Directives
HUMANConfigurations
Interfaces
perimeterx-java-sdk
can be tuned and set a different types of interfaces in order to make the module more flexible
Below you can find a list of available interfaces and their setter
The interfaces should be set after HUMAN instance has been initialized
Configuration Examples
Basic Active And Blocking Configuration
Module Enabled/Disabled
Monitored routes
Enforced routes
Tune Blocking Score Threshold
Sensitive Headers
IP Headers
Sensitive Routes
Customizing Default Block Page
Custom Parameters Provider
Risk API requests can be enriched with custom parameters by implementing CustomParametersProvider and adding logic to extract the custom parameters from the request.
Before implementing the interface, please make sure to configure custom parameters on HUMAN portal.
Make sure that the custom parameters are NOT marked as query strings
Custom Sensitive Request
Allows writing your own logic to decide whether the request is sensitive.
The custom sensitive request function gets the request object as a parameter and should return true, otherwise, return false. Throwing an exception is equivalent to false
. Implementing this configuration does not override other sensitive
configurations, like sensitive_routes
.
Example
Proxy Integration
Providing a proxy allows the communication between the Enforcer and our backend service via proxy. You can set the proxy as a hostname (with a domain name), or as an ip port combination. If you choose to use the proxy’s domain, do not enter a port in the configuration. Make sure you have the proxy’s certificate installed on the machine that is running the Enforcer.