Inspect the client request
-
- UpdatedJul 10, 2025
- 2 minutes to read
- Yokohama
- Edge Encryption
Before creating a custom encryption rule, you must determine the format of the client request entering the Edge Encryption proxy server.
Before you begin
Role required: admin
About this task
Because encryption rules iterate over client requests and determine what, if anything, needs to be encrypted, you must understand the type of request you are creating a rule for. The format of the client request determines the structure of your encryption rule and the APIs available for use in the rule.
Procedure
Result
Inspecting the request provides an understanding of the fields you need to filter for and iterate over in your encryption rule. To understand the fields in the request object, see request.