• Like

Protect against threats with bullet-proof integration | MuleSoft

  • 1,239 views
Uploaded on

To watch the webinar, please visit: http://www.mulesoft.com/webinars/protect-threats-bullet-proof-integration …

To watch the webinar, please visit: http://www.mulesoft.com/webinars/protect-threats-bullet-proof-integration

Enterprise integrations running across trust boundaries demand robust security solutions. Mule Enterprise Security enables end-to-end protection of your integration ecosystem. Join Reza Shafii, Director of Product Management at MuleSoft, to better understand how our enterprise-grade security solution can help you:

Block unauthorized access to your systems
Eliminate exposure of sensitive data and information
Prevent attacks through proactive threat management

Presenter:
Reza Shafii, Director of Product Management, MuleSoft Inc.

More in: Technology
  • Full Name Full Name Comment goes here.
    Are you sure you want to
    Your message goes here
    Be the first to comment
    Be the first to like this
No Downloads

Views

Total Views
1,239
On Slideshare
0
From Embeds
0
Number of Embeds
0

Actions

Shares
Downloads
57
Comments
0
Likes
0

Embeds 0

No embeds

Report content

Flagged as inappropriate Flag as inappropriate
Flag as inappropriate

Select your reason for flagging this presentation as inappropriate.

Cancel
    No notes for slide
  • Slide 2: Housekeeping items Just a couple of housekeeping items before we get started: This session is being recorded and will be available immediately following the webinarYou can download the slides right now from the “attachments” tabIf you have content or technical questions, please feel free to ask them at any time by typing them into and sending them via the question button above the slides. We will answer questions at the end of the session but please feel free to send over questions as they arise. If we don’t get to your question or if you have any detailed use-case specific questions, you can submit them to our team of experts at tinyurl.com/askmulesoft 
  • Go over the MES benefitsThen mention the fact that these benefits span solution areas
  • Safe Access as per OAuth:- Allows you to protect any HTTP based interface for access – usually used for REST APIsTemporary and restricted access – Access is controlled through OAuth tokens which can have an expiry date and limited scope to allow for RBACOften consumed and used by Mobile apps
  • Key for decrypting the properties is provided as a system property: <secure-property-placeholder:config key="${runtime.property}" location="test.qa.properties"/>./mule -D-Mruntime.propery=mySecretKey
  • Useful for security gateway scenarios
  • Go over the MES benefitsThen mention the fact that these benefits span solution areas
  • Slide 2: Housekeeping items Just a couple of housekeeping items before we get started: This session is being recorded and will be available immediately following the webinarYou can download the slides right now from the “attachments” tabIf you have content or technical questions, please feel free to ask them at any time by typing them into and sending them via the question button above the slides. We will answer questions at the end of the session but please feel free to send over questions as they arise. If we don’t get to your question or if you have any detailed use-case specific questions, you can submit them to our team of experts at tinyurl.com/askmulesoft 

Transcript

  • 1. Mule Enterprise SecurityPresenter:Reza Shafii, Director of Product ManagementMuleSoft, @mulesoft, @cloudhub
  • 2. Agenda Introducing Mule Enterprise Security Drill-down into – Mule STS OAuth 2.0 Provider – Mule Credential Vault – Mule Security Filter Processors Brief Overview of other New Mule Enterprise Security Features Wrap-up and Q&AAll contents Copyright © 2011, MuleSoft Inc. 3
  • 3. Mule Enterprise Security - Benefits 1 - Protect access to your Mule application end-points and the services they access SOA Mobile 2 - Maintain the confidentiality of data used and emitted by your mule flows APIs 3 - Guard your Mule interfaces against SaaS security attacks IntegrationAll contents Copyright © 2011, MuleSoft Inc. 4
  • 4. Mule Enterprise SecurityAll contents Copyright © 2011, MuleSoft Inc. 5
  • 5. Mule STS OAuth 2.0 Provider - Why Protect your APIs Application End-Users with OAuth Applications (OAuth Clients) Enables credentials Mobile Apps Web Apps Mule Cloud Connector Apps to only be shared with a single, OAuth Protected central entity APIs Exposed by Mule Application (OAuth Service Provider)All contents Copyright © 2011, MuleSoft Inc. 6
  • 6. Mule STS OAuth 2.0 Provider - What Mule can act as an OAuth 2.0 provider OAuth element protects flow Supports for all OAuth 2.0 grant types Supported end-points – HTTP/S, Jetty, Servlet, Web ServicesAll contents Copyright © 2011, MuleSoft Inc. 7
  • 7. Mule Credential Vault - Why Access external end-points without exposing their access credentials – Store credentials in encrypted formatAll contents Copyright © 2011, MuleSoft Inc. 8
  • 8. Mule Credential Vault - What Encrypt content of Mule application property files Mule Studio provides property value encryption tool Values decrypted upon access from Mule FlowsAll contents Copyright © 2011, MuleSoft Inc. 9
  • 9. Mule Security Filter Processors - Why Whitelist a specific set or range of IP addresses Enable expiry policy using message time-stampAll contents Copyright © 2011, MuleSoft Inc. 10
  • 10. Mule Security Filter Processors - What Use Mule security filter processors to – Set filtering needs and parameters Support for – IP filtering (single, range, and CIDR) – Message expiry filteringAll contents Copyright © 2011, MuleSoft Inc. 11
  • 11. Mule Enterprise Security – Features Overview Feature Description Mule Secure Token Enables a Mule server to act as an OAuth Service (STS) – 2.0 authentication provider to protect OAuth 2.0 Provider specific mule flows. Mule Credential Vault Encrypt sensitive values (e.g. passwords) in your Mule message flows. Mule Security Filter Allow filtering of messages based on Processors security criteria: IP based and expiry based. Mule Digital Signature Simplifies the signing and verification of Processors XML Signatures within Mule flows. Mule Message Easily encrypt and decrypt sensitive data Encryption Processors in Mule messages.All contents Copyright © 2011, MuleSoft Inc. 12
  • 12. Mule Enterprise Security 1 - Protect access to your Mule application end-points and the services they access SOA Mobile 2 - Maintain the confidentiality of data used and emitted by your mule flows APIs 3 – Guard your Mule interfaces against SaaS security attacks IntegrationAll contents Copyright © 2011, MuleSoft Inc. 13
  • 13. Q&AAll contents Copyright © 2011, MuleSoft Inc. 15