compound value separated by a colon: a header field name and a header field value. host:test.example.comis an example of a criteria value wherehostis the header field name andtest.example.comis the header field value. A request matches when the header field name is a case insensitive match and the header field value is a case insensitive, substring match. Example: With a criteria value ofhost:test.example.com, wherehostis the name of the field andtest.example.comis the value of the host field, a request with the header values,Host: www.test.example.comwill match, where as a request with header values ofhost: www.example.comorhost: test.sub.example.comwill not match.
- HTTP_METHOD_IS: Matches if the request method is identical to one of the values listed in field. The valuein this case is string with one or multiple HTTP methods separated by new line symbol \n The list of available methods:GET,HEAD,POST,PUT,DELETE,CONNECT,OPTIONS,TRACE,PATCH
 
- URL_IS: Matches if the concatenation of request URL path and query is identical to the contents of the 
- isCase booleanSensitive 
- When enabled, the condition will be matched with case-sensitive rules.
- value string
- The value of the header.
- condition str
- The criteria the access rule and JavaScript Challenge uses to determine if action should be taken on a request.- URL_IS: Matches if the concatenation of request URL path and query is identical to the contents of the valuefield. URL must start with a/.
- URL_IS_NOT: Matches if the concatenation of request URL path and query is not identical to the contents of the valuefield. URL must start with a/.
- URL_STARTS_WITH: Matches if the concatenation of request URL path and query starts with the contents of the valuefield. URL must start with a/.
- URL_PART_ENDS_WITH: Matches if the concatenation of request URL path and query ends with the contents of the valuefield.
- URL_PART_CONTAINS: Matches if the concatenation of request URL path and query contains the contents of the valuefield.
- URL_REGEX: Matches if the concatenation of request URL path and query is described by the regular expression in the value field. The value must be a valid regular expression recognized by the PCRE library in Nginx (https://www.pcre.org).
- URL_DOES_NOT_MATCH_REGEX: Matches if the concatenation of request URL path and query is not described by the regular expression in the valuefield. The value must be a valid regular expression recognized by the PCRE library in Nginx (https://www.pcre.org).
- URL_DOES_NOT_START_WITH: Matches if the concatenation of request URL path and query does not start with the contents of the valuefield.
- URL_PART_DOES_NOT_CONTAIN: Matches if the concatenation of request URL path and query does not contain the contents of the valuefield.
- URL_PART_DOES_NOT_END_WITH: Matches if the concatenation of request URL path and query does not end with the contents of the valuefield.
- IP_IS: Matches if the request originates from one of the IP addresses contained in the defined address list. The valuein this case is string with one or multiple IPs or CIDR notations separated by new line symbol \n Example: "1.1.1.1\n1.1.1.2\n1.2.2.1/30"
- IP_IS_NOT: Matches if the request does not originate from any of the IP addresses contained in the defined address list. The valuein this case is string with one or multiple IPs or CIDR notations separated by new line symbol \n Example: "1.1.1.1\n1.1.1.2\n1.2.2.1/30"
- IP_IN_LIST: Matches if the request originates from one of the IP addresses contained in the referenced address list. The valuein this case is OCID of the address list.
- IP_NOT_IN_LIST: Matches if the request does not originate from any IP address contained in the referenced address list. The valuefield in this case is OCID of the address list.
- HTTP_HEADER_CONTAINS: The HTTP_HEADER_CONTAINS criteria is defined using a compound value separated by a colon: a header field name and a header field value. host:test.example.comis an example of a criteria value wherehostis the header field name andtest.example.comis the header field value. A request matches when the header field name is a case insensitive match and the header field value is a case insensitive, substring match. Example: With a criteria value ofhost:test.example.com, wherehostis the name of the field andtest.example.comis the value of the host field, a request with the header values,Host: www.test.example.comwill match, where as a request with header values ofhost: www.example.comorhost: test.sub.example.comwill not match.
- HTTP_METHOD_IS: Matches if the request method is identical to one of the values listed in field. The valuein this case is string with one or multiple HTTP methods separated by new line symbol \n The list of available methods:GET,HEAD,POST,PUT,DELETE,CONNECT,OPTIONS,TRACE,PATCH
 
- URL_IS: Matches if the concatenation of request URL path and query is identical to the contents of the 
- is_case_ boolsensitive 
- When enabled, the condition will be matched with case-sensitive rules.
