Security policies can be used to provide selective access to data and services. These policies enable protection from XML/JSON/Regex threats, and provides authentication services as well.
Security policies available are:
- Verify API Key
- IP Filtering
- XML Threat Protection
- JSON Threat Protection
- Regex Protection
- Validate JSON
- OAUTH 2.0
- Encrypt Message
- Decrypt Message
Figure 1: Policies under the Security category
Important Points to note
Below points are applicable to the Policy Configuration sections:
- -1 is the default value for the maximum limit to be specified in attributes present, which implies to no limit set.
- The Add/Edit Rule icon present in Policy Configuration screens (right side of the Policy Configuration heading) helps to add new conditional checks if needed.
- Reset icon present in the upper-right part of the Policy Configuration screens helps to quickly revert to default values.