SlideShare a Scribd company logo
1 of 28
Coimbatore MuleSoft Meetup Group
What is SSL/TLS, What is One-Way
SSL & Two-Way SSL?
- Secure Network Communication
Msg: Meet me at X place
Time: 12 PM
Alice Bob
Msg: Meet me at X place
Time: 12 PM
Organizers
2
About Organizer:
• 10 years of Technical Experience.
• 6+ years of Experience in the Integration Domain.
• Certified MuleSoft Developer and Architect.
• Mule Meetup Speaker.
• Coimbatore Mule Meetup Leader
Ashish Pardhi
Solution Architect, Apisero
Organizers
3
About Organizer:
• 10+ years of Industry Experience.
• 2+ years of Experience in Mulesoft
• Certified Technical Instructor at Mulesoft
• Integration Architect at NJC Labs.
• Coimbatore Mule Meetup Leader.
Anoop Ramachandran
Integration Architect,
NJC LABS
Organizers
4
About Organizer:
• 3.7 years of Total experience in MuleSoft.
• Certified MuleSoft Developer.
• Solution Consultant at Apisero.
• Coimbatore Mule Meetup Leader.
Balkis Sajeena
Solution Consultant, Apisero
• Both the speaker and host are organizing this meet up in individual capacity, only.
We are not representing our companies here.
• This presentation is strictly for learning purpose only. Organizer/Presenter do not hold any
responsibility that same solution will work for your business requirements also.
• This presentation is not meant for any promotional activities.
Safe Harbor Statement
5
A recording of this meetup will be uploaded to events page within 24 hours.
Questions can be submitted/asked at any time in the Chat/Questions & Answers Tab.
Make it more Interactive!!!
Give us feedback! Rate this meetup session by filling feedback form at the end of the day.
We Love Feedbacks!!! Its Bread & Butter for Meetup.
Housekeeping
6
1. How to Secure
Network
Communication?
2. SSL(Secure
Socket Layer)
3. Digital Certificate
• Signature(Signed and Unsigned)
• Digest(SHA-256, MD5)
4. Keys
• Private, Public and
Session Key
5. Types of Encryption
• Symmetric and Asymmetric
6. One-way and
Two-way SSL
7. Keystore and
Truststore
Agenda
7
Digital certificates serve as the backbone of internet security.
● Secure Sockets Layer (SSL) certificates, sometimes called digital certificates, are used to
establish an encrypted connection between a browser or user's computer and a server or
website.
● The SSL connection protects sensitive data, such as credit card information, exchanged
during each visit, which is called a session, from being intercepted from non-authorized
parties.
What is an SSL Certificate?
8
Encryption: The data which is transferred
between two or more Clients and Server
should be encrypted.
Authentication: The data to be
transferred must be to the correct
person or user.
Data Integrity: The data over transmission
should not be tampered or changed.
SSL works on three basic principles
9
Encryption
10
Msg: Meet me at X place
Time: 12 PM
Alice Bob
Msg: Meet me at X place
Time: 12 PM
I know
Alice’s
Public Key
I am
encrypting
with my
Private Key
Symmetric - Same Key
Asymmetric - Different Set of Keys
Data Integrity – Digital Signature
11
Msg: Meet me at X place
Time: 12 PM
Alice Bob
Msg: Meet me at X place
Time: 12 PM
Original Msg
-------------------------------------------------------------
Encrypt(Digest(Original Msg), Alice’s Priv Key)
Digest(Original Msg)
------------------------------------------------------------------------------------------------
Decrypt(Encrypt(Digest(Original Msg), Alice’s Priv Key), Alice’s Pub Key)
abc1234xyz
------------------
abc1234xyz
I have
received
correct
Message
Signature
of Alice
12
Msg: Meet me at X place
Time: 12 PM
Alice
Bob
Msg: Lets Meet at My Home
Time: 12 PM
Hunter
Data Integrity
Intercepted Msg
-------------------------------------------------------------
Encrypt(Digest(Intercepted Msg), Hunter’s Priv Key)
Digest(Intercepted Msg)
------------------------------------------------------------------------------------------------
Decrypt(Encrypt(Digest(Intercepted Msg), Hunter’s Priv Key), Alice’s Pub Key)
abc1234xyz
------------------
~!$#%&^*()#
I have to
reject
this
Message
Digital Certificate
13
I am Mulesoft.com
Alice
Bob
Original Msg
-------------------------------------------------------------
Encrypt(Digest(Original Msg), CA’s Priv Key)
Digest(Original Msg)
------------------------------------------------------------------------------------------------
Decrypt(Encrypt(Digest(Original Msg), CA’s Priv Key), CA’s Pub Key)
abc1234xyz
------------------
abc1234xyz
Right Sender
confirmed
with help
CA’s Pub
Key
I am Mulesoft.com
Keystore and Truststore – JCEKS, PKCS12, JKS
14
Alice Bob
Alice’s
Truststore
Bob’s
Truststore
Alice’s
Keystore
Bob’s
Keystore
Alias Privat
e Key
Pub
Cert
Alias Privat
e Key
Pub
Cert
Alias Pub
Cert
Alias Pub
Cert
 keytool -genKey -alias myserver -keystore serverkeystore.jks -storetype jks -keypass password -
storepass password -keyalg RSA
 keytool -genKey -alias myclient -keystore clientkeystore.jks -storetype jks -keypass password -
storepass password -keyalg RSA
 keytool -exportcert -alias myserver -keystore serverkeystore.jks -file servercert.cer -storepass
password
 keytool -exportcert -alias myclient -keystore clientkeystore.jks -file clientcert.cer -storepass
password
 keytool -importcert -keystore servertruststore.jks -file clientcert.cer -alias myclient -storepass
password -trustcacerts
 keytool -importcert -keystore clienttruststore.jks -file servercert.cer -alias myserver -storepass
password -trustcacerts
Generate Keystore and Truststore - Keytool
15
 keytool -certreq -keystore <keystore-name>.jks -alias <key-alias> -file <certificate-name>.csr
 keytool -import -keystore <keystore-name>.jks -alias <cert-alias> -file <signed_certificate_file>
Request Signing by a Certification Authority
16
• Basically, the browser works on One-Way SSL authentication mechanism,
Where the Client verifies/validates the server certificate with the list of CA's
certification authority.
• There are three keys are used to set up the SSL connection:
– Public key
– Private key
– Session key
SSL(Secure Sockets Layer) HANDSHAKE
17
• One-Way SSL
– In this method only client going to verifies, server certificates with the List of CA's
certification authority.
Two different ways to make SSL connection
18
• Two-Way SSL
– In this method, both client and server verify, each other certificates with the list of CA's
certification authority.
One-Way SSL authentication
19
Client request for secured connection
Client sends Session Key + Public Key
Server returns public certificate + public key
Server decrypts the session key & starts the session
Two-Way SSL authentication
20
Client request for secured connection
Client sends public cert + Session Key + Public Key
Server returns public certificate + public key
Server decrypts the session key & starts the session
Demo
● Generating Keys and Certificate
● One-way SSL
● Two-way SSL
Q&A
Get ready to WIN a Special Gift from MuleSoft Community
Quiz Time
❖ You should not be a meetup leader.
❖ In last 30 days you shouldn’t own any trivia quiz in any
meetup.
Important Instructions for the
attendees to play Trivia quiz
1. Log in to www.kahoot.it via your
mobile phone
2. Click on “Play” on top right hand side
of the web page
3. Enter the game pin that is displayed
on the quiz master’s screen
4. Give your complete name as the
nickname
5. You will be getting your questions on
your laptop screen with option.
6. For every questions you will get 20
26
Share:
○ Tweet your pictures using the hashtag #CoimbatoreMuleSoftMeetup
○ Invite your network to join: https://meetups.mulesoft.com/coimbatore/
Feedback:
○ Fill out the survey feedback and suggest topics for upcoming events
○ Contact MuleSoft at meetups@mulesoft.com for ways to improve the program
What’s next?
27
Anypoint Platform CLI On Sat, July 17, 11.00 AM (IST) by Jivan Nalavade
Lead Engineer, Apisero
https://meetups.mulesoft.com/events/details/mulesoft-coimbatore-presents-anypoint-platform-cli/
Next Meetups
Thank you