- value str
- The value of the header.
- condition String
- The criteria the access rule and JavaScript Challenge uses to determine if action should be taken on a request.- URL_IS: Matches if the concatenation of request URL path and query is identical to the contents of the valuefield. URL must start with a/.
- URL_IS_NOT: Matches if the concatenation of request URL path and query is not identical to the contents of the valuefield. URL must start with a/.
- URL_STARTS_WITH: Matches if the concatenation of request URL path and query starts with the contents of the valuefield. URL must start with a/.
- URL_PART_ENDS_WITH: Matches if the concatenation of request URL path and query ends with the contents of the valuefield.
- URL_PART_CONTAINS: Matches if the concatenation of request URL path and query contains the contents of the valuefield.
- URL_REGEX: Matches if the concatenation of request URL path and query is described by the regular expression in the value field. The value must be a valid regular expression recognized by the PCRE library in Nginx (https://www.pcre.org).
- URL_DOES_NOT_MATCH_REGEX: Matches if the concatenation of request URL path and query is not described by the regular expression in the valuefield. The value must be a valid regular expression recognized by the PCRE library in Nginx (https://www.pcre.org).
- URL_DOES_NOT_START_WITH: Matches if the concatenation of request URL path and query does not start with the contents of the valuefield.
- URL_PART_DOES_NOT_CONTAIN: Matches if the concatenation of request URL path and query does not contain the contents of the valuefield.
- URL_PART_DOES_NOT_END_WITH: Matches if the concatenation of request URL path and query does not end with the contents of the valuefield.
- IP_IS: Matches if the request originates from one of the IP addresses contained in the defined address list. The valuein this case is string with one or multiple IPs or CIDR notations separated by new line symbol \n Example: "1.1.1.1\n1.1.1.2\n1.2.2.1/30"
- IP_IS_NOT: Matches if the request does not originate from any of the IP addresses contained in the defined address list. The valuein this case is string with one or multiple IPs or CIDR notations separated by new line symbol \n Example: "1.1.1.1\n1.1.1.2\n1.2.2.1/30"
- IP_IN_LIST: Matches if the request originates from one of the IP addresses contained in the referenced address list. The valuein this case is OCID of the address list.
- IP_NOT_IN_LIST: Matches if the request does not originate from any IP address contained in the referenced address list. The valuefield in this case is OCID of the address list.
- HTTP_HEADER_CONTAINS: The HTTP_HEADER_CONTAINS criteria is defined using a compound value separated by a colon: a header field name and a header field value. host:test.example.comis an example of a criteria value wherehostis the header field name andtest.example.comis the header field value. A request matches when the header field name is a case insensitive match and the header field value is a case insensitive, substring match. Example: With a criteria value ofhost:test.example.com, wherehostis the name of the field andtest.example.comis the value of the host field, a request with the header values,Host: www.test.example.comwill match, where as a request with header values ofhost: www.example.comorhost: test.sub.example.comwill not match.
- HTTP_METHOD_IS: Matches if the request method is identical to one of the values listed in field. The valuein this case is string with one or multiple HTTP methods separated by new line symbol \n The list of available methods:GET,HEAD,POST,PUT,DELETE,CONNECT,OPTIONS,TRACE,PATCH
 
- URL_IS: Matches if the concatenation of request URL path and query is identical to the contents of the 
- isCase BooleanSensitive 
- When enabled, the condition will be matched with case-sensitive rules.
- value String
- The value of the header.
GetWaasPoliciesWaasPolicyWafConfigJsChallengeSetHttpHeader           
GetWaasPoliciesWaasPolicyWafConfigProtectionSetting        
- AllowedHttp List<string>Methods 
- The list of allowed HTTP methods. If unspecified, default to [OPTIONS, GET, HEAD, POST]. This setting only applies if a corresponding protection rule is enabled, such as the "Restrict HTTP Request Methods" rule (key: 911100).
- BlockAction string
- If actionis set toBLOCK, this specifies how the traffic is blocked when detected as malicious by a protection rule. If unspecified, defaults toSET_RESPONSE_CODE.
- BlockError stringPage Code 
- The error code to show on the error page when actionis set toBLOCK,blockActionis set toSHOW_ERROR_PAGE, and the traffic is detected as malicious by a protection rule. If unspecified, defaults to403.
