SlideShare a Scribd company logo
Anypoint Enterprise Security
• Anypoint Enterprise Security is a collection of
security features that enforce secure access to
information in Mule applications.
• This suite of security features provides various
methods for applying security to Mule
Service-Oriented Architecture (SOA)
implementations and Web services.
The following security features bridge gaps
between trust boundaries in applications:
• Mule Secure Token Service (STS) OAuth 2.0a
Provider
• Mule Credentials Vault
• Mule Message Encryption Processor
• Mule Digital Signature Processor
• Mule Filter Processor
• Mule CRC32 Processor
Why Do Applications Need Security?
• Businesses must ensure that the valuable
information they store and make available
through software applications and Web services
is secure. Locked away and protected from
unauthorized users and malicious attackers,
protected resources — such as credit card
information or Social Security numbers — must
still be accessible to authorized legitimate users
and systems in order to conduct business
transactions.
• To provide secure access to information,
applications and services can apply a variety
of security measures. The suite of security
features in Anypoint Enterprise Security
enables developers to protect applications
according to security requirements, prevent
security breaches and facilitate authorized
access to data.
Advantages of Anypoint Enterprise
Security
• Anypoint Enterprise Security adds new
features on top of of Mule ESB Enterprise’s
existing security capabilities. Mule ESB already
provides the following security features:
• Mule Security Manager, client authentication
and authorization on inbound requests as well
as credential mapping for outbound calls
• LDAP and third party identity
management system integration
• Validation of inbound requests through the
SAML 2.0 federated identity standard
• Secure FTP (SFTP) Transport that enables Mule
flows to read and write to remote directories
over the SSH protocol.

More Related Content

What's hot

Top 5 Ways How Accounting Firms Can Protect Their Client Data
Top 5 Ways How Accounting Firms Can Protect Their Client Data Top 5 Ways How Accounting Firms Can Protect Their Client Data
Top 5 Ways How Accounting Firms Can Protect Their Client Data
Avni Rajput
 
Scug 1803 modern device management
Scug 1803   modern device managementScug 1803   modern device management
Scug 1803 modern device management
Per Larsen
 
Cloak your critical industrial control systems before they get hacked
Cloak your critical industrial control systems before they get hackedCloak your critical industrial control systems before they get hacked
Cloak your critical industrial control systems before they get hacked
Tempered
 
O365 security and privacy de_novo_event_july2014
O365 security and privacy de_novo_event_july2014O365 security and privacy de_novo_event_july2014
O365 security and privacy de_novo_event_july2014
Alexey Vlasenko
 
Cloud computing security infrastructure
Cloud computing security   infrastructureCloud computing security   infrastructure
Cloud computing security infrastructure
Intel IT Center
 
Cloud computing 10 cloud security advantages and challenges
Cloud computing 10 cloud security advantages and challengesCloud computing 10 cloud security advantages and challenges
Cloud computing 10 cloud security advantages and challenges
Vaibhav Khanna
 
Rbi compliance and Data Centric Security
Rbi compliance and Data Centric Security Rbi compliance and Data Centric Security
Rbi compliance and Data Centric Security
Seclore
 
Microsoft Whitepaper: Cloud Privacy Guide
Microsoft Whitepaper: Cloud Privacy GuideMicrosoft Whitepaper: Cloud Privacy Guide
Microsoft Whitepaper: Cloud Privacy Guide
DWP Information Architects Inc.
 
Introduction to Gravitational Teleport
Introduction to Gravitational TeleportIntroduction to Gravitational Teleport
Introduction to Gravitational Teleport
Teleport
 
Securing IBM ECM with Rights Management
Securing IBM ECM with Rights ManagementSecuring IBM ECM with Rights Management
Securing IBM ECM with Rights Management
Seclore
 
Seclore For Microsoft’s Sensitivity Labels
Seclore For Microsoft’s Sensitivity LabelsSeclore For Microsoft’s Sensitivity Labels
Seclore For Microsoft’s Sensitivity Labels
Seclore
 
Lesson 2 Cryptography tools
Lesson 2 Cryptography toolsLesson 2 Cryptography tools
Lesson 2 Cryptography tools
MLG College of Learning, Inc
 