More Related Content

What's hot

Platform engineering 101
Platform engineering 101Platform engineering 101
Platform engineering 101Sander Knape
 
OpenID Connect and Single Sign-On for Beginners
OpenID Connect and Single Sign-On for BeginnersOpenID Connect and Single Sign-On for Beginners
OpenID Connect and Single Sign-On for BeginnersSalesforce Developers
 
TechnicalTerraformLandingZones121120229238.pdf
TechnicalTerraformLandingZones121120229238.pdfTechnicalTerraformLandingZones121120229238.pdf
TechnicalTerraformLandingZones121120229238.pdfMIlton788007
 
Design patterns for microservice architecture
Design patterns for microservice architectureDesign patterns for microservice architecture
Design patterns for microservice architectureThe Software House
 
3 Modern Security - Secure identities to reach zero trust with AAD
3   Modern Security - Secure identities to reach zero trust with AAD3   Modern Security - Secure identities to reach zero trust with AAD
3 Modern Security - Secure identities to reach zero trust with AADAndrew Bettany
 
Performance Monitoring and Testing in the Salesforce Cloud
Performance Monitoring and Testing in the Salesforce CloudPerformance Monitoring and Testing in the Salesforce Cloud
Performance Monitoring and Testing in the Salesforce CloudSalesforce Developers
 
Microservices With Istio Service Mesh
Microservices With Istio Service MeshMicroservices With Istio Service Mesh
Microservices With Istio Service MeshNatanael Fonseca
 
Introduction to Vault
Introduction to VaultIntroduction to Vault
Introduction to VaultKnoldus Inc.
 
Deep Dive on User Sign-up Sign-in with Amazon Cognito - AWS Online Tech Talks
Deep Dive on User Sign-up Sign-in with Amazon Cognito - AWS Online Tech TalksDeep Dive on User Sign-up Sign-in with Amazon Cognito - AWS Online Tech Talks
Deep Dive on User Sign-up Sign-in with Amazon Cognito - AWS Online Tech TalksAmazon Web Services
 
API Security : Patterns and Practices
API Security : Patterns and PracticesAPI Security : Patterns and Practices
API Security : Patterns and PracticesPrabath Siriwardena
 
VMware Tanzu Service Mesh from the Developer’s Perspective
VMware Tanzu Service Mesh from the Developer’s PerspectiveVMware Tanzu Service Mesh from the Developer’s Perspective
VMware Tanzu Service Mesh from the Developer’s PerspectiveVMware Tanzu
 
Microsoft Azure Security Overview
Microsoft Azure Security OverviewMicrosoft Azure Security Overview
Microsoft Azure Security OverviewAlert Logic
 
MuleSoft Surat Meetup#42 - Runtime Fabric Manager on Self Managed Kubernetes ...
MuleSoft Surat Meetup#42 - Runtime Fabric Manager on Self Managed Kubernetes ...MuleSoft Surat Meetup#42 - Runtime Fabric Manager on Self Managed Kubernetes ...
MuleSoft Surat Meetup#42 - Runtime Fabric Manager on Self Managed Kubernetes ...Jitendra Bafna
 
