Skip to content
Cloudflare Docs

Web assets

Discover web assets such as your API endpoints and instruct Cloudflare how to best protect them.

Endpoints

Use the Endpoints tab to manage endpoints available on your domain and monitor their health.

You can save endpoints directly from API Discovery, manually by method, path, and host, or via Schema Validation.

This will add the specified endpoints to your list of managed endpoints. You can view your list of managed endpoints in the Endpoints tab.

For saved endpoints:

For more information on how to manage your endpoints, refer to the following resources.

Discovery

Discovery continuously finds your active API endpoints via path normalization.

Add endpoints to produce recommendations and analytics of your APIs. Your session identifiers must match your API traffic. Otherwise, API endpoints are also discoverable via Machine Learning.

Sequences

Use Sequences to discover how users interact with your API, by tracking the order of API session requests over time. Sequences will group and highlight popular user journeys across your API.

Once you configure session identifiers, the Sequences tab will start grouping and highlighting important user journeys (sequences) across your API.

To configure session identifiers, go to Security > Settings > All settings tab and select Edit next to Session identifiers.

For more information on how Cloudflare identifies API sequences and how you can configure API sequence rules, refer to the following resources:

Schema validation

Use Schema validation to check if your incoming traffic complies with a previously supplied API Schema.

API Schemas are defined by the validity of the API request's properties such as target endpoint, path or query variable format, and HTTP method. A rule is created for incoming traffic and defines which traffic is allowed and which traffic is logged or blocked based on the API schema that you provide or select from the list of learned schemas.

You can add schema validation by:

Client-side resources

Use Client-side resources to monitor scripts, connections, and cookies on your domain.

If you notice unexpected scripts or connections on the dashboard, check them for signs of malicious activity. You should also check for any new or unexpected cookies.

Enterprise customers with a paid add-on will have their connections and scripts classified as potentially malicious based on threat feeds.