- BlockError stringPage Description 
- The description text to show on the error page when actionis set toBLOCK,blockActionis set toSHOW_ERROR_PAGE, and the traffic is detected as malicious by a protection rule. If unspecified, defaults toAccess blocked by website owner. Please contact support.
- BlockError stringPage Message 
- The message to show on the error page when actionis set toBLOCK,blockActionis set toSHOW_ERROR_PAGE, and the traffic is detected as malicious by a protection rule. If unspecified, defaults to 'Access to the website is blocked.'
- BlockResponse intCode 
- The response code returned when actionis set toBLOCK,blockActionis set toSET_RESPONSE_CODE, and the traffic is detected as malicious by a protection rule. If unspecified, defaults to403. The list of available response codes:400,401,403,405,409,411,412,413,414,415,416,500,501,502,503,504,507.
- IsResponse boolInspected 
- Inspects the response body of origin responses. Can be used to detect leakage of sensitive data. If unspecified, defaults to false.
- MaxArgument intCount 
- The maximum number of arguments allowed to be passed to your application before an action is taken. Arguements are query parameters or body parameters in a PUT or POST request. If unspecified, defaults to 255. This setting only applies if a corresponding protection rule is enabled, such as the "Number of Arguments Limits" rule (key: 960335). Example: IfmaxArgumentCountto2for the Max Number of Arguments protection rule (key: 960335), the following requests would be blocked:GET /myapp/path?query=one&query=two&query=threePOST /myapp/pathwith Body{"argument1":"one","argument2":"two","argument3":"three"}
- MaxName intLength Per Argument 
- The maximum length allowed for each argument name, in characters. Arguements are query parameters or body parameters in a PUT or POST request. If unspecified, defaults to 400. This setting only applies if a corresponding protection rule is enabled, such as the "Values Limits" rule (key: 960208).
- MaxResponse intSize In Ki B 
- The maximum response size to be fully inspected, in binary kilobytes (KiB). Anything over this limit will be partially inspected. If unspecified, defaults to 1024.
- MaxTotal intName Length Of Arguments 
- The maximum length allowed for the sum of the argument name and value, in characters. Arguements are query parameters or body parameters in a PUT or POST request. If unspecified, defaults to 64000. This setting only applies if a corresponding protection rule is enabled, such as the "Total Arguments Limits" rule (key: 960341).
- MediaTypes List<string>
- The list of media types to allow for inspection, if isResponseInspectedis enabled. Only responses with MIME types in this list will be inspected. If unspecified, defaults to["text/html", "text/plain", "text/xml"].
- RecommendationsPeriod intIn Days 
- The length of time to analyze traffic traffic, in days. After the analysis period, WafRecommendationswill be populated. If unspecified, defaults to10.
- AllowedHttp []stringMethods 
- The list of allowed HTTP methods. If unspecified, default to [OPTIONS, GET, HEAD, POST]. This setting only applies if a corresponding protection rule is enabled, such as the "Restrict HTTP Request Methods" rule (key: 911100).
- BlockAction string
- If actionis set toBLOCK, this specifies how the traffic is blocked when detected as malicious by a protection rule. If unspecified, defaults toSET_RESPONSE_CODE.
- BlockError stringPage Code 
- The error code to show on the error page when actionis set toBLOCK,blockActionis set toSHOW_ERROR_PAGE, and the traffic is detected as malicious by a protection rule. If unspecified, defaults to403.
- BlockError stringPage Description 
- The description text to show on the error page when actionis set toBLOCK,blockActionis set toSHOW_ERROR_PAGE, and the traffic is detected as malicious by a protection rule. If unspecified, defaults toAccess blocked by website owner. Please contact support.
- BlockError stringPage Message 
- The message to show on the error page when actionis set toBLOCK,blockActionis set toSHOW_ERROR_PAGE, and the traffic is detected as malicious by a protection rule. If unspecified, defaults to 'Access to the website is blocked.'
- BlockResponse intCode 
- The response code returned when actionis set toBLOCK,blockActionis set toSET_RESPONSE_CODE, and the traffic is detected as malicious by a protection rule. If unspecified, defaults to403. The list of available response codes:400,401,403,405,409,411,412,413,414,415,416,500,501,502,503,504,507.