Mulesoft Salesforce Connector - OAuth 2.0 JWT Bearer
Mulesoft Salesforce Connector -  OAuth 2.0 JWT BearerMulesoft Salesforce Connector -  OAuth 2.0 JWT Bearer
Mulesoft Salesforce Connector - OAuth 2.0 JWT BearerVince Soliza
 
Access Security - Privileged Identity Management
Access Security - Privileged Identity ManagementAccess Security - Privileged Identity Management
Access Security - Privileged Identity ManagementEng Teong Cheah
 
An introduction to OAuth 2
An introduction to OAuth 2An introduction to OAuth 2
An introduction to OAuth 2Sanjoy Kumar Roy
 
Salesforce integration best practices columbus meetup
Salesforce integration best practices   columbus meetupSalesforce integration best practices   columbus meetup
Salesforce integration best practices columbus meetupMuleSoft Meetup
 

What's hot (20)

Platform engineering 101
Platform engineering 101Platform engineering 101
Platform engineering 101
 
OpenID Connect and Single Sign-On for Beginners
OpenID Connect and Single Sign-On for BeginnersOpenID Connect and Single Sign-On for Beginners
OpenID Connect and Single Sign-On for Beginners
 
Service mesh
Service meshService mesh
Service mesh
 
TechnicalTerraformLandingZones121120229238.pdf
TechnicalTerraformLandingZones121120229238.pdfTechnicalTerraformLandingZones121120229238.pdf
TechnicalTerraformLandingZones121120229238.pdf
 
Design patterns for microservice architecture
Design patterns for microservice architectureDesign patterns for microservice architecture
Design patterns for microservice architecture
 
3 Modern Security - Secure identities to reach zero trust with AAD
3   Modern Security - Secure identities to reach zero trust with AAD3   Modern Security - Secure identities to reach zero trust with AAD
3 Modern Security - Secure identities to reach zero trust with AAD
 
Performance Monitoring and Testing in the Salesforce Cloud
Performance Monitoring and Testing in the Salesforce CloudPerformance Monitoring and Testing in the Salesforce Cloud
Performance Monitoring and Testing in the Salesforce Cloud
 
Microservices With Istio Service Mesh
Microservices With Istio Service MeshMicroservices With Istio Service Mesh
Microservices With Istio Service Mesh
 
Introduction to Vault
Introduction to VaultIntroduction to Vault
Introduction to Vault
 
Deep Dive on User Sign-up Sign-in with Amazon Cognito - AWS Online Tech Talks
Deep Dive on User Sign-up Sign-in with Amazon Cognito - AWS Online Tech TalksDeep Dive on User Sign-up Sign-in with Amazon Cognito - AWS Online Tech Talks
Deep Dive on User Sign-up Sign-in with Amazon Cognito - AWS Online Tech Talks
 
Vault 101
Vault 101Vault 101
Vault 101
 
API Security : Patterns and Practices
API Security : Patterns and PracticesAPI Security : Patterns and Practices
API Security : Patterns and Practices
 
VMware Tanzu Service Mesh from the Developer’s Perspective
VMware Tanzu Service Mesh from the Developer’s PerspectiveVMware Tanzu Service Mesh from the Developer’s Perspective
VMware Tanzu Service Mesh from the Developer’s Perspective
 
Architecture: Microservices
Architecture: MicroservicesArchitecture: Microservices
Architecture: Microservices
 
Microsoft Azure Security Overview
Microsoft Azure Security OverviewMicrosoft Azure Security Overview
Microsoft Azure Security Overview
 
MuleSoft Surat Meetup#42 - Runtime Fabric Manager on Self Managed Kubernetes ...
MuleSoft Surat Meetup#42 - Runtime Fabric Manager on Self Managed Kubernetes ...MuleSoft Surat Meetup#42 - Runtime Fabric Manager on Self Managed Kubernetes ...
MuleSoft Surat Meetup#42 - Runtime Fabric Manager on Self Managed Kubernetes ...
 
Mulesoft Salesforce Connector - OAuth 2.0 JWT Bearer
Mulesoft Salesforce Connector -  OAuth 2.0 JWT BearerMulesoft Salesforce Connector -  OAuth 2.0 JWT Bearer
Mulesoft Salesforce Connector - OAuth 2.0 JWT Bearer
 
Access Security - Privileged Identity Management
Access Security - Privileged Identity ManagementAccess Security - Privileged Identity Management
Access Security - Privileged Identity Management
 
An introduction to OAuth 2
An introduction to OAuth 2An introduction to OAuth 2
An introduction to OAuth 2
 
Salesforce integration best practices columbus meetup
Salesforce integration best practices   columbus meetupSalesforce integration best practices   columbus meetup
Salesforce integration best practices columbus meetup
 

Similar to Coimbatore MuleSoft Meetup on SSL and Digital Certificates

SSL and CA
SSL and CASSL and CA
SSL and CAX 590
 
Indianapolis mule soft_meetup_30_jan_2021 (1)
Indianapolis mule soft_meetup_30_jan_2021 (1)Indianapolis mule soft_meetup_30_jan_2021 (1)
Indianapolis mule soft_meetup_30_jan_2021 (1)ikram_ahamed
 
Training Slides: 302 - Securing Your Cluster With SSL
Training Slides: 302 - Securing Your Cluster With SSLTraining Slides: 302 - Securing Your Cluster With SSL
Training Slides: 302 - Securing Your Cluster With SSLContinuent
 
