SlideShare a Scribd company logo
1 of 8
MULE OAUTH 2 PROVIDER
MODULE
BY – ANKUSH SHARMA
WHAT IS OAUTH?
• OAuth (Open Authorization) is an open standard for token-
based authentication and authorization on the Internet. OAuth,
which is pronounced "oh-auth," allows an end user's account
information to be used by third-party services, such as
Facebook, without exposing the user's password.
MULE OAUTH 2 PROVIDER
• The OAuth 2.0 provider enables you to configure two security
providers: resourceOwnerSecurityProvider and
clientSecurityProvider.
• resourceOwnerSecurityProvider authenticates resource owners
(eg: when the user credentials are validated after the login
page). The only situation where this provider is not required, is
when the Grant Type is Client Credentials.
• clientSecurityProvider validates client credentials, it’s only
needed when a client is confidential AND has a client secret.
Whenever the client credentials are sent on the authorization
MULE OAUTH PROVIDER 2 –
CONFIGURATION WIZARD (GENERAL TAB)
(CONT.)
MULE OAUTH PROVIDER 2 –
CONFIGURATION WIZARD (GENERAL TAB)
(CONT.)
• Following are the options on general tab –
• Display Name – The name of the Oauth provider component to be displayed
in Mule flow.
• Config Reference – Reference to the global Oauth configuration.
• Operation – What operation to be performed on server.
• Client ID – Client ID provided to client by service provider.
• Client Name – name of the client with which registration is done on service
provider’s service channel.
• Description – Description about the client.
MULE OAUTH PROVIDER 2 –
CONFIGURATION WIZARD (GENERAL TAB)
• Following are the options on general tab –
• Principle – An optional principle used when client ID can’t be used with
request.
• Secret – Client secret provided by service provider.
• Type – Type of client, either PUBLIC or CONFIDENTIAL.
• Authorized Grant Type – Select the grant type authorized by service
provider.
• Redirect URIs – One or more URIs on which service provider will redirect.
• Scopes – Used to define the scope of request.
MULE OAUTH 2 PROVIDER –
CONFIGURATION WIZARD (NOTES AND
META-DATA TABS)
• Notes Tab – This tab is used to add special notes to Mule Oauth
provider component.
• META-DATA Tab – This tab is used to add META-DATA to Mule
Oauth provider component.
THANK YOU!

More Related Content

What's hot

Introduction to mule esb's
Introduction to mule esb's Introduction to mule esb's
Introduction to mule esb's
F K
 

What's hot (18)

Mule real-world-old
Mule real-world-oldMule real-world-old
Mule real-world-old
 
Custom connector development using mule DevKit
Custom connector development using mule DevKitCustom connector development using mule DevKit
Custom connector development using mule DevKit
 
Core concepts - mule
Core concepts - muleCore concepts - mule
Core concepts - mule
 
Making flow Mule
Making flow MuleMaking flow Mule
Making flow Mule
 
Service oriented online architecture using mule
Service oriented online architecture using muleService oriented online architecture using mule
Service oriented online architecture using mule
 
Using mule with web services
Using mule with web servicesUsing mule with web services
Using mule with web services
 
Anypoint connector dev kit
Anypoint connector dev kitAnypoint connector dev kit
Anypoint connector dev kit
 
Mule overview
Mule overviewMule overview
Mule overview
 
Mule soa
Mule soaMule soa
Mule soa
 
Introduction to mule esb's
Introduction to mule esb's Introduction to mule esb's
Introduction to mule esb's
 
Mule Microsoft Share Point 2010 Connector
Mule Microsoft Share Point 2010 ConnectorMule Microsoft Share Point 2010 Connector
Mule Microsoft Share Point 2010 Connector
 
Mule webservices in detail
Mule webservices in detailMule webservices in detail
Mule webservices in detail
 
Mule Concur Connector
Mule Concur ConnectorMule Concur Connector
Mule Concur Connector
 
Mule security
Mule  securityMule  security
Mule security
 
Mule concepts components
Mule concepts componentsMule concepts components
Mule concepts components
 
Webservice vm in mule
Webservice vm in muleWebservice vm in mule
Webservice vm in mule
 
Mule overview
Mule overviewMule overview
Mule overview
 
Mule esb beginner’s guide
Mule esb beginner’s guideMule esb beginner’s guide
Mule esb beginner’s guide
 

Similar to Mule OAuth 2 Provider module

Oauth2 and OWSM OAuth2 support
Oauth2 and OWSM OAuth2 supportOauth2 and OWSM OAuth2 support
Oauth2 and OWSM OAuth2 support
Gaurav Sharma
 
GSoC Mideterm-OAuth2 Module
GSoC Mideterm-OAuth2 ModuleGSoC Mideterm-OAuth2 Module
GSoC Mideterm-OAuth2 Module
Mayank Sharma
 
