SlideShare a Scribd company logo
27th November 2021
Calicut MuleSoft Meetup Group
#6 Demystifying Custom Policies in Mule
Safe Harbour Statement
● Both the speaker and the host are organizing this meet-up in individual capacity only. We are
not representing our companies here.
● This presentation is strictly for learning purposes only. Organizer/Presenter do not hold any
responsibility that same solution will work for your business requirements.
● This presentation is not meant for any promotional activities.
2
Organizers
Fathima Farzana John Mathew Philip
NJC Labs NJC Labs
MuleSoft / Integration Developer MuleSoft / Integration
Developer
3
Agenda
● Introduction
● Feature Presentation - Custom Policies in Mule 4
● Demo
● Wrap-Up and Trivia Quiz
4
5
6
7
Speaker
Demystifying Custom Policies
9
API Security
10
API Attacks
● Injection Attacks
● DoS/DDoS Attacks
● Authentication Hijacking
● Data Exposure
● Parameter Tampering
● Man in the Middle (MitM)
● Unencrypted Communications
● Application Abuse
11
Security Topology By MuleSoft
12
Policy Categories
● Compliance
● Security
● Quality of Service
● Transformation
● Troubleshooting
● Custom
13
Policy Level
● Resource Level Policy
14
Policy Types
● Default Policies
● Automated Policies
● Custom Policies
-Online Custom Policies
Offline Custom Policies
15
16
17
● Basic Authentication – LDAP – Authenticates the LDAP credentials.
● Basic Authentication – Simple – Authenticates a single user password.
● Client ID Enforcement – Allows access to client applications with valid client
credentials.
● CORS – Enables calls executed in a web page to interact with resources
from different domains.
● Detokenization –Transforms a tokenized value back to the original data.
Policies
18
● Header Injection – Adds headers to the request or response message of a
policy.
● Header Removal – Removes headers from the request or response message
of a policy.
● HTTP Caching – Stores HTTP responses from an API implementation.
● IP Blacklist – Blocks a range of IP addresses.
● IP Whitelist – Allows access from only a preapproved range of IP addresses.
● JSON Threat Protection – Protects against a malicious JSON structure in API
requests.
Policies
19
● JWT – Validates a JWT token.
● Message Logging – Logs a custom message when an API is invoked.
● OAuth 2.0 Access Token Enforcement Using Mule OAuth Provider Policy –
Enforces token access using the MuleSoft OAuth Provider policy.
● OpenAM Access Token Enforcement – Restricts access to a protected
resource using an Open AM authentication server.
● PingFederate Access Token Enforcement – Restricts access to a protected
resource using the PingFederate authentication server.
Policies
20
● Rate Limiting – Enables imposing a limit on the number of requests that an
API can accept within a specified time.
● Rate Limiting, SLA-Based – Enables imposing an API request limit based on
SLA tiers.
● Spike Control – Controls API traffic.
● Tokenization –Transforms sensitive data into non-sensitive equivalent tokens.
● XML Threat Protection –Protects against malicious XML elements in API
requests.
Policies
21
● What is a custom policy?
● When to use a custom policy?
Custom Policies
22
The current workflow to get a working policy for Mule 4 that can be applied in
Anypoint Platform consists of:
1. Develop the policy.
2. Package the policy.
3. Upload the resulting policy assets to Exchange.
4. Apply the policy to any API through API Manager.
Procedure to create a custom policy
23
In order to start building custom policy all you need is
● Anypoint Studio
● Anypoint Platform account
● Maven installed on your local machine
Prerequisite
24
1. Configure your settings.xml
2. Create Custom policy
3. Import into Anypoint Studio
4. Publish to Exchange
5. Apply the policy to your API
Steps involved
DEMO
26
○ pom.xml
○ mule-artifact.json exists for the mule-maven-plugin
○ my-custom-policy.yaml renders the policy configuration UI.
○ template.xml where the actual logic of the policy and Mule configuration that
defines the policy behavior.
File Configurations
27
XML Structure
28
Order of Execution I
Policy A Policy B
29
● Now if we have a mule flow F1, with an http listener as the source, in that
case the order of execution of the policies will be
A1 - B1 - <Mule Flow F1> - B2 - A2
● We can control the order of execution with the help of
<http-policy:execute-next/>
30
31
● Policies can be applied to outbound HTTP Requests within a flow as well.
● This capability enables policies to inject additional headers and other
information into outbound HTTP traffic through an HTTP Requester defined
in a flow
● The http-policy:operation block allows a policy to inject code before Mule
execution reaches an HTTP Requester and after an HTTP Requester returns
an HTTP response.
Outbound policies
32
Order of Execution II
Policy A Policy B
33
Flow F
Order of Execution II
34
1. First all the elements before policy executes
2. Flow with http listener
3. Policy execution part before calling out the http requestor
4. Policy execution part after calling out the http requestor
5. Policy termination in the lower order of policies
<A1> → <B1> → <F1> → <A3> → <B3> → <http:requester> → <B4> → <A4>
→ <F2> → <B2> → <A2>
Order of Execution II
35
Mule 4 policies can handle errors thrown by
1. The policy
2. A flow within the Mule application
3. Other policies
Error Handling
36
In order to execute error-handling, we can use two elements -
● try
● error-handler elements.
Error Handling
37
Error Handling
Policy P Flow F
38
What happens when -
● <F1> raises an error - <P1> → <F1> → <FEH> → <P2>
● <P1> raises an error - <P1> → <PEH>
● Flow’s error handler propagates errors - <P1> → <F1> → <FEH> → <PEH>
Error Handling Scenarios
39
Source policies
● Within the http-policy:source tag, set the attribute
propagateMessageTransformations to true to enable propagation.
● Any modification to a Mule Message made after the http-policy:execute-next
element, will continue propagation throughout the rest of the Mule event
processing chain.
Operation policies
● It is similar to source policies but in the opposite direction.
● In operation policies, modifications made before the execute-next element
are always propagated. Modifications made after the execute-next element,
are not propagated by default.
Message propogation
40
Policy’s UI Configuration
41
● Text box
● Radio button
● Check box
Parameter Type
42
○ String: Any string expected.
○ Expression: A DataWeave expression starting with #[ and finished with ] is
expected.
○ Boolean: true or false.
○ Int: A number is expected. This type requires additional properties
○ Radio: One value of a group of options. This type requires additional
properties- minimum and maximum value
○ Keyvalues: Collection of Key-Value pairs.
Additional Configurations
43
YAML Configuration
44
● A templating engine for resolving the configurable parameters of the policy
and implementing semantic logic, such as conditionals.
● Each policy parameter defined in a YAML Configuration file will be available
as a HandleBars variable for resolving the final policy configuration
● Handlebars is an extension of Mustache, which was used in earlier versions
of Mule policies
HandleBars variable
QnA
Thank you
Trivia Quiz
48
1. Which file is responsible for custom policy's configuration UI
a. pom.xml
b. mule artifact.json
c. custom-policy.yaml
d. template.xml
49
2. Which xml element helps us to control the order of execution
a. <http-policy:execute-next/>
b.<http-policy:proxy/>
c.<http-policy:source/>
d.<mule/>
50
3. What is a templating engine for resolving the configurable parameters of the policy
and implementing semantic logic, such as conditionals.
a. mule flow
b. UI configurations
c. handle bars
d. pom.xml
51
● Share:
○ Tweet using the hashtag #MuleSoftMeetups and #CalicutMuleSoftMeetups
○ Invite your network to join: https://meetups.mulesoft.com/calicut/
● Feedback:
○ Fill out the survey feedback and suggest topics for upcoming events
○ Contact MuleSoft at meetups@mulesoft.com for ways to improve the program
What’s next?
Thank you