Dirty Little Secrets They Didn't Teach You In Pentest Class v2
Dirty Little Secrets They Didn't Teach You In Pentest Class v2Dirty Little Secrets They Didn't Teach You In Pentest Class v2
Dirty Little Secrets They Didn't Teach You In Pentest Class v2Rob Fuller
 
Dirty Little Secrets They Didn't Teach You In Pentest Class v2
Dirty Little Secrets They Didn't Teach You In Pentest Class v2Dirty Little Secrets They Didn't Teach You In Pentest Class v2
Dirty Little Secrets They Didn't Teach You In Pentest Class v2Chris Gates
 
Secure socket layer
Secure socket layerSecure socket layer
Secure socket layerBU
 
Patterns to Bring Enterprise and Social Identity to the Cloud
Patterns to Bring Enterprise and Social Identity to the Cloud Patterns to Bring Enterprise and Social Identity to the Cloud
Patterns to Bring Enterprise and Social Identity to the Cloud CA API Management
 
SSL Certificates and Operations
SSL Certificates and OperationsSSL Certificates and Operations
SSL Certificates and OperationsNisheed KM
 
Calicut MuleSoft Meetup Group - #13 Implementing One-Way and Two-Way SSL
Calicut MuleSoft Meetup Group - #13 Implementing One-Way and Two-Way SSLCalicut MuleSoft Meetup Group - #13 Implementing One-Way and Two-Way SSL
Calicut MuleSoft Meetup Group - #13 Implementing One-Way and Two-Way SSLAnoopRamachandran13
 
Overview of SSL & TLS Client-Server Interactions
Overview of SSL & TLS Client-Server InteractionsOverview of SSL & TLS Client-Server Interactions
Overview of SSL & TLS Client-Server InteractionsKatie Knowles
 
Securing the Web without site-specific passwords
Securing the Web without site-specific passwordsSecuring the Web without site-specific passwords
Securing the Web without site-specific passwordsFrancois Marier
 
Dr. Omar Ali Alibrahim - Ssl talk
Dr. Omar Ali Alibrahim - Ssl talkDr. Omar Ali Alibrahim - Ssl talk
Dr. Omar Ali Alibrahim - Ssl talkpromediakw
 
Microsoft Bluehat 2017: Mobile SSL Interception
Microsoft Bluehat 2017: Mobile SSL InterceptionMicrosoft Bluehat 2017: Mobile SSL Interception
Microsoft Bluehat 2017: Mobile SSL InterceptionHimanshu Dwivedi
 
[Cluj] Turn SSL ON
[Cluj] Turn SSL ON[Cluj] Turn SSL ON
[Cluj] Turn SSL ONOWASP EEE
 
hackcon2013-Dirty Little Secrets They Didn't Teach You In Pentesting Class v2
hackcon2013-Dirty Little Secrets They Didn't Teach You In Pentesting Class v2hackcon2013-Dirty Little Secrets They Didn't Teach You In Pentesting Class v2
hackcon2013-Dirty Little Secrets They Didn't Teach You In Pentesting Class v2Chris Gates
 
OTN tour 2015 Experience in implementing SSL between oracle db and oracle cli...
OTN tour 2015 Experience in implementing SSL between oracle db and oracle cli...OTN tour 2015 Experience in implementing SSL between oracle db and oracle cli...
OTN tour 2015 Experience in implementing SSL between oracle db and oracle cli...Andrejs Vorobjovs
 
Certificate pinning in android applications
Certificate pinning in android applicationsCertificate pinning in android applications
Certificate pinning in android applicationsArash Ramez
 
Global Azure Bootcamp 2017 - Azure Key Vault
Global Azure Bootcamp 2017 - Azure Key VaultGlobal Azure Bootcamp 2017 - Azure Key Vault
Global Azure Bootcamp 2017 - Azure Key VaultAlberto Diaz Martin
 
Kerberos survival guide
Kerberos survival guideKerberos survival guide
Kerberos survival guideJ.D. Wade
 

Similar to Coimbatore MuleSoft Meetup on SSL and Digital Certificates (20)

SSL and CA
SSL and CASSL and CA
SSL and CA
 
Indianapolis mule soft_meetup_30_jan_2021 (1)
Indianapolis mule soft_meetup_30_jan_2021 (1)Indianapolis mule soft_meetup_30_jan_2021 (1)
Indianapolis mule soft_meetup_30_jan_2021 (1)
 
Training Slides: 302 - Securing Your Cluster With SSL
Training Slides: 302 - Securing Your Cluster With SSLTraining Slides: 302 - Securing Your Cluster With SSL
Training Slides: 302 - Securing Your Cluster With SSL
 
Dirty Little Secrets They Didn't Teach You In Pentest Class v2
Dirty Little Secrets They Didn't Teach You In Pentest Class v2Dirty Little Secrets They Didn't Teach You In Pentest Class v2
Dirty Little Secrets They Didn't Teach You In Pentest Class v2
 
Dirty Little Secrets They Didn't Teach You In Pentest Class v2
Dirty Little Secrets They Didn't Teach You In Pentest Class v2Dirty Little Secrets They Didn't Teach You In Pentest Class v2
Dirty Little Secrets They Didn't Teach You In Pentest Class v2
 
Secure socket layer
Secure socket layerSecure socket layer
Secure socket layer
 
Patterns to Bring Enterprise and Social Identity to the Cloud
Patterns to Bring Enterprise and Social Identity to the Cloud Patterns to Bring Enterprise and Social Identity to the Cloud
Patterns to Bring Enterprise and Social Identity to the Cloud
 
