kevin strong-holte

All content in this article is for demonstrative purposes only. Any resemblance to existing companies, products, or features is coincidental and does not imply ownership or association.

Product Security Feature Alpha

Product Security Feature Alpha (PSFA) allows you to manage traffic to your services with configurable rules. It helps you protect your tenant and conserve your rate limits against potential threats, such as denial-of-service (DoS) attacks, and ensures that only legitimate users access your applications.

How it works

When your tenant receives a request, PSFA processes that request and then determines how to respond based on the rules you have configured.

For example, if you are adopting the Model Context Protocol (MCP) in your tenant, you could use the dcr scope to avoid risks like unauthorized application registration or phishing attempts using misleading application names. To learn more, read References.

Rules

Rules are the building blocks of the PSFA feature. A rule is composed of the following elements:

Importance of priority

It’s important to determine the correct priority of your rules, because there is strict execution logic you must follow:

Careful assignment of priorities allows you to create granular access control policies tailored specific to your needs.

Monitoring mode

When a rule is in monitoring mode, PSFA evaluates that rule as it normally would and emits a tenant log event, but does not execute the rule’s action and does not terminate evaluation of subsequent rules and lists.

Monitoring mode is the best way to test how your PSFA rule would affect incoming traffic without interfering with your current PSFA configuration. You can toggle monitoring mode for a rule by updating the action object. To learn more, read Configure Rules.

Logging

A log event (psfa_summary) is created every 2 minutes for each PSFA rule with details of how that rule is affecting traffic.

psfa_summary object optional
psfa_id string optional

Internal identifier of the rule.

Example: psfa_dkFJiujerKKjo09JK

description string optional

Description of the rule.

Example: Allow traffic that originates from the United States.

priority number optional

Order in which the rule executes.

Example: 1

action object optional

Action that the rule executes.

Example: { "allow": true }

match object optional
success number optional

Total number of requests that the rule successfully matched.

Example: 1

total_request_count object optional
successes number optional

Total number of requests that the rule successfully evaluated.

Example: 3

start_time string optional

Datetime stamp of when the log counting period started.

Example: 2025-03-19T16:11:07.429Z

end_time string optional

Datetime stamp of when the log counting period ended.

Example: 2025-03-19T16:21:07.429Z

Restrictions and limitations