More Related Content

What's hot

MuleSoft Anypoint Platform and Three Tier Architecture
MuleSoft Anypoint  Platform and Three Tier ArchitectureMuleSoft Anypoint  Platform and Three Tier Architecture
MuleSoft Anypoint Platform and Three Tier Architecture
Harish Kumar
 
Manchester MuleSoft Meetup #6 - Runtime Fabric with Mulesoft
Manchester MuleSoft Meetup #6 - Runtime Fabric with Mulesoft Manchester MuleSoft Meetup #6 - Runtime Fabric with Mulesoft
Manchester MuleSoft Meetup #6 - Runtime Fabric with Mulesoft
Akshata Sawant
 
Learn More About Object Store | MuleSoft Mysore Meetup #9
Learn More About Object Store | MuleSoft Mysore Meetup #9Learn More About Object Store | MuleSoft Mysore Meetup #9
Learn More About Object Store | MuleSoft Mysore Meetup #9
MysoreMuleSoftMeetup
 
10 things to consider when planning your Mule 4 migration
10 things to consider when planning your Mule 4 migration10 things to consider when planning your Mule 4 migration
10 things to consider when planning your Mule 4 migration
Coforge (Erstwhile WHISHWORKS)
 
Microservices on Anypoint Platform
Microservices on Anypoint PlatformMicroservices on Anypoint Platform
Microservices on Anypoint Platform
MuleSoft
 
MuleSoft Architecture Presentation
MuleSoft Architecture PresentationMuleSoft Architecture Presentation
MuleSoft Architecture Presentation
Rupesh Sinha
 
Introduction to CloudHub 2.0
Introduction to CloudHub 2.0Introduction to CloudHub 2.0
Introduction to CloudHub 2.0
NeerajKumar1965
 
Distributed Locking in Mule
Distributed Locking in MuleDistributed Locking in Mule
Distributed Locking in Mule
Sunil Kumar
 
MuleSoft Surat Meetup#41 - Universal API Management, Anypoint Flex Gateway an...
MuleSoft Surat Meetup#41 - Universal API Management, Anypoint Flex Gateway an...MuleSoft Surat Meetup#41 - Universal API Management, Anypoint Flex Gateway an...
MuleSoft Surat Meetup#41 - Universal API Management, Anypoint Flex Gateway an...
Jitendra Bafna
 
Denver MuleSoft Meetup: Deep Dive into Anypoint Runtime Fabric Security
Denver MuleSoft Meetup: Deep Dive into Anypoint Runtime Fabric Security Denver MuleSoft Meetup: Deep Dive into Anypoint Runtime Fabric Security
Denver MuleSoft Meetup: Deep Dive into Anypoint Runtime Fabric Security
Stephanie Lawrence
 
Designing and building Mule applications
Designing and building Mule applicationsDesigning and building Mule applications
Designing and building Mule applications
MuleSoft
 