SSL Certificates and Operations
SSL Certificates and OperationsSSL Certificates and Operations
SSL Certificates and Operations
 
Calicut MuleSoft Meetup Group - #13 Implementing One-Way and Two-Way SSL
Calicut MuleSoft Meetup Group - #13 Implementing One-Way and Two-Way SSLCalicut MuleSoft Meetup Group - #13 Implementing One-Way and Two-Way SSL
Calicut MuleSoft Meetup Group - #13 Implementing One-Way and Two-Way SSL
 
Overview of SSL & TLS Client-Server Interactions
Overview of SSL & TLS Client-Server InteractionsOverview of SSL & TLS Client-Server Interactions
Overview of SSL & TLS Client-Server Interactions
 
Securing the Web without site-specific passwords
Securing the Web without site-specific passwordsSecuring the Web without site-specific passwords
Securing the Web without site-specific passwords
 
Dr. Omar Ali Alibrahim - Ssl talk
Dr. Omar Ali Alibrahim - Ssl talkDr. Omar Ali Alibrahim - Ssl talk
Dr. Omar Ali Alibrahim - Ssl talk
 
Microsoft Bluehat 2017: Mobile SSL Interception
Microsoft Bluehat 2017: Mobile SSL InterceptionMicrosoft Bluehat 2017: Mobile SSL Interception
Microsoft Bluehat 2017: Mobile SSL Interception
 
[Cluj] Turn SSL ON
[Cluj] Turn SSL ON[Cluj] Turn SSL ON
[Cluj] Turn SSL ON
 
hackcon2013-Dirty Little Secrets They Didn't Teach You In Pentesting Class v2
hackcon2013-Dirty Little Secrets They Didn't Teach You In Pentesting Class v2hackcon2013-Dirty Little Secrets They Didn't Teach You In Pentesting Class v2
hackcon2013-Dirty Little Secrets They Didn't Teach You In Pentesting Class v2
 
OTN tour 2015 Experience in implementing SSL between oracle db and oracle cli...
OTN tour 2015 Experience in implementing SSL between oracle db and oracle cli...OTN tour 2015 Experience in implementing SSL between oracle db and oracle cli...
OTN tour 2015 Experience in implementing SSL between oracle db and oracle cli...
 
Certificate pinning in android applications
Certificate pinning in android applicationsCertificate pinning in android applications
Certificate pinning in android applications
 
Global Azure Bootcamp 2017 - Azure Key Vault
Global Azure Bootcamp 2017 - Azure Key VaultGlobal Azure Bootcamp 2017 - Azure Key Vault
Global Azure Bootcamp 2017 - Azure Key Vault
 
Kerberos survival guide
Kerberos survival guideKerberos survival guide
Kerberos survival guide
 
authentication.ppt
authentication.pptauthentication.ppt
authentication.ppt
 

More from pqrs1234

AWS Route 53 with Mulesoft
AWS Route 53 with Mulesoft AWS Route 53 with Mulesoft
AWS Route 53 with Mulesoft pqrs1234
 
Digital Transformation With MuleSoft : That Wins Customers
Digital Transformation With MuleSoft : That Wins CustomersDigital Transformation With MuleSoft : That Wins Customers
Digital Transformation With MuleSoft : That Wins Customerspqrs1234
 
Session on API auto scaling, monitoring and Log management
Session on API auto scaling, monitoring and Log managementSession on API auto scaling, monitoring and Log management
Session on API auto scaling, monitoring and Log managementpqrs1234
 
Power of salesforce LWC with Mulesoft using platform events
Power of salesforce LWC with Mulesoft using platform eventsPower of salesforce LWC with Mulesoft using platform events
Power of salesforce LWC with Mulesoft using platform eventspqrs1234
 
Api complete life cycle with api security
Api complete life cycle with api securityApi complete life cycle with api security
Api complete life cycle with api securitypqrs1234
 
Identity and Client Management using OpenID Connect and SAML
Identity and Client Management using OpenID Connect and SAMLIdentity and Client Management using OpenID Connect and SAML
Identity and Client Management using OpenID Connect and SAMLpqrs1234
 
Nagpur Mulesoft Meetup on CICD using Jenkins
Nagpur Mulesoft Meetup on CICD using JenkinsNagpur Mulesoft Meetup on CICD using Jenkins
Nagpur Mulesoft Meetup on CICD using Jenkinspqrs1234
 
Salesforce composite api mule soft connector
Salesforce composite api mule soft connectorSalesforce composite api mule soft connector
Salesforce composite api mule soft connectorpqrs1234
 
Coimbatore Second Mule Meetup on Error Handling in Mule 4
Coimbatore Second Mule Meetup on Error Handling in Mule 4Coimbatore Second Mule Meetup on Error Handling in Mule 4
Coimbatore Second Mule Meetup on Error Handling in Mule 4pqrs1234
 

More from pqrs1234 (9)

AWS Route 53 with Mulesoft
AWS Route 53 with Mulesoft AWS Route 53 with Mulesoft
AWS Route 53 with Mulesoft
 
Digital Transformation With MuleSoft : That Wins Customers
Digital Transformation With MuleSoft : That Wins CustomersDigital Transformation With MuleSoft : That Wins Customers
Digital Transformation With MuleSoft : That Wins Customers
 
Session on API auto scaling, monitoring and Log management
Session on API auto scaling, monitoring and Log managementSession on API auto scaling, monitoring and Log management
Session on API auto scaling, monitoring and Log management
 
Power of salesforce LWC with Mulesoft using platform events
Power of salesforce LWC with Mulesoft using platform eventsPower of salesforce LWC with Mulesoft using platform events
Power of salesforce LWC with Mulesoft using platform events
 