- IsResponse boolInspected 
- Inspects the response body of origin responses. Can be used to detect leakage of sensitive data. If unspecified, defaults to false.
- MaxArgument intCount 
- The maximum number of arguments allowed to be passed to your application before an action is taken. Arguements are query parameters or body parameters in a PUT or POST request. If unspecified, defaults to 255. This setting only applies if a corresponding protection rule is enabled, such as the "Number of Arguments Limits" rule (key: 960335). Example: IfmaxArgumentCountto2for the Max Number of Arguments protection rule (key: 960335), the following requests would be blocked:GET /myapp/path?query=one&query=two&query=threePOST /myapp/pathwith Body{"argument1":"one","argument2":"two","argument3":"three"}
- MaxName intLength Per Argument 
- The maximum length allowed for each argument name, in characters. Arguements are query parameters or body parameters in a PUT or POST request. If unspecified, defaults to 400. This setting only applies if a corresponding protection rule is enabled, such as the "Values Limits" rule (key: 960208).
- MaxResponse intSize In Ki B 
- The maximum response size to be fully inspected, in binary kilobytes (KiB). Anything over this limit will be partially inspected. If unspecified, defaults to 1024.
- MaxTotal intName Length Of Arguments 
- The maximum length allowed for the sum of the argument name and value, in characters. Arguements are query parameters or body parameters in a PUT or POST request. If unspecified, defaults to 64000. This setting only applies if a corresponding protection rule is enabled, such as the "Total Arguments Limits" rule (key: 960341).
- MediaTypes []string
- The list of media types to allow for inspection, if isResponseInspectedis enabled. Only responses with MIME types in this list will be inspected. If unspecified, defaults to["text/html", "text/plain", "text/xml"].
- RecommendationsPeriod intIn Days 
- The length of time to analyze traffic traffic, in days. After the analysis period, WafRecommendationswill be populated. If unspecified, defaults to10.
- allowedHttp List<String>Methods 
- The list of allowed HTTP methods. If unspecified, default to [OPTIONS, GET, HEAD, POST]. This setting only applies if a corresponding protection rule is enabled, such as the "Restrict HTTP Request Methods" rule (key: 911100).
- blockAction String
- If actionis set toBLOCK, this specifies how the traffic is blocked when detected as malicious by a protection rule. If unspecified, defaults toSET_RESPONSE_CODE.
- blockError StringPage Code 
- The error code to show on the error page when actionis set toBLOCK,blockActionis set toSHOW_ERROR_PAGE, and the traffic is detected as malicious by a protection rule. If unspecified, defaults to403.
- blockError StringPage Description 
- The description text to show on the error page when actionis set toBLOCK,blockActionis set toSHOW_ERROR_PAGE, and the traffic is detected as malicious by a protection rule. If unspecified, defaults toAccess blocked by website owner. Please contact support.
- blockError StringPage Message 
- The message to show on the error page when actionis set toBLOCK,blockActionis set toSHOW_ERROR_PAGE, and the traffic is detected as malicious by a protection rule. If unspecified, defaults to 'Access to the website is blocked.'
- blockResponse IntegerCode 
- The response code returned when actionis set toBLOCK,blockActionis set toSET_RESPONSE_CODE, and the traffic is detected as malicious by a protection rule. If unspecified, defaults to403. The list of available response codes:400,401,403,405,409,411,412,413,414,415,416,500,501,502,503,504,507.
- isResponse BooleanInspected 
- Inspects the response body of origin responses. Can be used to detect leakage of sensitive data. If unspecified, defaults to false.
- maxArgument IntegerCount 
- The maximum number of arguments allowed to be passed to your application before an action is taken. Arguements are query parameters or body parameters in a PUT or POST request. If unspecified, defaults to 255. This setting only applies if a corresponding protection rule is enabled, such as the "Number of Arguments Limits" rule (key: 960335). Example: IfmaxArgumentCountto2for the Max Number of Arguments protection rule (key: 960335), the following requests would be blocked:GET /myapp/path?query=one&query=two&query=threePOST /myapp/pathwith Body{"argument1":"one","argument2":"two","argument3":"three"}
- maxName IntegerLength Per Argument 
- The maximum length allowed for each argument name, in characters. Arguements are query parameters or body parameters in a PUT or POST request. If unspecified, defaults to 400. This setting only applies if a corresponding protection rule is enabled, such as the "Values Limits" rule (key: 960208).