MuleSoft Surat Virtual Meetup#21 - MuleSoft API and RAML Design Best Practice...
MuleSoft Surat Virtual Meetup#21 - MuleSoft API and RAML Design Best Practice...MuleSoft Surat Virtual Meetup#21 - MuleSoft API and RAML Design Best Practice...
MuleSoft Surat Virtual Meetup#21 - MuleSoft API and RAML Design Best Practice...
Jitendra Bafna
 
Mulesoft Meetup Roma - CloudHub 2.0: a fully managed, containerized integrati...
Mulesoft Meetup Roma - CloudHub 2.0: a fully managed, containerized integrati...Mulesoft Meetup Roma - CloudHub 2.0: a fully managed, containerized integrati...
Mulesoft Meetup Roma - CloudHub 2.0: a fully managed, containerized integrati...
Alfonso Martino
 
A comprehensive guide to mule soft mule 4
A comprehensive guide to mule soft mule 4A comprehensive guide to mule soft mule 4
A comprehensive guide to mule soft mule 4
pruthviraj krishnam
 
Custom policies in mule 4 and a circuit breaker example
Custom policies in mule 4 and a circuit breaker exampleCustom policies in mule 4 and a circuit breaker example
Custom policies in mule 4 and a circuit breaker example
Royston Lobo
 
Cloudhub 2.0
Cloudhub 2.0Cloudhub 2.0
Cloudhub 2.0
Christopher Co
 
Benefits of integration with the Mulesoft Anypoint Platform
Benefits of integration with the Mulesoft Anypoint PlatformBenefits of integration with the Mulesoft Anypoint Platform
Benefits of integration with the Mulesoft Anypoint Platform
Cloud Analogy
 
Introduction to MuleSoft
Introduction to MuleSoftIntroduction to MuleSoft
Introduction to MuleSoft
Salesforce Developers
 
Load balancer in mule
Load balancer in muleLoad balancer in mule
Load balancer in mule
Ramakrishna kapa
 
How to Send IDOC to SAP using MuleSoft
How to Send IDOC to SAP using MuleSoftHow to Send IDOC to SAP using MuleSoft
How to Send IDOC to SAP using MuleSoft
Arul ChristhuRaj Alphonse
 

What's hot (20)

MuleSoft Anypoint Platform and Three Tier Architecture
MuleSoft Anypoint  Platform and Three Tier ArchitectureMuleSoft Anypoint  Platform and Three Tier Architecture
MuleSoft Anypoint Platform and Three Tier Architecture
 
Manchester MuleSoft Meetup #6 - Runtime Fabric with Mulesoft
Manchester MuleSoft Meetup #6 - Runtime Fabric with Mulesoft Manchester MuleSoft Meetup #6 - Runtime Fabric with Mulesoft
Manchester MuleSoft Meetup #6 - Runtime Fabric with Mulesoft
 
Learn More About Object Store | MuleSoft Mysore Meetup #9
Learn More About Object Store | MuleSoft Mysore Meetup #9Learn More About Object Store | MuleSoft Mysore Meetup #9
Learn More About Object Store | MuleSoft Mysore Meetup #9
 
10 things to consider when planning your Mule 4 migration
10 things to consider when planning your Mule 4 migration10 things to consider when planning your Mule 4 migration
10 things to consider when planning your Mule 4 migration
 
Microservices on Anypoint Platform
Microservices on Anypoint PlatformMicroservices on Anypoint Platform
Microservices on Anypoint Platform
 
MuleSoft Architecture Presentation
MuleSoft Architecture PresentationMuleSoft Architecture Presentation
MuleSoft Architecture Presentation
 
Introduction to CloudHub 2.0
Introduction to CloudHub 2.0Introduction to CloudHub 2.0
Introduction to CloudHub 2.0
 
Distributed Locking in Mule
Distributed Locking in MuleDistributed Locking in Mule
Distributed Locking in Mule
 
MuleSoft Surat Meetup#41 - Universal API Management, Anypoint Flex Gateway an...
MuleSoft Surat Meetup#41 - Universal API Management, Anypoint Flex Gateway an...MuleSoft Surat Meetup#41 - Universal API Management, Anypoint Flex Gateway an...
MuleSoft Surat Meetup#41 - Universal API Management, Anypoint Flex Gateway an...
 
Denver MuleSoft Meetup: Deep Dive into Anypoint Runtime Fabric Security
Denver MuleSoft Meetup: Deep Dive into Anypoint Runtime Fabric Security Denver MuleSoft Meetup: Deep Dive into Anypoint Runtime Fabric Security
Denver MuleSoft Meetup: Deep Dive into Anypoint Runtime Fabric Security
 
Designing and building Mule applications
Designing and building Mule applicationsDesigning and building Mule applications
Designing and building Mule applications
 
MuleSoft Surat Virtual Meetup#21 - MuleSoft API and RAML Design Best Practice...
MuleSoft Surat Virtual Meetup#21 - MuleSoft API and RAML Design Best Practice...MuleSoft Surat Virtual Meetup#21 - MuleSoft API and RAML Design Best Practice...
MuleSoft Surat Virtual Meetup#21 - MuleSoft API and RAML Design Best Practice...
 
Mulesoft Meetup Roma - CloudHub 2.0: a fully managed, containerized integrati...
Mulesoft Meetup Roma - CloudHub 2.0: a fully managed, containerized integrati...Mulesoft Meetup Roma - CloudHub 2.0: a fully managed, containerized integrati...
Mulesoft Meetup Roma - CloudHub 2.0: a fully managed, containerized integrati...
 