Inbound Data Protection
Inbound Data ProtectionInbound Data Protection
Inbound Data Protection
Seclore
 
Mcafee CASB/DLP + Seclore Rights Management Solutions
Mcafee CASB/DLP + Seclore Rights Management Solutions Mcafee CASB/DLP + Seclore Rights Management Solutions
Mcafee CASB/DLP + Seclore Rights Management Solutions
Seclore
 
Serverless Security Checklist
Serverless Security ChecklistServerless Security Checklist
Serverless Security Checklist
Simform
 
SafeWord 2008 Migration Bundle Building a Fully Trusted Authentication Enviro...
SafeWord 2008 Migration Bundle Building a Fully Trusted Authentication Enviro...SafeWord 2008 Migration Bundle Building a Fully Trusted Authentication Enviro...
SafeWord 2008 Migration Bundle Building a Fully Trusted Authentication Enviro...
SafeNet
 
CompTIA Security+ Module1: Security fundamentals
CompTIA Security+ Module1: Security fundamentalsCompTIA Security+ Module1: Security fundamentals
CompTIA Security+ Module1: Security fundamentals
Ganbayar Sukhbaatar
 
IRDAI Compliance & Data-Centric Security | Seclore
IRDAI Compliance & Data-Centric Security | SecloreIRDAI Compliance & Data-Centric Security | Seclore
IRDAI Compliance & Data-Centric Security | Seclore
Seclore
 
Circuit security
Circuit securityCircuit security
Circuit security
Paperjam_redaction
 
Web Werks Data Center Achieves HIPAA Compliance Certification
Web Werks Data Center Achieves HIPAA Compliance CertificationWeb Werks Data Center Achieves HIPAA Compliance Certification
Web Werks Data Center Achieves HIPAA Compliance Certification
Web Werks Data Centers
 

What's hot (20)

Top 5 Ways How Accounting Firms Can Protect Their Client Data
Top 5 Ways How Accounting Firms Can Protect Their Client Data Top 5 Ways How Accounting Firms Can Protect Their Client Data
Top 5 Ways How Accounting Firms Can Protect Their Client Data
 
Scug 1803 modern device management
Scug 1803   modern device managementScug 1803   modern device management
Scug 1803 modern device management
 
Cloak your critical industrial control systems before they get hacked
Cloak your critical industrial control systems before they get hackedCloak your critical industrial control systems before they get hacked
Cloak your critical industrial control systems before they get hacked
 
O365 security and privacy de_novo_event_july2014
O365 security and privacy de_novo_event_july2014O365 security and privacy de_novo_event_july2014
O365 security and privacy de_novo_event_july2014
 
Cloud computing security infrastructure
Cloud computing security   infrastructureCloud computing security   infrastructure
Cloud computing security infrastructure
 
Cloud computing 10 cloud security advantages and challenges
Cloud computing 10 cloud security advantages and challengesCloud computing 10 cloud security advantages and challenges
Cloud computing 10 cloud security advantages and challenges
 
Rbi compliance and Data Centric Security
Rbi compliance and Data Centric Security Rbi compliance and Data Centric Security
Rbi compliance and Data Centric Security
 
Microsoft Whitepaper: Cloud Privacy Guide
Microsoft Whitepaper: Cloud Privacy GuideMicrosoft Whitepaper: Cloud Privacy Guide
Microsoft Whitepaper: Cloud Privacy Guide
 
Introduction to Gravitational Teleport
Introduction to Gravitational TeleportIntroduction to Gravitational Teleport
Introduction to Gravitational Teleport
 
Securing IBM ECM with Rights Management
Securing IBM ECM with Rights ManagementSecuring IBM ECM with Rights Management
Securing IBM ECM with Rights Management
 
Seclore For Microsoft’s Sensitivity Labels
Seclore For Microsoft’s Sensitivity LabelsSeclore For Microsoft’s Sensitivity Labels
Seclore For Microsoft’s Sensitivity Labels
 
Lesson 2 Cryptography tools
Lesson 2 Cryptography toolsLesson 2 Cryptography tools
Lesson 2 Cryptography tools
 
Inbound Data Protection
Inbound Data ProtectionInbound Data Protection
Inbound Data Protection
 
