SlideShare a Scribd company logo
1 of 11
Agenda
Introducing Mule Enterprise Security
Drill-down into
– Mule STS OAuth 2.0 Provider
– Mule Credential Vault
– Mule Security Filter Processors
Brief Overview of other New Mule Enterprise Security Features
Wrap-up and Q&A
All contents Copyright © 2011, MuleSoft Inc. 2
Mule Enterprise Security - Benefits
All contents Copyright © 2011, MuleSoft Inc. 3
1 - Protect access to your Mule application
end-points and the services they access
2 - Maintain the confidentiality of data
used and emitted by your mule flows
3 - Guard your Mule interfaces against
security attacks
SOA
Mobile
APIs
SaaS
Integration
Mule Enterprise Security
All contents Copyright © 2011, MuleSoft Inc. 4
Mule STS OAuth 2.0 Provider - Why
Protect your APIs
with OAuth
Enables credentials
to only be shared
with a single,
central entity
All contents Copyright © 2011, MuleSoft Inc. 5
Applications (OAuth Clients)
APIs Exposed by Mule Application
(OAuth Service Provider)
Application
End-Users
Mobile Apps Web Apps Mule Cloud Connector
Apps
OAuth
Protected
Mule STS OAuth 2.0 Provider - What
Mule can act as an
OAuth 2.0 provider
OAuth element
protects flow
Supports for all OAuth
2.0 grant types
Supported end-points
– HTTP/S, Jetty, Servlet,
Web Services
All contents Copyright © 2011, MuleSoft Inc. 6
Mule Credential Vault - Why
Access external
end-points without
exposing their
access credentials
– Store credentials in
encrypted format
All contents Copyright © 2011, MuleSoft Inc. 7
Mule Credential Vault - What
Encrypt content of
Mule application
property files
Mule Studio provides
property value
encryption tool
Values decrypted
upon access from
Mule Flows
All contents Copyright © 2011, MuleSoft Inc. 8
Mule Security Filter Processors - Why
Whitelist a specific
set or range of IP
addresses
Enable expiry policy
using message
time-stamp
All contents Copyright © 2011, MuleSoft Inc. 9
Mule Security Filter Processors - What
Use Mule security
filter processors to
– Set filtering needs
and parameters
Support for
– IP filtering (single,
range, and CIDR)
– Message expiry
filtering
All contents Copyright © 2011, MuleSoft Inc. 10
Mule Enterprise Security – Features Overview
All contents Copyright © 2011, MuleSoft Inc. 11
Feature Description
Mule Secure Token
Service (STS) –
OAuth 2.0 Provider
Enables a Mule server to act as an OAuth
2.0 authentication provider to protect
specific mule flows.
Mule Credential Vault Encrypt sensitive values (e.g. passwords)
in your Mule message flows.
Mule Security Filter
Processors
Allow filtering of messages based on
security criteria: IP based and expiry
based.
Mule Digital Signature
Processors
Simplifies the signing and verification of
XML Signatures within Mule flows.
Mule Message
Encryption Processors
Easily encrypt and decrypt sensitive data
in Mule messages.
Mule Enterprise Security
All contents Copyright © 2011, MuleSoft Inc. 12
1 - Protect access to your Mule application
end-points and the services they access
2 - Maintain the confidentiality of data
used and emitted by your mule flows
3 – Guard your Mule interfaces against
security attacks
SOA
Mobile
APIs
SaaS
Integration

More Related Content

What's hot

Mule salesforce integration patterns
Mule salesforce integration patternsMule salesforce integration patterns
Mule salesforce integration patternsD.Rajesh Kumar
 
Mule securing
Mule   securingMule   securing
Mule securingSindhu VL
 
Mule oracle connectors
Mule  oracle connectorsMule  oracle connectors
Mule oracle connectorsD.Rajesh Kumar
 
Mule esb-connectors
Mule esb-connectorsMule esb-connectors
Mule esb-connectorshimajareddys
 
Mule anypoint data gateway
Mule  anypoint data gatewayMule  anypoint data gateway
Mule anypoint data gatewayD.Rajesh Kumar
 
Mule esb-architecture
Mule esb-architectureMule esb-architecture
Mule esb-architecturehimajareddys
 
Anypoint platform security components
Anypoint platform security componentsAnypoint platform security components
Anypoint platform security componentsD.Rajesh Kumar
 