A comprehensive guide to mule soft mule 4
A comprehensive guide to mule soft mule 4A comprehensive guide to mule soft mule 4
A comprehensive guide to mule soft mule 4
 
Custom policies in mule 4 and a circuit breaker example
Custom policies in mule 4 and a circuit breaker exampleCustom policies in mule 4 and a circuit breaker example
Custom policies in mule 4 and a circuit breaker example
 
Cloudhub 2.0
Cloudhub 2.0Cloudhub 2.0
Cloudhub 2.0
 
Benefits of integration with the Mulesoft Anypoint Platform
Benefits of integration with the Mulesoft Anypoint PlatformBenefits of integration with the Mulesoft Anypoint Platform
Benefits of integration with the Mulesoft Anypoint Platform
 
Introduction to MuleSoft
Introduction to MuleSoftIntroduction to MuleSoft
Introduction to MuleSoft
 
Load balancer in mule
Load balancer in muleLoad balancer in mule
Load balancer in mule
 
How to Send IDOC to SAP using MuleSoft
How to Send IDOC to SAP using MuleSoftHow to Send IDOC to SAP using MuleSoft
How to Send IDOC to SAP using MuleSoft
 

Similar to #6 Calicut MuleSoft Meetup : Demystyfying Custom Policies in Mule

Handling NFRs for the API through API policies (Custom Policies) -Part 2 | Mu...
Handling NFRs for the API through API policies (Custom Policies) -Part 2 | Mu...Handling NFRs for the API through API policies (Custom Policies) -Part 2 | Mu...
Handling NFRs for the API through API policies (Custom Policies) -Part 2 | Mu...
MysoreMuleSoftMeetup
 
12th Manila MuleSoft Meetup May 2022
12th Manila MuleSoft Meetup May 202212th Manila MuleSoft Meetup May 2022
12th Manila MuleSoft Meetup May 2022
Ryan Anthony Andal
 
Handling NFRs for the API through OoTB API policies Part-1 | MuleSoft Mysore ...
Handling NFRs for the API through OoTB API policies Part-1 | MuleSoft Mysore ...Handling NFRs for the API through OoTB API policies Part-1 | MuleSoft Mysore ...
Handling NFRs for the API through OoTB API policies Part-1 | MuleSoft Mysore ...
MysoreMuleSoftMeetup
 
Anypoint API Manager Custom Policies & Best Practices
Anypoint API Manager Custom Policies & Best PracticesAnypoint API Manager Custom Policies & Best Practices
Anypoint API Manager Custom Policies & Best Practices
MuleSoft Meetups
 
How to Secure Mule API's With a Demo
How to Secure Mule API's With a DemoHow to Secure Mule API's With a Demo
How to Secure Mule API's With a Demo
ManjuKumara GH
 
Warsaw MuleSoft Meetup #7 - custom policy
Warsaw MuleSoft Meetup #7 - custom policyWarsaw MuleSoft Meetup #7 - custom policy
Warsaw MuleSoft Meetup #7 - custom policy
Patryk Bandurski
 
Meetup slide api_design_custom_poicies_in_mule4
Meetup slide api_design_custom_poicies_in_mule4Meetup slide api_design_custom_poicies_in_mule4
Meetup slide api_design_custom_poicies_in_mule4
AnuragSharma900
 
MuleSoft_Meetup_Brisbane_2022-06-01_SonarQube_CataloguingAPIs.pptx
MuleSoft_Meetup_Brisbane_2022-06-01_SonarQube_CataloguingAPIs.pptxMuleSoft_Meetup_Brisbane_2022-06-01_SonarQube_CataloguingAPIs.pptx
MuleSoft_Meetup_Brisbane_2022-06-01_SonarQube_CataloguingAPIs.pptx
BrianFraser29
 
MuleSoft Surat Virtual Meetup#3 - Anypoint Custom Policies, API Manager (Prox...
MuleSoft Surat Virtual Meetup#3 - Anypoint Custom Policies, API Manager (Prox...MuleSoft Surat Virtual Meetup#3 - Anypoint Custom Policies, API Manager (Prox...
MuleSoft Surat Virtual Meetup#3 - Anypoint Custom Policies, API Manager (Prox...
Jitendra Bafna
 
Custom policies columbus ohio mulesoft meetup
Custom policies columbus ohio mulesoft meetupCustom policies columbus ohio mulesoft meetup
Custom policies columbus ohio mulesoft meetup
MuleSoft Meetup
 
[Madrid-Meetup Octubre 22] Seguridad fuerte como el vinagre de Jerez. Políti...
[Madrid-Meetup Octubre 22] Seguridad fuerte como el vinagre de Jerez. Políti...[Madrid-Meetup Octubre 22] Seguridad fuerte como el vinagre de Jerez. Políti...
[Madrid-Meetup Octubre 22] Seguridad fuerte como el vinagre de Jerez. Políti...
jorgelebrato
 
MuleSoft Meetup | Reading Meetup Group | Hosted by Integral Zone
MuleSoft Meetup | Reading Meetup Group | Hosted by Integral ZoneMuleSoft Meetup | Reading Meetup Group | Hosted by Integral Zone
MuleSoft Meetup | Reading Meetup Group | Hosted by Integral Zone
IntegralZone
 
