Security rules administration

Learn how to access and interpret the security rules administrative UI.

Accessing the security rules administrative UI

The security rules administrative UI is linked to from the main /admin page. EZproxy hosted admin users may also access this page to examine their security rules.

clipboard_ec6ee85444992e04f490e43a5e53d480d.png

Security rules administrative UI screens

The security rules administrative UI consists of three primary screens: a summary of active security rules, users exempt from rule enforcement, and a list of tripped rules.

clipboard_e6beb454268564d8c7c96e7dc3121d1cd.png

Security rules

The security rules screen summarizes the active security rules on your EZproxy server. Clicking the number in the Tripped column will show you specific events when that rule has been triggered.

clipboard_ee852382afae6a03c28a1691e05f9d2e7.png

Security exemptions

The security exemptions screen lists any users exempt from security rule enforcement and allows you to add new exemptions. Exemptions may only be added on this UI screen; there is no command-line equivalent. Please use this feature with caution, as it will exempt the user from all rule enforcement. This may be useful in the case of shared accounts or users whose internet service providers change IP addresses frequently.

clipboard_ebe84d53d472929ebaeacf798af582ada.png

Tripped security rules

The tripped security rules screen shows a summary of recently tripped security rules. Clicking on the number in the Observed column will show you detailed evidence describing why the rules was tripped.

clipboard_e9bc678140389a0dbc9e8491bbb30826c.png

clipboard_e160934053db8b8ced79615a2a1585246.png