Mule esb–api layer
Mule esb–api layerMule esb–api layer
Mule esb–api layercharan teja R
 
Flows in mule
Flows in muleFlows in mule
Flows in muleSindhu VL
 
SOAP Service in Mule Esb
SOAP Service in Mule EsbSOAP Service in Mule Esb
SOAP Service in Mule EsbAnand kalla
 
Mule ESB Tutorial Part 3
Mule ESB Tutorial Part 3Mule ESB Tutorial Part 3
Mule ESB Tutorial Part 3Srikanth N
 
.Net architecture with mule soft
.Net architecture with mule soft.Net architecture with mule soft
.Net architecture with mule softBui Kiet
 

What's hot (20)

Mule Security
Mule SecurityMule Security
Mule Security
 
Mule mule agent
Mule  mule agentMule  mule agent
Mule mule agent
 
Mule salesforce integration patterns
Mule salesforce integration patternsMule salesforce integration patterns
Mule salesforce integration patterns
 
Mule securing
Mule   securingMule   securing
Mule securing
 
Mule oracle connectors
Mule  oracle connectorsMule  oracle connectors
Mule oracle connectors
 
Mule esb-connectors
Mule esb-connectorsMule esb-connectors
Mule esb-connectors
 
Mule architecture
Mule architectureMule architecture
Mule architecture
 
Mule anypoint data gateway
Mule  anypoint data gatewayMule  anypoint data gateway
Mule anypoint data gateway
 
Mule security
Mule  securityMule  security
Mule security
 
Mule esb-architecture
Mule esb-architectureMule esb-architecture
Mule esb-architecture
 
Mule connectors
Mule  connectorsMule  connectors
Mule connectors
 
Anypoint platform security components
Anypoint platform security componentsAnypoint platform security components
Anypoint platform security components
 
Mule esb–api layer
Mule esb–api layerMule esb–api layer
Mule esb–api layer
 
Flows in mule
Flows in muleFlows in mule
Flows in mule
 
Mule cloud hub
Mule  cloud hubMule  cloud hub
Mule cloud hub
 
Mule security-jaas
Mule security-jaasMule security-jaas
Mule security-jaas
 
SOAP Service in Mule Esb
SOAP Service in Mule EsbSOAP Service in Mule Esb
SOAP Service in Mule Esb
 
Mule introduction
Mule introductionMule introduction
Mule introduction
 
Mule ESB Tutorial Part 3
Mule ESB Tutorial Part 3Mule ESB Tutorial Part 3
Mule ESB Tutorial Part 3
 
.Net architecture with mule soft
.Net architecture with mule soft.Net architecture with mule soft
.Net architecture with mule soft
 

Similar to Mule enterprise security

Mule soft Meetup #3
 Mule soft Meetup #3 Mule soft Meetup #3
Mule soft Meetup #3Gaurav Sethi
 
Flowsinmule 160517130818
Flowsinmule 160517130818Flowsinmule 160517130818
Flowsinmule 160517130818ppts123456
 
Anypoint enterprise security
Anypoint enterprise securityAnypoint enterprise security
Anypoint enterprise securityKrishna_in
 
Stockholm MuleSoft Meetup - Albin Kjellin, 15 Feb 2018
Stockholm MuleSoft Meetup - Albin Kjellin, 15 Feb 2018Stockholm MuleSoft Meetup - Albin Kjellin, 15 Feb 2018
Stockholm MuleSoft Meetup - Albin Kjellin, 15 Feb 2018Ana Chiriţescu
 
Baltimore jan2019 mule4
Baltimore jan2019 mule4Baltimore jan2019 mule4
Baltimore jan2019 mule4ManjuKumara GH
 
Anypoint platform cloud
Anypoint platform cloudAnypoint platform cloud
Anypoint platform cloudSudheer Y
 
API Security: Securing Digital Channels and Mobile Apps Against Hacks
API Security: Securing Digital Channels and Mobile Apps Against HacksAPI Security: Securing Digital Channels and Mobile Apps Against Hacks
API Security: Securing Digital Channels and Mobile Apps Against HacksAkana
 
Anypoint platform security components
Anypoint platform security componentsAnypoint platform security components
Anypoint platform security componentsD.Rajesh Kumar
 