Princeton-NJ-Meetup-Troubleshooting-with-AnyPoint-Monitoring
Princeton-NJ-Meetup-Troubleshooting-with-AnyPoint-MonitoringPrinceton-NJ-Meetup-Troubleshooting-with-AnyPoint-Monitoring
Princeton-NJ-Meetup-Troubleshooting-with-AnyPoint-Monitoring
Sravan Lingam
 
MuleSoft Meetup Charlotte 2019 - Dec 10
MuleSoft Meetup Charlotte  2019 - Dec 10MuleSoft Meetup Charlotte  2019 - Dec 10
MuleSoft Meetup Charlotte 2019 - Dec 10
Subhash Patel
 
Mule soft riyadh virtual meetup_30_aug
Mule soft riyadh virtual meetup_30_augMule soft riyadh virtual meetup_30_aug
Mule soft riyadh virtual meetup_30_aug
satyasekhar123
 
Toronto Virtual Meetup #5 - API Security and Threats
Toronto Virtual Meetup #5 - API Security and ThreatsToronto Virtual Meetup #5 - API Security and Threats
Toronto Virtual Meetup #5 - API Security and Threats
Alexandra N. Martinez
 
Understanding firewall-policies-their-effectiveness-in-defending-against-netw...
Understanding firewall-policies-their-effectiveness-in-defending-against-netw...Understanding firewall-policies-their-effectiveness-in-defending-against-netw...
Understanding firewall-policies-their-effectiveness-in-defending-against-netw...
ManageEngine, Zoho Corporation
 
Manila MuleSoft Meetup - September 2018
Manila MuleSoft Meetup - September 2018Manila MuleSoft Meetup - September 2018
Manila MuleSoft Meetup - September 2018
Ryan Anthony Andal
 
Ahmedabad MuleSoft 3rd Meetup
Ahmedabad MuleSoft 3rd Meetup Ahmedabad MuleSoft 3rd Meetup
Ahmedabad MuleSoft 3rd Meetup
Rajesh Maheshwari
 
Bangalore mulesoft meetup#10
Bangalore mulesoft meetup#10Bangalore mulesoft meetup#10
Bangalore mulesoft meetup#10
D.Rajesh Kumar
 

Similar to #6 Calicut MuleSoft Meetup : Demystyfying Custom Policies in Mule (20)

Handling NFRs for the API through API policies (Custom Policies) -Part 2 | Mu...
Handling NFRs for the API through API policies (Custom Policies) -Part 2 | Mu...Handling NFRs for the API through API policies (Custom Policies) -Part 2 | Mu...
Handling NFRs for the API through API policies (Custom Policies) -Part 2 | Mu...
 
12th Manila MuleSoft Meetup May 2022
12th Manila MuleSoft Meetup May 202212th Manila MuleSoft Meetup May 2022
12th Manila MuleSoft Meetup May 2022
 
Handling NFRs for the API through OoTB API policies Part-1 | MuleSoft Mysore ...
Handling NFRs for the API through OoTB API policies Part-1 | MuleSoft Mysore ...Handling NFRs for the API through OoTB API policies Part-1 | MuleSoft Mysore ...
Handling NFRs for the API through OoTB API policies Part-1 | MuleSoft Mysore ...
 
Anypoint API Manager Custom Policies & Best Practices
Anypoint API Manager Custom Policies & Best PracticesAnypoint API Manager Custom Policies & Best Practices
Anypoint API Manager Custom Policies & Best Practices
 
How to Secure Mule API's With a Demo
How to Secure Mule API's With a DemoHow to Secure Mule API's With a Demo
How to Secure Mule API's With a Demo
 
Warsaw MuleSoft Meetup #7 - custom policy
Warsaw MuleSoft Meetup #7 - custom policyWarsaw MuleSoft Meetup #7 - custom policy
Warsaw MuleSoft Meetup #7 - custom policy
 
Meetup slide api_design_custom_poicies_in_mule4
Meetup slide api_design_custom_poicies_in_mule4Meetup slide api_design_custom_poicies_in_mule4
Meetup slide api_design_custom_poicies_in_mule4
 
MuleSoft_Meetup_Brisbane_2022-06-01_SonarQube_CataloguingAPIs.pptx
MuleSoft_Meetup_Brisbane_2022-06-01_SonarQube_CataloguingAPIs.pptxMuleSoft_Meetup_Brisbane_2022-06-01_SonarQube_CataloguingAPIs.pptx
MuleSoft_Meetup_Brisbane_2022-06-01_SonarQube_CataloguingAPIs.pptx
 
MuleSoft Surat Virtual Meetup#3 - Anypoint Custom Policies, API Manager (Prox...
MuleSoft Surat Virtual Meetup#3 - Anypoint Custom Policies, API Manager (Prox...MuleSoft Surat Virtual Meetup#3 - Anypoint Custom Policies, API Manager (Prox...
MuleSoft Surat Virtual Meetup#3 - Anypoint Custom Policies, API Manager (Prox...
 
Custom policies columbus ohio mulesoft meetup
Custom policies columbus ohio mulesoft meetupCustom policies columbus ohio mulesoft meetup
Custom policies columbus ohio mulesoft meetup
 
[Madrid-Meetup Octubre 22] Seguridad fuerte como el vinagre de Jerez. Políti...
[Madrid-Meetup Octubre 22] Seguridad fuerte como el vinagre de Jerez. Políti...[Madrid-Meetup Octubre 22] Seguridad fuerte como el vinagre de Jerez. Políti...
[Madrid-Meetup Octubre 22] Seguridad fuerte como el vinagre de Jerez. Políti...
 