Introduction to OAuth
Introduction to OAuthIntroduction to OAuth
Introduction to OAuth
Wei-Tsung Su
 
A New Security Model For Distributed System
A New Security Model For Distributed SystemA New Security Model For Distributed System
A New Security Model For Distributed System
Sanoj Kumar
 

Similar to Mule OAuth 2 Provider module (20)

Oauth2 and OWSM OAuth2 support
Oauth2 and OWSM OAuth2 supportOauth2 and OWSM OAuth2 support
Oauth2 and OWSM OAuth2 support
 
GSoC Mideterm-OAuth2 Module
GSoC Mideterm-OAuth2 ModuleGSoC Mideterm-OAuth2 Module
GSoC Mideterm-OAuth2 Module
 
OAuth 2.0 - The fundamentals, the good , the bad, technical primer and commo...
OAuth 2.0  - The fundamentals, the good , the bad, technical primer and commo...OAuth 2.0  - The fundamentals, the good , the bad, technical primer and commo...
OAuth 2.0 - The fundamentals, the good , the bad, technical primer and commo...
 
OAuth
OAuthOAuth
OAuth
 
SAML VS OAuth 2.0 VS OpenID Connect
SAML VS OAuth 2.0 VS OpenID ConnectSAML VS OAuth 2.0 VS OpenID Connect
SAML VS OAuth 2.0 VS OpenID Connect
 
Microservice with OAuth2
Microservice with OAuth2Microservice with OAuth2
Microservice with OAuth2
 
Introduction to OAuth
Introduction to OAuthIntroduction to OAuth
Introduction to OAuth
 
ConFoo 2015 - Securing RESTful resources with OAuth2
ConFoo 2015 - Securing RESTful resources with OAuth2ConFoo 2015 - Securing RESTful resources with OAuth2
ConFoo 2015 - Securing RESTful resources with OAuth2
 
Protecting your APIs with OAuth 2.0
Protecting your APIs with OAuth 2.0Protecting your APIs with OAuth 2.0
Protecting your APIs with OAuth 2.0
 
Spring Security
Spring SecuritySpring Security
Spring Security
 
2018 Oct IIW User Managed Access (UMA)
2018 Oct IIW User Managed Access (UMA)2018 Oct IIW User Managed Access (UMA)
2018 Oct IIW User Managed Access (UMA)
 
Full stack security
Full stack securityFull stack security
Full stack security
 
Introduction to OAuth2.0
Introduction to OAuth2.0Introduction to OAuth2.0
Introduction to OAuth2.0
 
Demystifying OAuth 2.0
Demystifying OAuth 2.0Demystifying OAuth 2.0
Demystifying OAuth 2.0
 
SFScon 2020 - Alex Lanz Martin Malfertheiner - OAuth2 OpenID
 SFScon 2020 - Alex Lanz Martin Malfertheiner - OAuth2 OpenID SFScon 2020 - Alex Lanz Martin Malfertheiner - OAuth2 OpenID
SFScon 2020 - Alex Lanz Martin Malfertheiner - OAuth2 OpenID
 
MuleSoft_Meetup__Official__updated_Sep_2020_ (1) (1).pptx
MuleSoft_Meetup__Official__updated_Sep_2020_ (1) (1).pptxMuleSoft_Meetup__Official__updated_Sep_2020_ (1) (1).pptx
MuleSoft_Meetup__Official__updated_Sep_2020_ (1) (1).pptx
 
Cloud Identity Management
Cloud Identity ManagementCloud Identity Management
Cloud Identity Management
 
Oauth 2.0 security
Oauth 2.0 securityOauth 2.0 security
Oauth 2.0 security
 
API Security with OAuth2.0.
API Security with OAuth2.0.API Security with OAuth2.0.
API Security with OAuth2.0.
 
A New Security Model For Distributed System
A New Security Model For Distributed SystemA New Security Model For Distributed System
A New Security Model For Distributed System
 

More from Ankush Sharma

More from Ankush Sharma (20)

Mule Microsoft Share Point 2013 Connector
Mule Microsoft Share Point 2013 ConnectorMule Microsoft Share Point 2013 Connector
Mule Microsoft Share Point 2013 Connector
 
Mule Microsoft Service Bus
Mule Microsoft Service BusMule Microsoft Service Bus
Mule Microsoft Service Bus
 
Microsoft Dynamics CRM Connector
Microsoft Dynamics CRM ConnectorMicrosoft Dynamics CRM Connector
Microsoft Dynamics CRM Connector
 
Mule Microsoft Dynamics AX 2012 Connector
Mule Microsoft Dynamics AX 2012 ConnectorMule Microsoft Dynamics AX 2012 Connector
Mule Microsoft Dynamics AX 2012 Connector
 