Api complete life cycle with api security
Api complete life cycle with api securityApi complete life cycle with api security
Api complete life cycle with api security
 
Identity and Client Management using OpenID Connect and SAML
Identity and Client Management using OpenID Connect and SAMLIdentity and Client Management using OpenID Connect and SAML
Identity and Client Management using OpenID Connect and SAML
 
Nagpur Mulesoft Meetup on CICD using Jenkins
Nagpur Mulesoft Meetup on CICD using JenkinsNagpur Mulesoft Meetup on CICD using Jenkins
Nagpur Mulesoft Meetup on CICD using Jenkins
 
Salesforce composite api mule soft connector
Salesforce composite api mule soft connectorSalesforce composite api mule soft connector
Salesforce composite api mule soft connector
 
Coimbatore Second Mule Meetup on Error Handling in Mule 4
Coimbatore Second Mule Meetup on Error Handling in Mule 4Coimbatore Second Mule Meetup on Error Handling in Mule 4
Coimbatore Second Mule Meetup on Error Handling in Mule 4
 

Recently uploaded

Introduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptxIntroduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptxpboyjonauth
 
Computed Fields and api Depends in the Odoo 17
Computed Fields and api Depends in the Odoo 17Computed Fields and api Depends in the Odoo 17
Computed Fields and api Depends in the Odoo 17Celine George
 
Full Stack Web Development Course for Beginners
Full Stack Web Development Course  for BeginnersFull Stack Web Development Course  for Beginners
Full Stack Web Development Course for BeginnersSabitha Banu
 
Like-prefer-love -hate+verb+ing & silent letters & citizenship text.pdf
Like-prefer-love -hate+verb+ing & silent letters & citizenship text.pdfLike-prefer-love -hate+verb+ing & silent letters & citizenship text.pdf
Like-prefer-love -hate+verb+ing & silent letters & citizenship text.pdfMr Bounab Samir
 
ROOT CAUSE ANALYSIS PowerPoint Presentation
ROOT CAUSE ANALYSIS PowerPoint PresentationROOT CAUSE ANALYSIS PowerPoint Presentation
ROOT CAUSE ANALYSIS PowerPoint PresentationAadityaSharma884161
 
Crayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon ACrayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon AUnboundStockton
 
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️9953056974 Low Rate Call Girls In Saket, Delhi NCR
 
AmericanHighSchoolsprezentacijaoskolama.
AmericanHighSchoolsprezentacijaoskolama.AmericanHighSchoolsprezentacijaoskolama.
AmericanHighSchoolsprezentacijaoskolama.arsicmarija21
 
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptxECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptxiammrhaywood
 
Difference Between Search & Browse Methods in Odoo 17
Difference Between Search & Browse Methods in Odoo 17Difference Between Search & Browse Methods in Odoo 17
Difference Between Search & Browse Methods in Odoo 17Celine George
 
Keynote by Prof. Wurzer at Nordex about IP-design
Keynote by Prof. Wurzer at Nordex about IP-designKeynote by Prof. Wurzer at Nordex about IP-design
Keynote by Prof. Wurzer at Nordex about IP-designMIPLM
 
Types of Journalistic Writing Grade 8.pptx
Types of Journalistic Writing Grade 8.pptxTypes of Journalistic Writing Grade 8.pptx
Types of Journalistic Writing Grade 8.pptxEyham Joco
 
ENGLISH6-Q4-W3.pptxqurter our high choom
ENGLISH6-Q4-W3.pptxqurter our high choomENGLISH6-Q4-W3.pptxqurter our high choom
ENGLISH6-Q4-W3.pptxqurter our high choomnelietumpap1
 
Introduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher EducationIntroduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher Educationpboyjonauth
 
How to do quick user assign in kanban in Odoo 17 ERP
How to do quick user assign in kanban in Odoo 17 ERPHow to do quick user assign in kanban in Odoo 17 ERP
How to do quick user assign in kanban in Odoo 17 ERPCeline George
 
Quarter 4 Peace-education.pptx Catch Up Friday
Quarter 4 Peace-education.pptx Catch Up FridayQuarter 4 Peace-education.pptx Catch Up Friday
Quarter 4 Peace-education.pptx Catch Up FridayMakMakNepo
 
Framing an Appropriate Research Question 6b9b26d93da94caf993c038d9efcdedb.pdf
Framing an Appropriate Research Question 6b9b26d93da94caf993c038d9efcdedb.pdfFraming an Appropriate Research Question 6b9b26d93da94caf993c038d9efcdedb.pdf
Framing an Appropriate Research Question 6b9b26d93da94caf993c038d9efcdedb.pdfUjwalaBharambe
 

Recently uploaded (20)

Introduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptxIntroduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptx
 
Computed Fields and api Depends in the Odoo 17
Computed Fields and api Depends in the Odoo 17Computed Fields and api Depends in the Odoo 17
Computed Fields and api Depends in the Odoo 17
 
Full Stack Web Development Course for Beginners
Full Stack Web Development Course  for BeginnersFull Stack Web Development Course  for Beginners
Full Stack Web Development Course for Beginners
 
Like-prefer-love -hate+verb+ing & silent letters & citizenship text.pdf
Like-prefer-love -hate+verb+ing & silent letters & citizenship text.pdfLike-prefer-love -hate+verb+ing & silent letters & citizenship text.pdf
Like-prefer-love -hate+verb+ing & silent letters & citizenship text.pdf
 
ROOT CAUSE ANALYSIS PowerPoint Presentation
ROOT CAUSE ANALYSIS PowerPoint PresentationROOT CAUSE ANALYSIS PowerPoint Presentation
ROOT CAUSE ANALYSIS PowerPoint Presentation
 
TataKelola dan KamSiber Kecerdasan Buatan v022.pdf
TataKelola dan KamSiber Kecerdasan Buatan v022.pdfTataKelola dan KamSiber Kecerdasan Buatan v022.pdf
TataKelola dan KamSiber Kecerdasan Buatan v022.pdf
 
Crayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon ACrayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon A
 
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
 
AmericanHighSchoolsprezentacijaoskolama.
AmericanHighSchoolsprezentacijaoskolama.AmericanHighSchoolsprezentacijaoskolama.
AmericanHighSchoolsprezentacijaoskolama.
 