MuleSoft Meetup | Reading Meetup Group | Hosted by Integral Zone
MuleSoft Meetup | Reading Meetup Group | Hosted by Integral ZoneMuleSoft Meetup | Reading Meetup Group | Hosted by Integral Zone
MuleSoft Meetup | Reading Meetup Group | Hosted by Integral Zone
 
Princeton-NJ-Meetup-Troubleshooting-with-AnyPoint-Monitoring
Princeton-NJ-Meetup-Troubleshooting-with-AnyPoint-MonitoringPrinceton-NJ-Meetup-Troubleshooting-with-AnyPoint-Monitoring
Princeton-NJ-Meetup-Troubleshooting-with-AnyPoint-Monitoring
 
MuleSoft Meetup Charlotte 2019 - Dec 10
MuleSoft Meetup Charlotte  2019 - Dec 10MuleSoft Meetup Charlotte  2019 - Dec 10
MuleSoft Meetup Charlotte 2019 - Dec 10
 
Mule soft riyadh virtual meetup_30_aug
Mule soft riyadh virtual meetup_30_augMule soft riyadh virtual meetup_30_aug
Mule soft riyadh virtual meetup_30_aug
 
Toronto Virtual Meetup #5 - API Security and Threats
Toronto Virtual Meetup #5 - API Security and ThreatsToronto Virtual Meetup #5 - API Security and Threats
Toronto Virtual Meetup #5 - API Security and Threats
 
Understanding firewall-policies-their-effectiveness-in-defending-against-netw...
Understanding firewall-policies-their-effectiveness-in-defending-against-netw...Understanding firewall-policies-their-effectiveness-in-defending-against-netw...
Understanding firewall-policies-their-effectiveness-in-defending-against-netw...
 
Manila MuleSoft Meetup - September 2018
Manila MuleSoft Meetup - September 2018Manila MuleSoft Meetup - September 2018
Manila MuleSoft Meetup - September 2018
 
Ahmedabad MuleSoft 3rd Meetup
Ahmedabad MuleSoft 3rd Meetup Ahmedabad MuleSoft 3rd Meetup
Ahmedabad MuleSoft 3rd Meetup
 
Bangalore mulesoft meetup#10
Bangalore mulesoft meetup#10Bangalore mulesoft meetup#10
Bangalore mulesoft meetup#10
 

More from JohnMathewPhilip

#9 Calicut MuleSoft Meetup - Munits in Mule 4.pptx
#9 Calicut MuleSoft Meetup - Munits in Mule 4.pptx#9 Calicut MuleSoft Meetup - Munits in Mule 4.pptx
#9 Calicut MuleSoft Meetup - Munits in Mule 4.pptx
JohnMathewPhilip
 
#5-Calicut-MuleSoft-Meetup-User-Management-in-AnypointPlatform
#5-Calicut-MuleSoft-Meetup-User-Management-in-AnypointPlatform#5-Calicut-MuleSoft-Meetup-User-Management-in-AnypointPlatform
#5-Calicut-MuleSoft-Meetup-User-Management-in-AnypointPlatform
JohnMathewPhilip
 
#4 Calicut MuleSoft Meetup - Message Resequencing in Mule
#4 Calicut MuleSoft Meetup - Message Resequencing in Mule#4 Calicut MuleSoft Meetup - Message Resequencing in Mule
#4 Calicut MuleSoft Meetup - Message Resequencing in Mule
JohnMathewPhilip
 
#3 calicut meetup - understanding slb, dlb and web sockets
#3   calicut meetup - understanding slb, dlb and web sockets#3   calicut meetup - understanding slb, dlb and web sockets
#3 calicut meetup - understanding slb, dlb and web sockets
JohnMathewPhilip
 
#2 connected apps_calicut_31_july
#2 connected apps_calicut_31_july#2 connected apps_calicut_31_july
#2 connected apps_calicut_31_july
JohnMathewPhilip
 
#1 Calicut MuleSoft Meetup - Introduction to Enterprise Integration and MuleSoft
#1 Calicut MuleSoft Meetup - Introduction to Enterprise Integration and MuleSoft#1 Calicut MuleSoft Meetup - Introduction to Enterprise Integration and MuleSoft
#1 Calicut MuleSoft Meetup - Introduction to Enterprise Integration and MuleSoft
JohnMathewPhilip
 

More from JohnMathewPhilip (6)

#9 Calicut MuleSoft Meetup - Munits in Mule 4.pptx
#9 Calicut MuleSoft Meetup - Munits in Mule 4.pptx#9 Calicut MuleSoft Meetup - Munits in Mule 4.pptx
#9 Calicut MuleSoft Meetup - Munits in Mule 4.pptx
 
#5-Calicut-MuleSoft-Meetup-User-Management-in-AnypointPlatform
#5-Calicut-MuleSoft-Meetup-User-Management-in-AnypointPlatform#5-Calicut-MuleSoft-Meetup-User-Management-in-AnypointPlatform
#5-Calicut-MuleSoft-Meetup-User-Management-in-AnypointPlatform
 
