Alter Pull #3176 - CSRF Whitelist
diff --git a/user_guide_src/source/libraries/security.rst b/user_guide_src/source/libraries/security.rst
index 5669243..19480b4 100644
--- a/user_guide_src/source/libraries/security.rst
+++ b/user_guide_src/source/libraries/security.rst
@@ -97,10 +97,9 @@
 
 	$config['csrf_exclude_uris'] = array('api/person/add');
 
-Optionally, you can use regular expressions as well as the ':any' and ':num'
-wildcards in the URIs::
+Optionally, you can use regular expressions in the URIs::
 
-	$config['csrf_exclude_uris'] = array('api/record/:num','api/title/[a-zA-Z]+');
+	$config['csrf_exclude_uris'] = array('api/record/[0-9]+','api/title/[a-zA-Z]+');
 	
 
 ***************
@@ -162,4 +161,4 @@
 		This method acts a lot like PHP's own native ``html_entity_decode()`` function in ENT_COMPAT mode, only
 		it tries to detect HTML entities that don't end in a semicolon because some browsers allow that.
 
-		If the ``$charset`` parameter is left empty, then your configured ``$config['charset']`` value will be used.
\ No newline at end of file
+		If the ``$charset`` parameter is left empty, then your configured ``$config['charset']`` value will be used.