The access rules applied to the Web Application Firewall. Used for defining custom access policies with the combination of {@code ALLOW}, {@code DETECT}, and {@code BLOCK} rules, based on different criteria.
The IP address rate limiting settings used to limit the number of requests from an address.
A list of caching rules applied to the web application.
A list of CAPTCHA challenge settings. These are used to challenge requests with a CAPTCHA to block bots.
A list of the custom protection rule OCIDs and their actions.
The device fingerprint challenge settings. Used to detect unique devices based on the device fingerprint information collected in order to block bots.
A list of bots allowed to access the web application.
The human interaction challenge settings. Used to look for natural human interactions such as mouse movements, time on site, and page scrolling to identify bots.
The JavaScript challenge settings. Used to challenge requests with a JavaScript challenge and take the action if a browser has no JavaScript support in order to block bots.
The key in the map of origins referencing the origin used for the Web Application Firewall. The origin must already be included in {@code Origins}. Required when creating the {@code WafConfig} resource, but not on update.
The map of origin groups and their keys used to associate origins to the {@code wafConfig}. Origin groups allow you to apply weights to groups of origins for load balancing purposes. Origins with higher weights will receive larger proportions of client requests. To add additional origins to your WAAS policy, update the {@code origins} field of a {@code UpdateWaasPolicy} request.
A list of the protection rules and their details.
The settings to apply to protection rules.
A list of threat intelligence feeds and the actions to apply to known malicious traffic based on internet intelligence.
A list of IP addresses that bypass the Web Application Firewall.
The Web Application Firewall configuration for the WAAS policy.