#4 Calicut MuleSoft Meetup - Message Resequencing in Mule
#4 Calicut MuleSoft Meetup - Message Resequencing in Mule#4 Calicut MuleSoft Meetup - Message Resequencing in Mule
#4 Calicut MuleSoft Meetup - Message Resequencing in Mule
 
#3 calicut meetup - understanding slb, dlb and web sockets
#3   calicut meetup - understanding slb, dlb and web sockets#3   calicut meetup - understanding slb, dlb and web sockets
#3 calicut meetup - understanding slb, dlb and web sockets
 
#2 connected apps_calicut_31_july
#2 connected apps_calicut_31_july#2 connected apps_calicut_31_july
#2 connected apps_calicut_31_july
 
#1 Calicut MuleSoft Meetup - Introduction to Enterprise Integration and MuleSoft
#1 Calicut MuleSoft Meetup - Introduction to Enterprise Integration and MuleSoft#1 Calicut MuleSoft Meetup - Introduction to Enterprise Integration and MuleSoft
#1 Calicut MuleSoft Meetup - Introduction to Enterprise Integration and MuleSoft
 

Recently uploaded

Epistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI supportEpistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI support
Alan Dix
 
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdfFIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance
 
Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........
Alison B. Lowndes
 
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
Product School
 
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Product School
 
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
James Anderson
 
Leading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdfLeading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdf
OnBoard
 
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Jeffrey Haguewood
 
Accelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish CachingAccelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish Caching
Thijs Feryn
 
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdfFIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance
 
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
Product School
 
Elevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object CalisthenicsElevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object Calisthenics
Dorra BARTAGUIZ
 
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Albert Hoitingh
 
DevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA ConnectDevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA Connect
Kari Kakkonen
 
Assuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyesAssuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyes
ThousandEyes
 
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
UiPathCommunity
 
PCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase TeamPCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase Team
ControlCase
 
Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...
Product School
 
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdfFIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance
 
The Future of Platform Engineering
The Future of Platform EngineeringThe Future of Platform Engineering
The Future of Platform Engineering
Jemma Hussein Allen
 

Recently uploaded (20)

Epistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI supportEpistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI support
 
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdfFIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdf
 
Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........
 
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
 
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
 
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
 
Leading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdfLeading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdf
 
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
 
Accelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish CachingAccelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish Caching
 
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdfFIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
 
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
 
Elevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object CalisthenicsElevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object Calisthenics
 
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
 
DevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA ConnectDevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA Connect
 
Assuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyesAssuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyes
 
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
 
PCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase TeamPCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase Team
 
Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...
 
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdfFIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
 
The Future of Platform Engineering
The Future of Platform EngineeringThe Future of Platform Engineering
The Future of Platform Engineering
 

