1. Introduction



This manual provides detailed information about the human-machine verification methods supported in the current system, including Alibaba Cloud Computing V1, GeeTest, Cloudflare, Alibaba Cloud Computing V2, etc. It also explains the configuration steps and related parameters for each verification method, aiming to assist users in successfully completing the human-machine verification configuration.

Alibaba Cloud Computing V1 GeeTest:


Corresponds to GeeTest:


Cloudflare:

Corresponds to Alibaba Cloud Computing V2 GeeTest:


2. Configuration Details

2.1 Modifying the GeeTest Configuration Type


  1. Backend Operation Path: Operate in the backend and access the "Common Management - Common Configuration - KEY" page.
  2. APP Side Configuration
  1. PC&H5 Configuration

2.2 Cloudflare Parameter Configuration


  1. Backend Search Configuration Item: Search for sys_conf_cloudflare_config in the "Common Management - Common Configuration" section of the backend.
  2. Example of Configuration Parameter Format:

json

{
  "site_key":"0x4AAAAAAA0_V9KQcJfaXU - T",
  "secret_key":"0x4AAAAAAA0_V - xWigtofWv1Pb1NoCvBmdo"
}
  1. Application and Component Addition Steps: Go to https://dash.cloudflare.com/ca19ef0dba64f0b4676d6a402fa09e4e/turnstile/add to apply and add components.


3. Precautions


  1. Before performing the configuration operation, ensure that you have a sufficient understanding of the current system and the relevant knowledge of the human-machine verification tool to avoid system failures or security issues caused by incorrect operations.
  2. When selecting configuration values for the APP side and PC&H5 side, be careful to set them according to actual requirements and system compatibility, especially for configuration items with version requirements, to avoid affecting the normal operation of the system.
  3. During the Cloudflare parameter configuration process, strictly follow the application and component addition process, ensure the accuracy of the obtained site_key and secret_key, and properly store the relevant information to prevent information leakage.