当前位置:网站首页>If the cloud knows that security is important
If the cloud knows that security is important
2022-06-24 03:04:00 【Tencent cloud development TCB】
For a small program ,「 A sense of security 」 Very important .
In order to ensure the security of small programs , After the user enters text , Developers need to check whether a text contains illegal content .
that , Is there a way : There is no need for applet developers to manually judge the user input scenario 、 Call the content security interface , It can also timely prevent possible content security threats ?
If we can let 「 cloud 」 know , Whether the content of a text is safe , Can you save more time to focus on your business ?
In order to allow more small programs to be developed safely and operate legally , Cloud development has been launched Content security Here comes the function ! Support For the information stored in the cloud development database Set content security rules , Realization Automatic content matching , And deal with the contents that trigger violations .
What about? ? Do you feel full of security and steady happiness .
The configuration of content security function is also very simple , Two steps to enable :
First step : Opening
Enter the latest version of wechat developer tool , Open the cloud development console , Click on “ more ”-“ Content security ” Open up ( Pay as you go environments only ).
The second step : Create content audit rules
Click on “ add to ” Button , In the drop-down box, select the name of the collection to which you want to apply the content security rule , Configuration fields key value , Fill in the rewritten content after triggering the violation , If this field is audited and a violation is triggered , Will be automatically rewritten to this content .
For the set field of the configuration rule , Each insertion 、 Update and other operations , Content review will be performed automatically , The content of the database field that triggers the violation will be rewritten into the preset rewritten content , And generate audit records .
When content security is enabled , You can also filter the collection names of configured rules 、 Field name and approval time to view the approval details . If the rewrite result does not meet expectations , Developers can also click... In the action column “ Back off ” Button , Automatically restore the content of this field to its original content .
at present , Developers can use content security features for free , If there is any change in the subsequent billing rules, a comprehensive notice will be given , Welcome to the developer experience .
The related documents :
https://developers.weixin.qq.com/miniprogram/dev/wxcloud/basis/Consecurity.html
边栏推荐
- How to build a private cloud desktop with a server? How to use cloud desktop?
- Disk and file system (Simplified)
- The reason why SAS fortress cannot connect to the server
- Is your database "cloud native"?
- Where is the cloud game server? Can individuals rent cloud game servers?
- The server size of the cloud desktop. The cloud desktop faces the server configuration requirements
- Cloud call: one line of code is directly connected to wechat open interface capability
- Why should I change my PC to a cloud desktop server? What are the characteristics of this server?
- Tencent cloud CVM starts IPv6
- Grpc: how to reasonably manage log configuration?
猜你喜欢
![[51nod] 2653 section XOR](/img/2d/cb4bf4e14939ce432cac6d35b6a41b.jpg)
[51nod] 2653 section XOR
![[51nod] 3047 displacement operation](/img/cb/9380337adbc09c54a5b984cab7d3b8.jpg)
[51nod] 3047 displacement operation

2022-2028 global marine clutch industry research and trend analysis report

2022-2028 global pilot night vision goggle industry research and trend analysis report
![[summary of interview questions] zj6 redis](/img/4b/eadf66ca8d834f049f3546d348fa32.jpg)
[summary of interview questions] zj6 redis
![[summary of interview questions] zj5](/img/d8/ece82f8b2479adb948ba706f6f5039.jpg)
[summary of interview questions] zj5

2022-2028 global high tibial osteotomy plate industry research and trend analysis report

2022-2028 global medical modified polypropylene industry research and trend analysis report
![[51nod] 2106 an odd number times](/img/af/59b441420aa4f12fd50f5062a83fae.jpg)
[51nod] 2106 an odd number times

2022-2028 global aircraft front wheel steering system industry research and trend analysis report
随机推荐
[51nod] 3395 n-bit gray code
How do I check the trademark registration number? Where do I need to check?
How to access the server through the fortress machine? What's the use of the fortress machine?
How much does it cost to rent a cloud game server? Which cloud game server is more reliable?
Cp/rm/mv parameters
The server size of the cloud desktop. The cloud desktop faces the server configuration requirements
2022-2028 global anti counterfeiting label industry research and trend analysis report
What are the responsibilities of cloud desktop administrators? How to use cloud desktop?
JD Logistics: from giant baby to mainstay
Permission maintenance topic: domain controller permission maintenance
14. Tencent cloud IOT device side learning - data template application development
What is the meaning of scdo? Is it comparable to bGH
I have a server. What can I do?
More than 10 million Android users installed a fraud app and doubled the number of blackmail attacks in the UK | global network security hotspot
2022-2028 global marine clutch industry research and trend analysis report
Production line motor monitoring and maintenance - application case of 5g edge calculation for paperboard line motor maintenance
2022-2028 global indoor pressure monitor and environmental monitor industry research and trend analysis report
Grpc: implement service end flow restriction
Easynvr shows that the channel is online but cannot be played. Troubleshooting (non video streaming)
Deep and shallow copy