#6 Calicut MuleSoft Meetup : Demystyfying Custom Policies in Mule

  • 1. 27th November 2021 Calicut MuleSoft Meetup Group #6 Demystifying Custom Policies in Mule
  • 2. Safe Harbour Statement ● Both the speaker and the host are organizing this meet-up in individual capacity only. We are not representing our companies here. ● This presentation is strictly for learning purposes only. Organizer/Presenter do not hold any responsibility that same solution will work for your business requirements. ● This presentation is not meant for any promotional activities. 2
  • 3. Organizers Fathima Farzana John Mathew Philip NJC Labs NJC Labs MuleSoft / Integration Developer MuleSoft / Integration Developer 3
  • 4. Agenda ● Introduction ● Feature Presentation - Custom Policies in Mule 4 ● Demo ● Wrap-Up and Trivia Quiz 4
  • 5. 5
  • 6. 6
  • 9. 9
  • 11. API Attacks ● Injection Attacks ● DoS/DDoS Attacks ● Authentication Hijacking ● Data Exposure ● Parameter Tampering ● Man in the Middle (MitM) ● Unencrypted Communications ● Application Abuse 11
  • 12. Security Topology By MuleSoft 12
  • 13. Policy Categories ● Compliance ● Security ● Quality of Service ● Transformation ● Troubleshooting ● Custom 13
  • 14. Policy Level ● Resource Level Policy 14
  • 15. Policy Types ● Default Policies ● Automated Policies ● Custom Policies -Online Custom Policies Offline Custom Policies 15
  • 16. 16
  • 17. 17 ● Basic Authentication – LDAP – Authenticates the LDAP credentials. ● Basic Authentication – Simple – Authenticates a single user password. ● Client ID Enforcement – Allows access to client applications with valid client credentials. ● CORS – Enables calls executed in a web page to interact with resources from different domains. ● Detokenization –Transforms a tokenized value back to the original data. Policies
  • 18. 18 ● Header Injection – Adds headers to the request or response message of a policy. ● Header Removal – Removes headers from the request or response message of a policy. ● HTTP Caching – Stores HTTP responses from an API implementation. ● IP Blacklist – Blocks a range of IP addresses. ● IP Whitelist – Allows access from only a preapproved range of IP addresses. ● JSON Threat Protection – Protects against a malicious JSON structure in API requests. Policies
  • 19. 19 ● JWT – Validates a JWT token. ● Message Logging – Logs a custom message when an API is invoked. ● OAuth 2.0 Access Token Enforcement Using Mule OAuth Provider Policy – Enforces token access using the MuleSoft OAuth Provider policy. ● OpenAM Access Token Enforcement – Restricts access to a protected resource using an Open AM authentication server. ● PingFederate Access Token Enforcement – Restricts access to a protected resource using the PingFederate authentication server. Policies
  • 20. 20 ● Rate Limiting – Enables imposing a limit on the number of requests that an API can accept within a specified time. ● Rate Limiting, SLA-Based – Enables imposing an API request limit based on SLA tiers. ● Spike Control – Controls API traffic. ● Tokenization –Transforms sensitive data into non-sensitive equivalent tokens. ● XML Threat Protection –Protects against malicious XML elements in API requests. Policies
  • 21. 21 ● What is a custom policy? ● When to use a custom policy? Custom Policies
  • 22. 22 The current workflow to get a working policy for Mule 4 that can be applied in Anypoint Platform consists of: 1. Develop the policy. 2. Package the policy. 3. Upload the resulting policy assets to Exchange. 4. Apply the policy to any API through API Manager. Procedure to create a custom policy
  • 23. 23 In order to start building custom policy all you need is ● Anypoint Studio ● Anypoint Platform account ● Maven installed on your local machine Prerequisite
  • 24. 24 1. Configure your settings.xml 2. Create Custom policy 3. Import into Anypoint Studio 4. Publish to Exchange 5. Apply the policy to your API Steps involved
  • 25. DEMO
  • 26. 26 ○ pom.xml ○ mule-artifact.json exists for the mule-maven-plugin ○ my-custom-policy.yaml renders the policy configuration UI. ○ template.xml where the actual logic of the policy and Mule configuration that defines the policy behavior. File Configurations
  • 28. 28 Order of Execution I Policy A Policy B
  • 29. 29 ● Now if we have a mule flow F1, with an http listener as the source, in that case the order of execution of the policies will be A1 - B1 - <Mule Flow F1> - B2 - A2 ● We can control the order of execution with the help of <http-policy:execute-next/>
  • 30. 30
  • 31. 31 ● Policies can be applied to outbound HTTP Requests within a flow as well. ● This capability enables policies to inject additional headers and other information into outbound HTTP traffic through an HTTP Requester defined in a flow ● The http-policy:operation block allows a policy to inject code before Mule execution reaches an HTTP Requester and after an HTTP Requester returns an HTTP response. Outbound policies
  • 32. 32 Order of Execution II Policy A Policy B
  • 33. 33 Flow F Order of Execution II
  • 34. 34 1. First all the elements before policy executes 2. Flow with http listener 3. Policy execution part before calling out the http requestor 4. Policy execution part after calling out the http requestor 5. Policy termination in the lower order of policies <A1> → <B1> → <F1> → <A3> → <B3> → <http:requester> → <B4> → <A4> → <F2> → <B2> → <A2> Order of Execution II
  • 35. 35 Mule 4 policies can handle errors thrown by 1. The policy 2. A flow within the Mule application 3. Other policies Error Handling
  • 36. 36 In order to execute error-handling, we can use two elements - ● try ● error-handler elements. Error Handling
  • 38. 38 What happens when - ● <F1> raises an error - <P1> → <F1> → <FEH> → <P2> ● <P1> raises an error - <P1> → <PEH> ● Flow’s error handler propagates errors - <P1> → <F1> → <FEH> → <PEH> Error Handling Scenarios
  • 39. 39 Source policies ● Within the http-policy:source tag, set the attribute propagateMessageTransformations to true to enable propagation. ● Any modification to a Mule Message made after the http-policy:execute-next element, will continue propagation throughout the rest of the Mule event processing chain. Operation policies ● It is similar to source policies but in the opposite direction. ● In operation policies, modifications made before the execute-next element are always propagated. Modifications made after the execute-next element, are not propagated by default. Message propogation
  • 41. 41 ● Text box ● Radio button ● Check box Parameter Type
  • 42. 42 ○ String: Any string expected. ○ Expression: A DataWeave expression starting with #[ and finished with ] is expected. ○ Boolean: true or false. ○ Int: A number is expected. This type requires additional properties ○ Radio: One value of a group of options. This type requires additional properties- minimum and maximum value ○ Keyvalues: Collection of Key-Value pairs. Additional Configurations
  • 44. 44 ● A templating engine for resolving the configurable parameters of the policy and implementing semantic logic, such as conditionals. ● Each policy parameter defined in a YAML Configuration file will be available as a HandleBars variable for resolving the final policy configuration ● Handlebars is an extension of Mustache, which was used in earlier versions of Mule policies HandleBars variable
  • 45. QnA
  • 48. 48 1. Which file is responsible for custom policy's configuration UI a. pom.xml b. mule artifact.json c. custom-policy.yaml d. template.xml
  • 49. 49 2. Which xml element helps us to control the order of execution a. <http-policy:execute-next/> b.<http-policy:proxy/> c.<http-policy:source/> d.<mule/>
  • 50. 50 3. What is a templating engine for resolving the configurable parameters of the policy and implementing semantic logic, such as conditionals. a. mule flow b. UI configurations c. handle bars d. pom.xml
  • 51. 51 ● Share: ○ Tweet using the hashtag #MuleSoftMeetups and #CalicutMuleSoftMeetups ○ Invite your network to join: https://meetups.mulesoft.com/calicut/ ● Feedback: ○ Fill out the survey feedback and suggest topics for upcoming events ○ Contact MuleSoft at meetups@mulesoft.com for ways to improve the program What’s next?