paws.security.identity (version 0.1.0)

waf_create_sql_injection_match_set: Creates a SqlInjectionMatchSet, which you use to allow, block, or count requests that contain snippets of SQL code in a specified part of web requests

Description

Creates a SqlInjectionMatchSet, which you use to allow, block, or count requests that contain snippets of SQL code in a specified part of web requests. AWS WAF searches for character sequences that are likely to be malicious strings.

Usage

waf_create_sql_injection_match_set(Name, ChangeToken)

Arguments

Name

[required] A friendly name or description for the SqlInjectionMatchSet that you're creating. You can't change Name after you create the SqlInjectionMatchSet.

ChangeToken

[required] The value returned by the most recent call to GetChangeToken.

Request syntax

svc$create_sql_injection_match_set(
  Name = "string",
  ChangeToken = "string"
)

Details

To create and configure a SqlInjectionMatchSet, perform the following steps:

  1. Use GetChangeToken to get the change token that you provide in the ChangeToken parameter of a CreateSqlInjectionMatchSet request.

  2. Submit a CreateSqlInjectionMatchSet request.

  3. Use GetChangeToken to get the change token that you provide in the ChangeToken parameter of an UpdateSqlInjectionMatchSet request.

  4. Submit an UpdateSqlInjectionMatchSet request to specify the parts of web requests in which you want to allow, block, or count malicious SQL code.

For more information about how to use the AWS WAF API to allow or block HTTP requests, see the AWS WAF Developer Guide.

Examples

Run this code
# NOT RUN {
# The following example creates a SQL injection match set named
# MySQLInjectionMatchSet.
# }
# NOT RUN {
svc$create_sql_injection_match_set(
  ChangeToken = "abcd12f2-46da-4fdb-b8d5-fbd4c466928f",
  Name = "MySQLInjectionMatchSet"
)
# }
# NOT RUN {
# }

Run the code above in your browser using DataLab