General Information
Policy Type
Endpoints
List Policies
Add Policy
Update Policy
Delete Policy
List Policies
Endpoint
Request
Headers
| Header | Value |
|---|---|
| Authorization | Bearer {token} |
Path Parameters
| Parameter | Type | Required | Description |
|---|---|---|---|
| projectName | string | Yes | Project name |
| apiProxyName | string | Yes | API Proxy name |
Response
Success Response (200 OK)
cURL Example
Add Policy
Endpoint
Request
Headers
| Header | Value |
|---|---|
| Authorization | Bearer {token} |
| Content-Type | application/json |
Path Parameters
| Parameter | Type | Required | Description |
|---|---|---|---|
| projectName | string | Yes | Project name |
| apiProxyName | string | Yes | API Proxy name |
| policyName | string | Yes | Policy name |
Request Body
Full JSON Body Example - Standard Validation
Full JSON Body Example - Enhanced Validation
Full JSON Body Example - Remove Signature After Validation
Full JSON Body Example - Case Insensitive ID Matching
Request Body Fields
operationMetadata
| Field | Type | Required | Default | Description |
|---|---|---|---|---|
| targetScope | string | Yes | - | Policy scope: ALL or ENDPOINT |
| targetEndpoint | string | No* | - | Endpoint path (required if targetScope=ENDPOINT) |
| targetEndpointHTTPMethod | string | No* | - | HTTP method (required if targetScope=ENDPOINT) |
| targetPipeline | string | Yes | - | Pipeline: REQUEST, RESPONSE, or ERROR |
| deploy | boolean | No | true | Whether to deploy after adding policy |
| deployTargetEnvironmentNameList | array | No | [] | List of environment names to deploy to |
| order | integer | No | null | Policy execution order (starts from 1) |
ALL- Policy applies to all endpointsENDPOINT- Policy applies only to specified endpoint
REQUEST- Executes in request pipeline (verifies incoming request signatures)RESPONSE- Executes in response pipeline (verifies backend response signatures)ERROR- Executes in error pipeline
GET,POST,PUT,DELETE,PATCH,OPTIONS,HEAD
policy
| Field | Type | Required | Default | Description |
|---|---|---|---|---|
| type | string | Yes | - | Policy type: policy-ws-security-sign-validation |
| description | string | No | - | Policy description |
| active | boolean | No | true | Whether policy is active |
| enableEnhancedSignatureValidation | boolean | No | false | Enable enhanced signature validation |
| enableSignatureRemovalForDereferencing | boolean | No | false | Enable signature removal for dereferencing |
| allowCaseInsensitiveId | boolean | No | false | Allow case insensitive ID attribute matching (for cross-platform compatibility) |
| verKeyStoreName | string | Yes | - | Verification keystore name |
| removeSignature | boolean | No | false | Remove signature after validation |
Note
verKeyStoreNameis required.
Response
Success Response (200 OK)
cURL Example
Update Policy
Endpoint
Request
Headers
| Header | Value |
|---|---|
| Authorization | Bearer {token} |
| Content-Type | application/json |
Path Parameters
| Parameter | Type | Required | Description |
|---|---|---|---|
| projectName | string | Yes | Project name |
| apiProxyName | string | Yes | API Proxy name |
| policyName | string | Yes | Policy name |
Request Body
Note: Request body structure is the same as Add Policy. All fields should be provided for update.Response
Success Response (200 OK)
Delete Policy
Endpoint
Request
Headers
| Header | Value |
|---|---|
| Authorization | Bearer {token} |
| Content-Type | application/json |
Path Parameters
| Parameter | Type | Required | Description |
|---|---|---|---|
| projectName | string | Yes | Project name |
| apiProxyName | string | Yes | API Proxy name |
| policyName | string | Yes | Policy name |
Request Body
Full JSON Body Example
Response
Success Response (200 OK)
Notes and Warnings
-
Signature Verification:
- Verifies WS-Security signatures from backend responses
- Ensures message integrity and authenticity
- Requires verification keystore with appropriate public keys/certificates
-
Enhanced Validation:
enableEnhancedSignatureValidation: true- Enables enhanced signature validation- Provides more thorough validation checks
- May be slower but more secure
-
Signature Removal:
removeSignature: true- Removes signature after validation- Useful when signature is not needed downstream
- Signature is removed only after successful validation
-
Signature Removal for Dereferencing:
enableSignatureRemovalForDereferencing: true- Enables signature removal for dereferencing- Used in specific scenarios where signature needs to be removed during dereferencing
-
Case Insensitive ID Matching:
allowCaseInsensitiveId: true- Allows matching ID attributes regardless of case- Useful for cross-platform compatibility (e.g., .NET vs Java)
- May be necessary when backend uses different ID attribute casing
-
Key Store:
- Verification keystore must be configured in Apinizer
- Keystore must contain appropriate public keys/certificates
- Keys must match those used by the backend service for signing
- Performance: Signature verification adds cryptographic processing overhead. Use for necessary security only.
-
Pipeline:
REQUESTpipeline verifies incoming request signaturesRESPONSEpipeline verifies backend response signatures (most common)
-
Error Handling:
- Signature verification failure causes policy to fail
- Invalid keystore or missing keys causes policy to fail
- Invalid signature causes request/response to be rejected
-
Deployment: Policy changes require deployment to take effect. Set
deploy: trueor deploy manually.
Related Documentation
- List Policies - List all policies
- Add Policy - General policy addition guide
- Update Policy - General policy update guide
- Delete Policy - General policy deletion guide
- WS Security Sign Policy - Sign WS-Security content