Mule Marketo Connector
Mule Marketo ConnectorMule Marketo Connector
Mule Marketo Connector
 
Mule LDAP Connector
Mule LDAP ConnectorMule LDAP Connector
Mule LDAP Connector
 
Mule HDFS Connector
Mule HDFS ConnectorMule HDFS Connector
Mule HDFS Connector
 
Mule Cloudhub Connector
Mule Cloudhub ConnectorMule Cloudhub Connector
Mule Cloudhub Connector
 
Mule AMQP Connector
Mule AMQP ConnectorMule AMQP Connector
Mule AMQP Connector
 
Mule Amazon SNS Connector
Mule Amazon SNS ConnectorMule Amazon SNS Connector
Mule Amazon SNS Connector
 
Mule Collection Aggregator
Mule Collection AggregatorMule Collection Aggregator
Mule Collection Aggregator
 
Mule Collection Splitter
Mule Collection SplitterMule Collection Splitter
Mule Collection Splitter
 
Mule Custom Aggregator
Mule Custom AggregatorMule Custom Aggregator
Mule Custom Aggregator
 
Mule Message Chunk Aggregator
Mule Message Chunk AggregatorMule Message Chunk Aggregator
Mule Message Chunk Aggregator
 
Mule Message Chunk Splitter
Mule Message Chunk SplitterMule Message Chunk Splitter
Mule Message Chunk Splitter
 
Mule Expression Transformer
Mule Expression TransformerMule Expression Transformer
Mule Expression Transformer
 
Mule Schema Validation Filter
Mule Schema Validation FilterMule Schema Validation Filter
Mule Schema Validation Filter
 
Mule Resequencer Filter
Mule Resequencer FilterMule Resequencer Filter
Mule Resequencer Filter
 
Mule object to-xml transformer
Mule object to-xml transformerMule object to-xml transformer
Mule object to-xml transformer
 
Mule xml to-jaxb object
Mule xml to-jaxb objectMule xml to-jaxb object
Mule xml to-jaxb object
 

Recently uploaded

Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
Joaquim Jorge
 

Recently uploaded (20)

A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
GenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdfGenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdf
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century education
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
Tech Trends Report 2024 Future Today Institute.pdf
Tech Trends Report 2024 Future Today Institute.pdfTech Trends Report 2024 Future Today Institute.pdf
Tech Trends Report 2024 Future Today Institute.pdf
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
 

Mule OAuth 2 Provider module

  • 1. MULE OAUTH 2 PROVIDER MODULE BY – ANKUSH SHARMA
  • 2. WHAT IS OAUTH? • OAuth (Open Authorization) is an open standard for token- based authentication and authorization on the Internet. OAuth, which is pronounced "oh-auth," allows an end user's account information to be used by third-party services, such as Facebook, without exposing the user's password.
  • 3. MULE OAUTH 2 PROVIDER • The OAuth 2.0 provider enables you to configure two security providers: resourceOwnerSecurityProvider and clientSecurityProvider. • resourceOwnerSecurityProvider authenticates resource owners (eg: when the user credentials are validated after the login page). The only situation where this provider is not required, is when the Grant Type is Client Credentials. • clientSecurityProvider validates client credentials, it’s only needed when a client is confidential AND has a client secret. Whenever the client credentials are sent on the authorization
  • 4. MULE OAUTH PROVIDER 2 – CONFIGURATION WIZARD (GENERAL TAB) (CONT.)
  • 5. MULE OAUTH PROVIDER 2 – CONFIGURATION WIZARD (GENERAL TAB) (CONT.) • Following are the options on general tab – • Display Name – The name of the Oauth provider component to be displayed in Mule flow. • Config Reference – Reference to the global Oauth configuration. • Operation – What operation to be performed on server. • Client ID – Client ID provided to client by service provider. • Client Name – name of the client with which registration is done on service provider’s service channel. • Description – Description about the client.
  • 6. MULE OAUTH PROVIDER 2 – CONFIGURATION WIZARD (GENERAL TAB) • Following are the options on general tab – • Principle – An optional principle used when client ID can’t be used with request. • Secret – Client secret provided by service provider. • Type – Type of client, either PUBLIC or CONFIDENTIAL. • Authorized Grant Type – Select the grant type authorized by service provider. • Redirect URIs – One or more URIs on which service provider will redirect. • Scopes – Used to define the scope of request.
  • 7. MULE OAUTH 2 PROVIDER – CONFIGURATION WIZARD (NOTES AND META-DATA TABS) • Notes Tab – This tab is used to add special notes to Mule Oauth provider component. • META-DATA Tab – This tab is used to add META-DATA to Mule Oauth provider component.