Hi there! Are you looking for the official Deno documentation? Try docs.deno.com for all your Deno learning needs.

AWSManagedRulesATPRuleSet

import type { AWSManagedRulesATPRuleSet } from "https://aws-api.deno.dev/v0.4/services/wafv2.ts?docs=full";

Details for your use of the account takeover prevention managed rule group, AWSManagedRulesATPRuleSet. This configuration is used in ManagedRuleGroupConfig.

interface AWSManagedRulesATPRuleSet {
LoginPath: string;
RequestInspection?: RequestInspection | null;
ResponseInspection?: ResponseInspection | null;
}

§Properties

§
LoginPath: string
[src]

The path of the login endpoint for your application. For example, for the URL https://example.com/web/login, you would provide the path /web/login.

The rule group inspects only HTTP POST requests to your specified login endpoint.

§
RequestInspection?: RequestInspection | null
[src]

The criteria for inspecting login requests, used by the ATP rule group to validate credentials usage.

§
ResponseInspection?: ResponseInspection | null
[src]

The criteria for inspecting responses to login requests, used by the ATP rule group to track login failure rates.

The ATP rule group evaluates the responses that your protected resources send back to client login attempts, keeping count of successful and failed attempts from each IP address and client session. Using this information, the rule group labels and mitigates requests from client sessions and IP addresses that submit too many failed login attempts in a short amount of time.

Note: Response inspection is available only in web ACLs that protect Amazon CloudFront distributions.