- maxResponse IntegerSize In Ki B 
- The maximum response size to be fully inspected, in binary kilobytes (KiB). Anything over this limit will be partially inspected. If unspecified, defaults to 1024.
- maxTotal IntegerName Length Of Arguments 
- The maximum length allowed for the sum of the argument name and value, in characters. Arguements are query parameters or body parameters in a PUT or POST request. If unspecified, defaults to 64000. This setting only applies if a corresponding protection rule is enabled, such as the "Total Arguments Limits" rule (key: 960341).
- mediaTypes List<String>
- The list of media types to allow for inspection, if isResponseInspectedis enabled. Only responses with MIME types in this list will be inspected. If unspecified, defaults to["text/html", "text/plain", "text/xml"].
- recommendationsPeriod IntegerIn Days 
- The length of time to analyze traffic traffic, in days. After the analysis period, WafRecommendationswill be populated. If unspecified, defaults to10.
- allowedHttp string[]Methods 
- The list of allowed HTTP methods. If unspecified, default to [OPTIONS, GET, HEAD, POST]. This setting only applies if a corresponding protection rule is enabled, such as the "Restrict HTTP Request Methods" rule (key: 911100).
- blockAction string
- If actionis set toBLOCK, this specifies how the traffic is blocked when detected as malicious by a protection rule. If unspecified, defaults toSET_RESPONSE_CODE.
- blockError stringPage Code 
- The error code to show on the error page when actionis set toBLOCK,blockActionis set toSHOW_ERROR_PAGE, and the traffic is detected as malicious by a protection rule. If unspecified, defaults to403.
- blockError stringPage Description 
- The description text to show on the error page when actionis set toBLOCK,blockActionis set toSHOW_ERROR_PAGE, and the traffic is detected as malicious by a protection rule. If unspecified, defaults toAccess blocked by website owner. Please contact support.
- blockError stringPage Message 
- The message to show on the error page when actionis set toBLOCK,blockActionis set toSHOW_ERROR_PAGE, and the traffic is detected as malicious by a protection rule. If unspecified, defaults to 'Access to the website is blocked.'
- blockResponse numberCode 
- The response code returned when actionis set toBLOCK,blockActionis set toSET_RESPONSE_CODE, and the traffic is detected as malicious by a protection rule. If unspecified, defaults to403. The list of available response codes:400,401,403,405,409,411,412,413,414,415,416,500,501,502,503,504,507.
- isResponse booleanInspected 
- Inspects the response body of origin responses. Can be used to detect leakage of sensitive data. If unspecified, defaults to false.
- maxArgument numberCount 
- The maximum number of arguments allowed to be passed to your application before an action is taken. Arguements are query parameters or body parameters in a PUT or POST request. If unspecified, defaults to 255. This setting only applies if a corresponding protection rule is enabled, such as the "Number of Arguments Limits" rule (key: 960335). Example: IfmaxArgumentCountto2for the Max Number of Arguments protection rule (key: 960335), the following requests would be blocked:GET /myapp/path?query=one&query=two&query=threePOST /myapp/pathwith Body{"argument1":"one","argument2":"two","argument3":"three"}
- maxName numberLength Per Argument 
- The maximum length allowed for each argument name, in characters. Arguements are query parameters or body parameters in a PUT or POST request. If unspecified, defaults to 400. This setting only applies if a corresponding protection rule is enabled, such as the "Values Limits" rule (key: 960208).
- maxResponse numberSize In Ki B 
- The maximum response size to be fully inspected, in binary kilobytes (KiB). Anything over this limit will be partially inspected. If unspecified, defaults to 1024.
- maxTotal numberName Length Of Arguments 
- The maximum length allowed for the sum of the argument name and value, in characters. Arguements are query parameters or body parameters in a PUT or POST request. If unspecified, defaults to 64000. This setting only applies if a corresponding protection rule is enabled, such as the "Total Arguments Limits" rule (key: 960341).
- mediaTypes string[]
- The list of media types to allow for inspection, if isResponseInspectedis enabled. Only responses with MIME types in this list will be inspected. If unspecified, defaults to["text/html", "text/plain", "text/xml"].
