You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: CONFIGURATIONS.md
+8Lines changed: 8 additions & 0 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -53,6 +53,14 @@ Directives
53
53
|loginResponseValidationStatusCode|Array of status codes that is used to validate if the login was successful.|{200}|int[]
54
54
|customLoginResponseValidator|Custom class that validates if the login was successful. LoginResponseValidator must be implemented to be able to use this class.|DefaultCustomLoginResponseValidator|LoginResponseValidator
55
55
|credentialsCustomExtractor|Custom class that extracts the login credentials. CredentialsExtractor must be implemented to be able to use this class.|DefaultCredentialsCustomExtractor|CredentialsExtractor
56
+
||pxDataEnrichmentHeaderName|Header name for forwarding data enrichment payload to origin server. When set, the SDK will add the PXDE payload as a header that can be forwarded to backend services.|"" (empty string)|String|Used with data enrichment feature
57
+
||securedPxhdEnabled|Enable secure flag on pxhd cookie for enhanced security in HTTPS-only environments.|false|boolean|
58
+
||pxJwtCookieName|Name of the cookie containing JWT token for user identifier extraction.|null|String|Part of Account Defender JWT user identifiers feature
59
+
||pxJwtCookieUserIdFieldName|Field name in JWT payload to extract as user ID from cookie.|null|String|Supports dot notation for nested fields (e.g., "user.id")
60
+
||pxJwtCookieAdditionalFieldNames|List of additional field names to extract from JWT cookie payload.|Empty List|List<String>|Supports dot notation for nested fields
61
+
||pxJwtHeaderName|Name of the header containing JWT token for user identifier extraction.|null|String|Part of Account Defender JWT user identifiers feature
62
+
||pxJwtHeaderUserIdFieldName|Field name in JWT payload to extract as user ID from header.|null|String|Supports dot notation for nested fields (e.g., "sub")
63
+
||pxJwtHeaderAdditionalFieldNames|List of additional field names to extract from JWT header payload.|Empty List|List<String>|Supports dot notation for nested fields
56
64
57
65
## <aname="interfaces"></a> Interfaces
58
66
`perimeterx-java-sdk` can be tuned and set a different type of interface in order to make the module more flexible
To forward the data enrichment payload to your backend/origin server, configure the header name. After `pxVerify` completes, the PXDE payload will be automatically added as a header to the request, which can then be forwarded:
TheSDK can extract user identifiers from JWT tokens in cookies or headers to enhance AccountDefender capabilities. This allows PerimeterX to correlate user activity across sessions and improve detection accuracy.
1.First attempt to extract user identifiers from the configured cookie
297
+
2.If not found, attempt to extract from the configured header
298
+
3.Support dot notation for nested fields (e.g., "user.id")
299
+
4.Automatically handle Bearer token prefixes in headers
300
+
301
+
#### <a name="secured-pxhd"></a>SecuredPXHDCookie
302
+
303
+
For enhanced security in HTTPS-only environments, you can enable the secure flag on the `pxhd` cookie. This ensures the cookie is only transmitted over secure connections:
>Only enable this in environments where all traffic is served over HTTPS, as the cookie will not be sent over HTTP connections when this flag is enabled.
0 commit comments