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptxECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
 
Difference Between Search & Browse Methods in Odoo 17
Difference Between Search & Browse Methods in Odoo 17Difference Between Search & Browse Methods in Odoo 17
Difference Between Search & Browse Methods in Odoo 17
 
Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝
 
Keynote by Prof. Wurzer at Nordex about IP-design
Keynote by Prof. Wurzer at Nordex about IP-designKeynote by Prof. Wurzer at Nordex about IP-design
Keynote by Prof. Wurzer at Nordex about IP-design
 
Types of Journalistic Writing Grade 8.pptx
Types of Journalistic Writing Grade 8.pptxTypes of Journalistic Writing Grade 8.pptx
Types of Journalistic Writing Grade 8.pptx
 
ENGLISH6-Q4-W3.pptxqurter our high choom
ENGLISH6-Q4-W3.pptxqurter our high choomENGLISH6-Q4-W3.pptxqurter our high choom
ENGLISH6-Q4-W3.pptxqurter our high choom
 
Raw materials used in Herbal Cosmetics.pptx
Raw materials used in Herbal Cosmetics.pptxRaw materials used in Herbal Cosmetics.pptx
Raw materials used in Herbal Cosmetics.pptx
 
Introduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher EducationIntroduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher Education
 
How to do quick user assign in kanban in Odoo 17 ERP
How to do quick user assign in kanban in Odoo 17 ERPHow to do quick user assign in kanban in Odoo 17 ERP
How to do quick user assign in kanban in Odoo 17 ERP
 
Quarter 4 Peace-education.pptx Catch Up Friday
Quarter 4 Peace-education.pptx Catch Up FridayQuarter 4 Peace-education.pptx Catch Up Friday
Quarter 4 Peace-education.pptx Catch Up Friday
 
Framing an Appropriate Research Question 6b9b26d93da94caf993c038d9efcdedb.pdf
Framing an Appropriate Research Question 6b9b26d93da94caf993c038d9efcdedb.pdfFraming an Appropriate Research Question 6b9b26d93da94caf993c038d9efcdedb.pdf
Framing an Appropriate Research Question 6b9b26d93da94caf993c038d9efcdedb.pdf
 