- recommendationsPeriod numberIn Days 
- The length of time to analyze traffic traffic, in days. After the analysis period, WafRecommendationswill be populated. If unspecified, defaults to10.
- allowed_http_ Sequence[str]methods 
- The list of allowed HTTP methods. If unspecified, default to [OPTIONS, GET, HEAD, POST]. This setting only applies if a corresponding protection rule is enabled, such as the "Restrict HTTP Request Methods" rule (key: 911100).
- block_action str
- If actionis set toBLOCK, this specifies how the traffic is blocked when detected as malicious by a protection rule. If unspecified, defaults toSET_RESPONSE_CODE.
- block_error_ strpage_ code 
- The error code to show on the error page when actionis set toBLOCK,blockActionis set toSHOW_ERROR_PAGE, and the traffic is detected as malicious by a protection rule. If unspecified, defaults to403.
- block_error_ strpage_ description 
- The description text to show on the error page when actionis set toBLOCK,blockActionis set toSHOW_ERROR_PAGE, and the traffic is detected as malicious by a protection rule. If unspecified, defaults toAccess blocked by website owner. Please contact support.
- block_error_ strpage_ message 
- The message to show on the error page when actionis set toBLOCK,blockActionis set toSHOW_ERROR_PAGE, and the traffic is detected as malicious by a protection rule. If unspecified, defaults to 'Access to the website is blocked.'
- block_response_ intcode 
- The response code returned when actionis set toBLOCK,blockActionis set toSET_RESPONSE_CODE, and the traffic is detected as malicious by a protection rule. If unspecified, defaults to403. The list of available response codes:400,401,403,405,409,411,412,413,414,415,416,500,501,502,503,504,507.
- is_response_ boolinspected 
- Inspects the response body of origin responses. Can be used to detect leakage of sensitive data. If unspecified, defaults to false.
- max_argument_ intcount 
- The maximum number of arguments allowed to be passed to your application before an action is taken. Arguements are query parameters or body parameters in a PUT or POST request. If unspecified, defaults to 255. This setting only applies if a corresponding protection rule is enabled, such as the "Number of Arguments Limits" rule (key: 960335). Example: IfmaxArgumentCountto2for the Max Number of Arguments protection rule (key: 960335), the following requests would be blocked:GET /myapp/path?query=one&query=two&query=threePOST /myapp/pathwith Body{"argument1":"one","argument2":"two","argument3":"three"}
- max_name_ intlength_ per_ argument 
- The maximum length allowed for each argument name, in characters. Arguements are query parameters or body parameters in a PUT or POST request. If unspecified, defaults to 400. This setting only applies if a corresponding protection rule is enabled, such as the "Values Limits" rule (key: 960208).
- max_response_ intsize_ in_ ki_ b 
- The maximum response size to be fully inspected, in binary kilobytes (KiB). Anything over this limit will be partially inspected. If unspecified, defaults to 1024.
- max_total_ intname_ length_ of_ arguments 
- The maximum length allowed for the sum of the argument name and value, in characters. Arguements are query parameters or body parameters in a PUT or POST request. If unspecified, defaults to 64000. This setting only applies if a corresponding protection rule is enabled, such as the "Total Arguments Limits" rule (key: 960341).
- media_types Sequence[str]
- The list of media types to allow for inspection, if isResponseInspectedis enabled. Only responses with MIME types in this list will be inspected. If unspecified, defaults to["text/html", "text/plain", "text/xml"].
- recommendations_period_ intin_ days 
- The length of time to analyze traffic traffic, in days. After the analysis period, WafRecommendationswill be populated. If unspecified, defaults to10.
- allowedHttp List<String>Methods 
- The list of allowed HTTP methods. If unspecified, default to [OPTIONS, GET, HEAD, POST]. This setting only applies if a corresponding protection rule is enabled, such as the "Restrict HTTP Request Methods" rule (key: 911100).
- blockAction String
- If actionis set toBLOCK, this specifies how the traffic is blocked when detected as malicious by a protection rule. If unspecified, defaults toSET_RESPONSE_CODE.
- blockError StringPage Code 
- The error code to show on the error page when actionis set toBLOCK,blockActionis set toSHOW_ERROR_PAGE, and the traffic is detected as malicious by a protection rule. If unspecified, defaults to403.
