Block unwanted identification requests to prevent malicious actors from misusing your Fingerprint public API keys.
New iteration of request filtering gives you more flexibility and control when blocking unwanted identification requests. You have full control over order of execution, and you can create more complex rules by using our flexible expression language.
🚧Request Filtering V2 is currently in beta. This will allow us to validate its functionalities and make improvements before full release. If you want to use it and provide feedback, please follow the migration guide.
With expression-based filtering rules, you can allow or deny any request that matches the criteria in the expression. Every rule takes the form of [allow | deny] if [expression is true].Rules are evaluated in order they are listed:
Rule expressions will resolve to a boolean that determines if the rule matches or not.
The first rule that matches will determine if the request is allowed or denied.
Managing of filtering rules is supported in both the Dashboard and via Management API.Inside the Dashboard, navigate to Security in the left-hand menu.To create a new rule:
Click on Add rule. New empty rule will be added at the bottom of the page.
Select Allow or Deny if you want this rule to allow or deny the request
Click on the Checkmark to save your rule. If the rule expression is not valid, you will see an error message.
To reorder rules, drag & drop the rules in the list to your desired order.
🚧During the beta phase, UI options for managing rules are limited. With full release, you can expect a more versatile editor with validation and autocomplete.
Here are some examples of most common use cases which should cover all functionalities from the old version of request filtering rules. Check out **Expression language **reference for full list of available data points, operators and functions.
You can use regular expressions to search for string values that match a given pattern. When using regular expression, rule needs to use matches keyword, and the pattern string needs to be enclosed using backticks (`) instead of regular quotation marks.
With logical operators, you can chain multiple conditions into a single expression.Use the && operator to indicate AND operator, and || operator to indicate OR operator.
Deny requests from specific IP address on a specific domain
[deny] http.request.ip in cidr('123.0.0.1/32') && http.request.headers['Origin'][0] == 'https://example.com'
The maximum number of request filtering rules on the web is defined by Account limits. If you need more request filtering rules, please reach out to our support team.In addition, there are additional limitations regarding specific rule expressions:
Max rule expression length: 1024 characters
Max number of regular expression patterns allowed in a single expression: 10
Request filtering V2 is currently in beta, which means that we are still refining the scope and functionalities. If you want access to the flexibility and control the new system offers with expression-based rules, you can contact support to enable you access to Request Filtering V2.