Coimbatore MuleSoft Meetup on SSL and Digital Certificates

  • 1. Coimbatore MuleSoft Meetup Group What is SSL/TLS, What is One-Way SSL & Two-Way SSL? - Secure Network Communication Msg: Meet me at X place Time: 12 PM Alice Bob Msg: Meet me at X place Time: 12 PM
  • 2. Organizers 2 About Organizer: • 10 years of Technical Experience. • 6+ years of Experience in the Integration Domain. • Certified MuleSoft Developer and Architect. • Mule Meetup Speaker. • Coimbatore Mule Meetup Leader Ashish Pardhi Solution Architect, Apisero
  • 3. Organizers 3 About Organizer: • 10+ years of Industry Experience. • 2+ years of Experience in Mulesoft • Certified Technical Instructor at Mulesoft • Integration Architect at NJC Labs. • Coimbatore Mule Meetup Leader. Anoop Ramachandran Integration Architect, NJC LABS
  • 4. Organizers 4 About Organizer: • 3.7 years of Total experience in MuleSoft. • Certified MuleSoft Developer. • Solution Consultant at Apisero. • Coimbatore Mule Meetup Leader. Balkis Sajeena Solution Consultant, Apisero
  • 5. • Both the speaker and host are organizing this meet up in individual capacity, only. We are not representing our companies here. • This presentation is strictly for learning purpose only. Organizer/Presenter do not hold any responsibility that same solution will work for your business requirements also. • This presentation is not meant for any promotional activities. Safe Harbor Statement 5
  • 6. A recording of this meetup will be uploaded to events page within 24 hours. Questions can be submitted/asked at any time in the Chat/Questions & Answers Tab. Make it more Interactive!!! Give us feedback! Rate this meetup session by filling feedback form at the end of the day. We Love Feedbacks!!! Its Bread & Butter for Meetup. Housekeeping 6
  • 7. 1. How to Secure Network Communication? 2. SSL(Secure Socket Layer) 3. Digital Certificate • Signature(Signed and Unsigned) • Digest(SHA-256, MD5) 4. Keys • Private, Public and Session Key 5. Types of Encryption • Symmetric and Asymmetric 6. One-way and Two-way SSL 7. Keystore and Truststore Agenda 7
  • 8. Digital certificates serve as the backbone of internet security. ● Secure Sockets Layer (SSL) certificates, sometimes called digital certificates, are used to establish an encrypted connection between a browser or user's computer and a server or website. ● The SSL connection protects sensitive data, such as credit card information, exchanged during each visit, which is called a session, from being intercepted from non-authorized parties. What is an SSL Certificate? 8
  • 9. Encryption: The data which is transferred between two or more Clients and Server should be encrypted. Authentication: The data to be transferred must be to the correct person or user. Data Integrity: The data over transmission should not be tampered or changed. SSL works on three basic principles 9
  • 10. Encryption 10 Msg: Meet me at X place Time: 12 PM Alice Bob Msg: Meet me at X place Time: 12 PM I know Alice’s Public Key I am encrypting with my Private Key Symmetric - Same Key Asymmetric - Different Set of Keys
  • 11. Data Integrity – Digital Signature 11 Msg: Meet me at X place Time: 12 PM Alice Bob Msg: Meet me at X place Time: 12 PM Original Msg ------------------------------------------------------------- Encrypt(Digest(Original Msg), Alice’s Priv Key) Digest(Original Msg) ------------------------------------------------------------------------------------------------ Decrypt(Encrypt(Digest(Original Msg), Alice’s Priv Key), Alice’s Pub Key) abc1234xyz ------------------ abc1234xyz I have received correct Message Signature of Alice
  • 12. 12 Msg: Meet me at X place Time: 12 PM Alice Bob Msg: Lets Meet at My Home Time: 12 PM Hunter Data Integrity Intercepted Msg ------------------------------------------------------------- Encrypt(Digest(Intercepted Msg), Hunter’s Priv Key) Digest(Intercepted Msg) ------------------------------------------------------------------------------------------------ Decrypt(Encrypt(Digest(Intercepted Msg), Hunter’s Priv Key), Alice’s Pub Key) abc1234xyz ------------------ ~!$#%&^*()# I have to reject this Message
  • 13. Digital Certificate 13 I am Mulesoft.com Alice Bob Original Msg ------------------------------------------------------------- Encrypt(Digest(Original Msg), CA’s Priv Key) Digest(Original Msg) ------------------------------------------------------------------------------------------------ Decrypt(Encrypt(Digest(Original Msg), CA’s Priv Key), CA’s Pub Key) abc1234xyz ------------------ abc1234xyz Right Sender confirmed with help CA’s Pub Key I am Mulesoft.com
  • 14. Keystore and Truststore – JCEKS, PKCS12, JKS 14 Alice Bob Alice’s Truststore Bob’s Truststore Alice’s Keystore Bob’s Keystore Alias Privat e Key Pub Cert Alias Privat e Key Pub Cert Alias Pub Cert Alias Pub Cert
  • 15.  keytool -genKey -alias myserver -keystore serverkeystore.jks -storetype jks -keypass password - storepass password -keyalg RSA  keytool -genKey -alias myclient -keystore clientkeystore.jks -storetype jks -keypass password - storepass password -keyalg RSA  keytool -exportcert -alias myserver -keystore serverkeystore.jks -file servercert.cer -storepass password  keytool -exportcert -alias myclient -keystore clientkeystore.jks -file clientcert.cer -storepass password  keytool -importcert -keystore servertruststore.jks -file clientcert.cer -alias myclient -storepass password -trustcacerts  keytool -importcert -keystore clienttruststore.jks -file servercert.cer -alias myserver -storepass password -trustcacerts Generate Keystore and Truststore - Keytool 15
  • 16.  keytool -certreq -keystore <keystore-name>.jks -alias <key-alias> -file <certificate-name>.csr  keytool -import -keystore <keystore-name>.jks -alias <cert-alias> -file <signed_certificate_file> Request Signing by a Certification Authority 16
  • 17. • Basically, the browser works on One-Way SSL authentication mechanism, Where the Client verifies/validates the server certificate with the list of CA's certification authority. • There are three keys are used to set up the SSL connection: – Public key – Private key – Session key SSL(Secure Sockets Layer) HANDSHAKE 17
  • 18. • One-Way SSL – In this method only client going to verifies, server certificates with the List of CA's certification authority. Two different ways to make SSL connection 18 • Two-Way SSL – In this method, both client and server verify, each other certificates with the list of CA's certification authority.
  • 19. One-Way SSL authentication 19 Client request for secured connection Client sends Session Key + Public Key Server returns public certificate + public key Server decrypts the session key & starts the session
  • 20. Two-Way SSL authentication 20 Client request for secured connection Client sends public cert + Session Key + Public Key Server returns public certificate + public key Server decrypts the session key & starts the session
  • 21. Demo ● Generating Keys and Certificate ● One-way SSL ● Two-way SSL
  • 22. Q&A
  • 23. Get ready to WIN a Special Gift from MuleSoft Community Quiz Time
  • 24. ❖ You should not be a meetup leader. ❖ In last 30 days you shouldn’t own any trivia quiz in any meetup. Important Instructions for the attendees to play Trivia quiz
  • 25. 1. Log in to www.kahoot.it via your mobile phone 2. Click on “Play” on top right hand side of the web page 3. Enter the game pin that is displayed on the quiz master’s screen 4. Give your complete name as the nickname 5. You will be getting your questions on your laptop screen with option. 6. For every questions you will get 20
  • 26. 26 Share: ○ Tweet your pictures using the hashtag #CoimbatoreMuleSoftMeetup ○ Invite your network to join: https://meetups.mulesoft.com/coimbatore/ Feedback: ○ Fill out the survey feedback and suggest topics for upcoming events ○ Contact MuleSoft at meetups@mulesoft.com for ways to improve the program What’s next?
  • 27. 27 Anypoint Platform CLI On Sat, July 17, 11.00 AM (IST) by Jivan Nalavade Lead Engineer, Apisero https://meetups.mulesoft.com/events/details/mulesoft-coimbatore-presents-anypoint-platform-cli/ Next Meetups