Whats new in was liberty security and cloud readiness
Whats new in was liberty   security and cloud readinessWhats new in was liberty   security and cloud readiness
Whats new in was liberty security and cloud readinesssflynn073
 
Meet up slides_mumbai_21032020_final
Meet up slides_mumbai_21032020_finalMeet up slides_mumbai_21032020_final
Meet up slides_mumbai_21032020_finalAkshata Sawant
 
Best Practices for API Security
Best Practices for API SecurityBest Practices for API Security
Best Practices for API SecurityMuleSoft
 
Best Practices for API Security
Best Practices for API SecurityBest Practices for API Security
Best Practices for API SecurityBui Kiet
 
Security in mulesoft
Security in mulesoftSecurity in mulesoft
Security in mulesoftakshay yeluru
 
OAuth 2 Spring Boot 3 Integration Presentation
OAuth 2 Spring Boot 3 Integration PresentationOAuth 2 Spring Boot 3 Integration Presentation
OAuth 2 Spring Boot 3 Integration PresentationKnoldus Inc.
 
MuleSoft Meetup Charlotte 2019
MuleSoft Meetup Charlotte  2019MuleSoft Meetup Charlotte  2019
MuleSoft Meetup Charlotte 2019Subhash Patel
 

Similar to Mule enterprise security (20)

Mule soft Meetup #3
 Mule soft Meetup #3 Mule soft Meetup #3
Mule soft Meetup #3
 
Flowsinmule 160517130818
Flowsinmule 160517130818Flowsinmule 160517130818
Flowsinmule 160517130818
 
Anypoint enterprise security
Anypoint enterprise securityAnypoint enterprise security
Anypoint enterprise security
 
Stockholm MuleSoft Meetup - Albin Kjellin, 15 Feb 2018
Stockholm MuleSoft Meetup - Albin Kjellin, 15 Feb 2018Stockholm MuleSoft Meetup - Albin Kjellin, 15 Feb 2018
Stockholm MuleSoft Meetup - Albin Kjellin, 15 Feb 2018
 
Flows in mule
Flows in muleFlows in mule
Flows in mule
 
Baltimore jan2019 mule4
Baltimore jan2019 mule4Baltimore jan2019 mule4
Baltimore jan2019 mule4
 
Anypoint platform cloud
Anypoint platform cloudAnypoint platform cloud
Anypoint platform cloud
 
API Security: Securing Digital Channels and Mobile Apps Against Hacks
API Security: Securing Digital Channels and Mobile Apps Against HacksAPI Security: Securing Digital Channels and Mobile Apps Against Hacks
API Security: Securing Digital Channels and Mobile Apps Against Hacks
 
Anypoint platform security components
Anypoint platform security componentsAnypoint platform security components
Anypoint platform security components
 
Whats new in was liberty security and cloud readiness
Whats new in was liberty   security and cloud readinessWhats new in was liberty   security and cloud readiness
Whats new in was liberty security and cloud readiness
 
Meet up slides_mumbai_21032020_final
Meet up slides_mumbai_21032020_finalMeet up slides_mumbai_21032020_final
Meet up slides_mumbai_21032020_final
 
Best Practices for API Security
Best Practices for API SecurityBest Practices for API Security
Best Practices for API Security
 
Best Practices for API Security
Best Practices for API SecurityBest Practices for API Security
Best Practices for API Security
 
Security in mulesoft
Security in mulesoftSecurity in mulesoft
Security in mulesoft
 
Mule security
Mule  securityMule  security
Mule security
 
Mule security - pgp
Mule  security - pgpMule  security - pgp
Mule security - pgp
 
Mule security
Mule  securityMule  security
Mule security
 
Mule security
Mule  securityMule  security
Mule security
 
OAuth 2 Spring Boot 3 Integration Presentation
OAuth 2 Spring Boot 3 Integration PresentationOAuth 2 Spring Boot 3 Integration Presentation
OAuth 2 Spring Boot 3 Integration Presentation
 
MuleSoft Meetup Charlotte 2019
MuleSoft Meetup Charlotte  2019MuleSoft Meetup Charlotte  2019
MuleSoft Meetup Charlotte 2019
 

Recently uploaded

“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...Marc Dusseiller Dusjagr
 
Paris 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityParis 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityGeoBlogs
 
Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3JemimahLaneBuaron
 
PSYCHIATRIC History collection FORMAT.pptx
PSYCHIATRIC   History collection FORMAT.pptxPSYCHIATRIC   History collection FORMAT.pptx
PSYCHIATRIC History collection FORMAT.pptxPoojaSen20
 
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptx
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptxContemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptx
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptxRoyAbrique
 
Micromeritics - Fundamental and Derived Properties of Powders
Micromeritics - Fundamental and Derived Properties of PowdersMicromeritics - Fundamental and Derived Properties of Powders
Micromeritics - Fundamental and Derived Properties of PowdersChitralekhaTherkar
 
URLs and Routing in the Odoo 17 Website App
URLs and Routing in the Odoo 17 Website AppURLs and Routing in the Odoo 17 Website App
URLs and Routing in the Odoo 17 Website AppCeline George
 
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Sapana Sha
 
How to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptxHow to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptxmanuelaromero2013
 
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdfssuser54595a
 
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17Celine George
 
Mastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory InspectionMastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory InspectionSafetyChain Software
 
Introduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptxIntroduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptxpboyjonauth
 
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxPOINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxSayali Powar
 
A Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformA Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformChameera Dedduwage
 
Presiding Officer Training module 2024 lok sabha elections
Presiding Officer Training module 2024 lok sabha electionsPresiding Officer Training module 2024 lok sabha elections
Presiding Officer Training module 2024 lok sabha electionsanshu789521
 
_Math 4-Q4 Week 5.pptx Steps in Collecting Data
_Math 4-Q4 Week 5.pptx Steps in Collecting Data_Math 4-Q4 Week 5.pptx Steps in Collecting Data
_Math 4-Q4 Week 5.pptx Steps in Collecting DataJhengPantaleon
 

Recently uploaded (20)

“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
 
Paris 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityParis 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activity
 
Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3
 
PSYCHIATRIC History collection FORMAT.pptx
PSYCHIATRIC   History collection FORMAT.pptxPSYCHIATRIC   History collection FORMAT.pptx
PSYCHIATRIC History collection FORMAT.pptx
 
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptx
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptxContemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptx
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptx
 
Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝
 
Micromeritics - Fundamental and Derived Properties of Powders
Micromeritics - Fundamental and Derived Properties of PowdersMicromeritics - Fundamental and Derived Properties of Powders
Micromeritics - Fundamental and Derived Properties of Powders
 
Model Call Girl in Bikash Puri Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Bikash Puri  Delhi reach out to us at 🔝9953056974🔝Model Call Girl in Bikash Puri  Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Bikash Puri Delhi reach out to us at 🔝9953056974🔝
 
URLs and Routing in the Odoo 17 Website App
URLs and Routing in the Odoo 17 Website AppURLs and Routing in the Odoo 17 Website App
URLs and Routing in the Odoo 17 Website App
 
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
 
How to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptxHow to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptx
 
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
 
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
 
Mastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory InspectionMastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory Inspection
 
Introduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptxIntroduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptx
 
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxPOINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
 
A Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformA Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy Reform
 
Presiding Officer Training module 2024 lok sabha elections
Presiding Officer Training module 2024 lok sabha electionsPresiding Officer Training module 2024 lok sabha elections
Presiding Officer Training module 2024 lok sabha elections
 
_Math 4-Q4 Week 5.pptx Steps in Collecting Data
_Math 4-Q4 Week 5.pptx Steps in Collecting Data_Math 4-Q4 Week 5.pptx Steps in Collecting Data
_Math 4-Q4 Week 5.pptx Steps in Collecting Data
 
Staff of Color (SOC) Retention Efforts DDSD
Staff of Color (SOC) Retention Efforts DDSDStaff of Color (SOC) Retention Efforts DDSD
Staff of Color (SOC) Retention Efforts DDSD
 