- blockError StringPage Description 
- The description text to show on the error page when actionis set toBLOCK,blockActionis set toSHOW_ERROR_PAGE, and the traffic is detected as malicious by a protection rule. If unspecified, defaults toAccess blocked by website owner. Please contact support.
- blockError StringPage Message 
- The message to show on the error page when actionis set toBLOCK,blockActionis set toSHOW_ERROR_PAGE, and the traffic is detected as malicious by a protection rule. If unspecified, defaults to 'Access to the website is blocked.'
- blockResponse NumberCode 
- The response code returned when actionis set toBLOCK,blockActionis set toSET_RESPONSE_CODE, and the traffic is detected as malicious by a protection rule. If unspecified, defaults to403. The list of available response codes:400,401,403,405,409,411,412,413,414,415,416,500,501,502,503,504,507.
- isResponse BooleanInspected 
- Inspects the response body of origin responses. Can be used to detect leakage of sensitive data. If unspecified, defaults to false.
- maxArgument NumberCount 
- The maximum number of arguments allowed to be passed to your application before an action is taken. Arguements are query parameters or body parameters in a PUT or POST request. If unspecified, defaults to 255. This setting only applies if a corresponding protection rule is enabled, such as the "Number of Arguments Limits" rule (key: 960335). Example: IfmaxArgumentCountto2for the Max Number of Arguments protection rule (key: 960335), the following requests would be blocked:GET /myapp/path?query=one&query=two&query=threePOST /myapp/pathwith Body{"argument1":"one","argument2":"two","argument3":"three"}
- maxName NumberLength Per Argument 
- The maximum length allowed for each argument name, in characters. Arguements are query parameters or body parameters in a PUT or POST request. If unspecified, defaults to 400. This setting only applies if a corresponding protection rule is enabled, such as the "Values Limits" rule (key: 960208).
- maxResponse NumberSize In Ki B 
- The maximum response size to be fully inspected, in binary kilobytes (KiB). Anything over this limit will be partially inspected. If unspecified, defaults to 1024.
- maxTotal NumberName Length Of Arguments 
- The maximum length allowed for the sum of the argument name and value, in characters. Arguements are query parameters or body parameters in a PUT or POST request. If unspecified, defaults to 64000. This setting only applies if a corresponding protection rule is enabled, such as the "Total Arguments Limits" rule (key: 960341).
- mediaTypes List<String>
- The list of media types to allow for inspection, if isResponseInspectedis enabled. Only responses with MIME types in this list will be inspected. If unspecified, defaults to["text/html", "text/plain", "text/xml"].
- recommendationsPeriod NumberIn Days 
- The length of time to analyze traffic traffic, in days. After the analysis period, WafRecommendationswill be populated. If unspecified, defaults to10.
GetWaasPoliciesWaasPolicyWafConfigWhitelist       
- AddressLists List<string>
- A list of OCID of IP address lists to include in the whitelist.
- Addresses List<string>
- A set of IP addresses or CIDR notations to include in the whitelist.
- Name string
- The unique name of the whitelist.
- AddressLists []string
- A list of OCID of IP address lists to include in the whitelist.
- Addresses []string
- A set of IP addresses or CIDR notations to include in the whitelist.
- Name string
- The unique name of the whitelist.
- addressLists List<String>
- A list of OCID of IP address lists to include in the whitelist.
- addresses List<String>
- A set of IP addresses or CIDR notations to include in the whitelist.
- name String
- The unique name of the whitelist.
- addressLists string[]
- A list of OCID of IP address lists to include in the whitelist.
- addresses string[]
- A set of IP addresses or CIDR notations to include in the whitelist.
- name string
- The unique name of the whitelist.
- address_lists Sequence[str]
- A list of OCID of IP address lists to include in the whitelist.
- addresses Sequence[str]
- A set of IP addresses or CIDR notations to include in the whitelist.
- name str
- The unique name of the whitelist.
- addressLists List<String>
- A list of OCID of IP address lists to include in the whitelist.
- addresses List<String>
- A set of IP addresses or CIDR notations to include in the whitelist.
- name String
- The unique name of the whitelist.
Package Details
- Repository
- oci pulumi/pulumi-oci
- License
- Apache-2.0
- Notes
- This Pulumi package is based on the ociTerraform Provider.