patchOwaspWafPackage
PATCH
https://{shortCode}.api.commercecloud.salesforce.com/cdn/zones/v1/organizations/{organizationId}/zones/{zoneId}/firewall/waf/packages/owasp
Patch a OWASP ModSecurity Core Rule Set.
Request
curl "https://{shortCode}.api.commercecloud.salesforce.com/cdn/zones/v1/organizations/{organizationId}/zones/{zoneId}/firewall/waf/packages/owasp" \
-X PATCH \
-H "content-type: application/json" \
-d '{
"sensitivity": "low",
"action_mode": "simulate"
}'
Security
URI parameters
shortCode
string
Required
Region-specific merchant identifier.
0dnz6oep
version
string
Required
organizationId
string
Required
zoneId
string
Required
Body
Media type:
application/json
{
"sensitivity": "low",
"action_mode": "simulate"
}
sensitivity
string
enum
Required
Sensitivity for traditional (owasp) rule package.
Enum values:
- low
- medium
- high
- off
action_mode
string
enum
Required
The default action that is taken for rules under traditional(owasp) firewall package.
Enum values:
- simulate
- challenge
- block
Responses
Successfully patched a OWASP ModSecurity Core Rule Set
{
"data": {
"id": "c504870194831cd12c3fc0284f294abb",
"name": "OWASP ModSecurity Core Rule Set",
"description": "OWASP Core Ruleset (2013) provides protection against common attack categories, including SQL Injection and Cross-Site Scripting.",
"zone_id": "56702a674281951f541f9f304f7431f0",
"detection_mode": "anomaly",
"sensitivity": "low",
"action_mode": "simulate"
}
}
Body
Media type:
application/json
data
object
Required
The result of the resource requested by the caller.