Mule enterprise security

  • 1. Agenda Introducing Mule Enterprise Security Drill-down into – Mule STS OAuth 2.0 Provider – Mule Credential Vault – Mule Security Filter Processors Brief Overview of other New Mule Enterprise Security Features Wrap-up and Q&A All contents Copyright © 2011, MuleSoft Inc. 2
  • 2. Mule Enterprise Security - Benefits All contents Copyright © 2011, MuleSoft Inc. 3 1 - Protect access to your Mule application end-points and the services they access 2 - Maintain the confidentiality of data used and emitted by your mule flows 3 - Guard your Mule interfaces against security attacks SOA Mobile APIs SaaS Integration
  • 3. Mule Enterprise Security All contents Copyright © 2011, MuleSoft Inc. 4
  • 4. Mule STS OAuth 2.0 Provider - Why Protect your APIs with OAuth Enables credentials to only be shared with a single, central entity All contents Copyright © 2011, MuleSoft Inc. 5 Applications (OAuth Clients) APIs Exposed by Mule Application (OAuth Service Provider) Application End-Users Mobile Apps Web Apps Mule Cloud Connector Apps OAuth Protected
  • 5. Mule STS OAuth 2.0 Provider - What Mule can act as an OAuth 2.0 provider OAuth element protects flow Supports for all OAuth 2.0 grant types Supported end-points – HTTP/S, Jetty, Servlet, Web Services All contents Copyright © 2011, MuleSoft Inc. 6
  • 6. Mule Credential Vault - Why Access external end-points without exposing their access credentials – Store credentials in encrypted format All contents Copyright © 2011, MuleSoft Inc. 7
  • 7. Mule Credential Vault - What Encrypt content of Mule application property files Mule Studio provides property value encryption tool Values decrypted upon access from Mule Flows All contents Copyright © 2011, MuleSoft Inc. 8
  • 8. Mule Security Filter Processors - Why Whitelist a specific set or range of IP addresses Enable expiry policy using message time-stamp All contents Copyright © 2011, MuleSoft Inc. 9
  • 9. Mule Security Filter Processors - What Use Mule security filter processors to – Set filtering needs and parameters Support for – IP filtering (single, range, and CIDR) – Message expiry filtering All contents Copyright © 2011, MuleSoft Inc. 10
  • 10. Mule Enterprise Security – Features Overview All contents Copyright © 2011, MuleSoft Inc. 11 Feature Description Mule Secure Token Service (STS) – OAuth 2.0 Provider Enables a Mule server to act as an OAuth 2.0 authentication provider to protect specific mule flows. Mule Credential Vault Encrypt sensitive values (e.g. passwords) in your Mule message flows. Mule Security Filter Processors Allow filtering of messages based on security criteria: IP based and expiry based. Mule Digital Signature Processors Simplifies the signing and verification of XML Signatures within Mule flows. Mule Message Encryption Processors Easily encrypt and decrypt sensitive data in Mule messages.
  • 11. Mule Enterprise Security All contents Copyright © 2011, MuleSoft Inc. 12 1 - Protect access to your Mule application end-points and the services they access 2 - Maintain the confidentiality of data used and emitted by your mule flows 3 – Guard your Mule interfaces against security attacks SOA Mobile APIs SaaS Integration

Editor's Notes

  1. Slide 2: Housekeeping items   Just a couple of housekeeping items before we get started: This session is being recorded and will be available immediately following the webinar You can download the slides right now from the “attachments” tab If you have content or technical questions, please feel free to ask them at any time by typing them into and sending them via the question button above the slides. We will answer questions at the end of the session but please feel free to send over questions as they arise. If we don’t get to your question or if you have any detailed use-case specific questions, you can submit them to our team of experts at tinyurl.com/askmulesoft  
  2. Go over the MES benefits Then mention the fact that these benefits span solution areas
  3. Safe Access as per OAuth: - Allows you to protect any HTTP based interface for access – usually used for REST APIs Temporary and restricted access – Access is controlled through OAuth tokens which can have an expiry date and limited scope to allow for RBAC Often consumed and used by Mobile apps
  4. Key for decrypting the properties is provided as a system property: <secure-property-placeholder:config key="${runtime.property}" location="test.qa.properties"/> ./mule -D-Mruntime.propery=mySecretKey
  5. Useful for security gateway scenarios
  6. Go over the MES benefits Then mention the fact that these benefits span solution areas
  7. Slide 2: Housekeeping items   Just a couple of housekeeping items before we get started: This session is being recorded and will be available immediately following the webinar You can download the slides right now from the “attachments” tab If you have content or technical questions, please feel free to ask them at any time by typing them into and sending them via the question button above the slides. We will answer questions at the end of the session but please feel free to send over questions as they arise. If we don’t get to your question or if you have any detailed use-case specific questions, you can submit them to our team of experts at tinyurl.com/askmulesoft