当前位置:网站首页>If the cloud knows that security is important
If the cloud knows that security is important
2022-06-24 03:04:00 【Tencent cloud development TCB】
For a small program ,「 A sense of security 」 Very important .
In order to ensure the security of small programs , After the user enters text , Developers need to check whether a text contains illegal content .
that , Is there a way : There is no need for applet developers to manually judge the user input scenario 、 Call the content security interface , It can also timely prevent possible content security threats ?
If we can let 「 cloud 」 know , Whether the content of a text is safe , Can you save more time to focus on your business ?
In order to allow more small programs to be developed safely and operate legally , Cloud development has been launched Content security Here comes the function ! Support For the information stored in the cloud development database Set content security rules , Realization Automatic content matching , And deal with the contents that trigger violations .
What about? ? Do you feel full of security and steady happiness .
The configuration of content security function is also very simple , Two steps to enable :
First step : Opening
Enter the latest version of wechat developer tool , Open the cloud development console , Click on “ more ”-“ Content security ” Open up ( Pay as you go environments only ).
The second step : Create content audit rules
Click on “ add to ” Button , In the drop-down box, select the name of the collection to which you want to apply the content security rule , Configuration fields key value , Fill in the rewritten content after triggering the violation , If this field is audited and a violation is triggered , Will be automatically rewritten to this content .
For the set field of the configuration rule , Each insertion 、 Update and other operations , Content review will be performed automatically , The content of the database field that triggers the violation will be rewritten into the preset rewritten content , And generate audit records .
When content security is enabled , You can also filter the collection names of configured rules 、 Field name and approval time to view the approval details . If the rewrite result does not meet expectations , Developers can also click... In the action column “ Back off ” Button , Automatically restore the content of this field to its original content .
at present , Developers can use content security features for free , If there is any change in the subsequent billing rules, a comprehensive notice will be given , Welcome to the developer experience .
The related documents :
https://developers.weixin.qq.com/miniprogram/dev/wxcloud/basis/Consecurity.html
边栏推荐
- Solution to session problem of missing laravel jump page
- Gin framework: adding swagger UI
- What does operation and maintenance audit fortress mean? How to select the operation and maintenance audit fortress machine?
- 2022-2028 global genome editing mutation detection kit industry survey and trend analysis report
- Storage crash MySQL database recovery case
- Is AI face detection and face recognition a concept? What's the difference?
- What is the 4A server fortress machine? What is the price of the fortress machine
- JD Logistics: from giant baby to mainstay
- Tstor onecos, focusing on a large number of object scenes
- Deep and shallow copy
猜你喜欢

2022-2028 global medical modified polypropylene industry research and trend analysis report

2022-2028 global cancer biopsy instrument and kit industry research and trend analysis report

2022-2028 global aircraft wireless intercom system industry research and trend analysis report

Simple and beautiful weather code

IOS development - multithreading - thread safety (3)
![[51nod] 2106 an odd number times](/img/af/59b441420aa4f12fd50f5062a83fae.jpg)
[51nod] 2106 an odd number times

2022-2028 Global Industry Survey and trend analysis report on portable pressure monitors for wards

2022-2028 global genome editing mutation detection kit industry survey and trend analysis report
![[summary of interview questions] zj6 redis](/img/4b/eadf66ca8d834f049f3546d348fa32.jpg)
[summary of interview questions] zj6 redis

The cost of on-site development of software talent outsourcing is higher than that of software project outsourcing. Why
随机推荐
Grpc: implement service end flow restriction
[summary of interview questions] zj5
What does operation and maintenance audit fortress mean? How to select the operation and maintenance audit fortress machine?
[51nod] 2102 or minus and
2022-2028 Global Industry Survey and trend analysis report on portable pressure monitors for wards
Permission maintenance topic: domain controller permission maintenance
Go language core 36 lecture (go language advanced technology 8) -- learning notes
What is the meaning of scdo? Is it comparable to bGH
2022-2028 global aircraft wireless intercom system industry research and trend analysis report
2022-2028 global tungsten copper alloy industry research and trend analysis report
What are the security guarantees for cloud desktop servers? What are the cloud desktop server platforms?
[51nod] 3047 displacement operation
golang with script
The principle of Fortress application publisher
[51nod] 3216 Awards
Cp/rm/mv parameters
What is cloud desktop and how to connect to the server? What does the mainstream architecture of cloud desktop include?
New Google brain research: how does reinforcement learning learn to observe with sound?
LeetCode 599. Minimum index sum of two lists
Grpc: how do I start multiple ports?