Skip to content

WAF for SaaS

Web Application Firewall (WAF) allows you to create additional security measures through Cloudflare. As a SaaS provider, you can link custom rules, rate limiting rules, and managed rules to your custom hostnames. This provides more control to keep your domains safe from malicious traffic.

As a SaaS provider, you may want to apply different security measures to different custom hostnames. With WAF for SaaS, you can create multiple WAF configuration that you can apply to different sets of custom hostnames. This added flexibility and security leads to optimal protection across the domains of your end customers.


Prerequisites

Before you can use WAF for SaaS, you need to create a custom hostname. Review Get started with Cloudflare for SaaS if you have not already done so.

You can also create a custom hostname through the API:

Terminal window
curl "https://api.cloudflare.com/client/v4/zones/{zone_id}/custom_hostnames" \
--header "X-Auth-Email: <EMAIL>" \
--header "X-Auth-Key: <API_KEY>" \
--header "Content-Type: application/json" \
--data '{"Hostname":"example.com"}, "Ssl":{wildcard:false}}'

1. Associate custom metadata to a custom hostname

To apply WAF to your custom hostname, you need to create an association between your customer’s domain and the WAF configuration that you would like to attach to it. Cloudflare’s product, custom metadata allows you to do this via the API.

  1. Locate your zone ID, available in the Cloudflare dashboard.

  2. Locate your Authentication Key by selecting My Profile > API tokens > Global API Key.

  3. Locate your custom hostname ID by making a GET call in the API:

Terminal window
curl "https://api.cloudflare.com/client/v4/zones/{zone_id}/custom_hostnames" \
--header "X-Auth-Email: <EMAIL>" \
--header "X-Auth-Key: <API_KEY>"
  1. Plan your custom metadata. It is fully customizable. In the example below, we have chosen the tag "security_level" to which we expect to assign three values (low, medium, and high).
  1. Make an API call in the format below using your Cloudflare email and the IDs gathered above:
Terminal window
curl --request PATCH \
"https://api.cloudflare.com/client/v4/zones/{zone_id}/custom_hostnames/{custom_hostname_id}" \
--header "X-Auth-Email: <EMAIL>"
--header "X-Auth-Key: <API_KEY>" \
--header "Content-Type: application/json" \
--data '{
"custom_metadata": {
"customer_id": "12345",
"security_level": "low"
}
}'

This assigns custom metadata to your custom hostname so that it has a security tag associated with its ID.

2. Trigger security products based on tags

  1. Locate the custom metadata field in the Ruleset Engine where the WAF runs. This can be used to trigger different configurations of products such as WAF custom rules, rate limiting rules, and Transform Rules.

  2. Build your rules either through the dashboard or via the API. An example rate limiting rule, corresponding to "security_level" low, is shown below as an API call.

Terminal window
curl --request PUT \
"https://api.cloudflare.com/client/v4/zones/{zone_id}/rulesets/phases/http_ratelimit/entrypoint" \
--header "Authorization: Bearer <API_TOKEN>" \
--header "Content-Type: application/json" \
--data '{
"rules": [
{
"action": "block",
"ratelimit": {
"characteristics": [
"cf.colo.id",
"ip.src"
],
"period": 10,
"requests_per_period": 2,
"mitigation_timeout": 60
},
"expression": "lookup_json_string(cf.hostname.metadata, \"security_level\") eq \"low\" and http.request.uri contains \"login\""
}
]
}'

To build rules through the dashboard:

  1. Log in to the Cloudflare dashboard and navigate to your account and website.

  2. Select Security > WAF.

  3. Follow the instructions on the dashboard specific to custom rules, rate limiting rules, or managed rules, depending on your security goal.

  4. Once the rule is active, you should see it under the applicable tab (custom rules, rate limiting, or managed rules).

Rule Active