Thank you for your feedback.
Form temporarily unavailable. Please try again or contact to submit your comments.

Inspect the client request

Log in to subscribe to topics and get notified when content changes.

Inspect the client request

Before creating a custom encryption rule, you must determine the format of the client request entering the Edge Encryption proxy server.

About this task

Because encryption rules iterate over client requests and determine what, if anything, needs to be encrypted, you must understand the type of request you are creating a rule for. The format of the client request determines the structure of your encryption rule and the APIs available for use in the rule.


  1. Inspect the client request.

    Depending on the source of the request, the following tools are available to inspect the request and determine the format.

    Source of request Available tools
    Client browser

    Use the developer console in your browser to inspect the client request. Useful tools include:

    Third-party/external source

    Use an HTTP protocol analyzer to inspect the request. Useful tools include:

    Alternatively, you can often use documentation for the external source to determine the format of the request.

  2. From the client request, inspect the packet and determine:
    • The client request method
    • The URL path of the request
    • The URL parameters
    • The POST parameters, if any
    • The format of the request body, if included


Inspecting the request provides an understanding of the fields you need to filter for and iterate over in your encryption rule. To understand the fields in the request object, see request.