All Products
Search
Document Center

Security Center:JoinWebLockProcessWhiteList

Last Updated:May 22, 2025

Adds processes to the process whitelist of web tamper proofing.

Debugging

You can run this interface directly in OpenAPI Explorer, saving you the trouble of calculating signatures. After running successfully, OpenAPI Explorer can automatically generate SDK code samples.

Authorization information

There is currently no authorization information disclosed in the API.

Request parameters

ParameterTypeRequiredDescriptionExample
UuidsstringNo

The UUIDs of the servers on which the processes run. Separate multiple UUIDs with commas (,).

0c1714dc-f7a3-4265-8364-7aa3fce8****,1cc45e7d-7698-4b2c-89d8-e8cba407****
ProcessPathsarrayNo

The paths of the processes.

stringNo

The path of the process.

/etc/mydata

Response parameters

ParameterTypeDescriptionExample
object
RequestIdstring

The ID of the request, which is used to locate and troubleshoot issues.

A47D621A-193E-5BDA-ADFA-A0D3133E199C

Examples

Sample success responses

JSONformat

{
  "RequestId": "A47D621A-193E-5BDA-ADFA-A0D3133E199C"
}

Error codes

HTTP status codeError codeError messageDescription
403NoPermissioncaller has no permissionYou are not authorized to do this operation.
500ServerErrorServerError-

For a list of error codes, visit the Service error codes.