Mcafee CASB/DLP + Seclore Rights Management Solutions
Mcafee CASB/DLP + Seclore Rights Management Solutions Mcafee CASB/DLP + Seclore Rights Management Solutions
Mcafee CASB/DLP + Seclore Rights Management Solutions
 
Serverless Security Checklist
Serverless Security ChecklistServerless Security Checklist
Serverless Security Checklist
 
SafeWord 2008 Migration Bundle Building a Fully Trusted Authentication Enviro...
SafeWord 2008 Migration Bundle Building a Fully Trusted Authentication Enviro...SafeWord 2008 Migration Bundle Building a Fully Trusted Authentication Enviro...
SafeWord 2008 Migration Bundle Building a Fully Trusted Authentication Enviro...
 
CompTIA Security+ Module1: Security fundamentals
CompTIA Security+ Module1: Security fundamentalsCompTIA Security+ Module1: Security fundamentals
CompTIA Security+ Module1: Security fundamentals
 
IRDAI Compliance & Data-Centric Security | Seclore
IRDAI Compliance & Data-Centric Security | SecloreIRDAI Compliance & Data-Centric Security | Seclore
IRDAI Compliance & Data-Centric Security | Seclore
 
Circuit security
Circuit securityCircuit security
Circuit security
 
Web Werks Data Center Achieves HIPAA Compliance Certification
Web Werks Data Center Achieves HIPAA Compliance CertificationWeb Werks Data Center Achieves HIPAA Compliance Certification
Web Werks Data Center Achieves HIPAA Compliance Certification
 

Similar to Anypoint enterprise security

Mule anypoint enterprise security
Mule  anypoint enterprise securityMule  anypoint enterprise security
Mule anypoint enterprise security
D.Rajesh Kumar
 
IoT Security Elements
IoT Security ElementsIoT Security Elements
IoT Security Elements
Eurotech
 
Meletis BelsisManaging and enforcing information security
Meletis BelsisManaging and enforcing information securityMeletis BelsisManaging and enforcing information security
Meletis BelsisManaging and enforcing information security
Meletis Belsis MPhil/MRes/BSc
 
Anypoint platform security components
Anypoint platform security componentsAnypoint platform security components
Anypoint platform security components
D.Rajesh Kumar
 
Anypoint platform cloud
Anypoint platform cloudAnypoint platform cloud
Anypoint platform cloud
Sudheer Y
 
Baltimore jan2019 mule4
Baltimore jan2019 mule4Baltimore jan2019 mule4
Baltimore jan2019 mule4
ManjuKumara GH
 
R ramya devi cloud computing
R ramya devi cloud computingR ramya devi cloud computing
R ramya devi cloud computing
PriyadharshiniVS
 
Embracing secure, scalable BYOD with Sencha and Centrify
Embracing secure, scalable BYOD with Sencha and CentrifyEmbracing secure, scalable BYOD with Sencha and Centrify
Embracing secure, scalable BYOD with Sencha and Centrify
Sumana Mehta
 
Security and Compliance
Security and ComplianceSecurity and Compliance
Security and Compliance
run_frictionless
 
Implementing an improved security for collin’s database and telecommuters
Implementing an improved security for collin’s database and telecommutersImplementing an improved security for collin’s database and telecommuters
Implementing an improved security for collin’s database and telecommuters
Rishabh Gupta
 
tibbr Security Overview
tibbr Security Overviewtibbr Security Overview
tibbr Security Overview
tibbr
 
AWS Cloud Security
AWS Cloud SecurityAWS Cloud Security
AWS Cloud Security
Amazon Web Services LATAM
 
Week 09_Cyber security u.pdf
Week 09_Cyber security u.pdfWeek 09_Cyber security u.pdf
Week 09_Cyber security u.pdf
dhanywahyudi17
 
Module 5-cloud computing-SECURITY IN THE CLOUD
Module 5-cloud computing-SECURITY IN THE CLOUDModule 5-cloud computing-SECURITY IN THE CLOUD
Module 5-cloud computing-SECURITY IN THE CLOUD
Sweta Kumari Barnwal
 
Secure Development on the Salesforce Platform - Part 3
Secure Development on the Salesforce Platform - Part 3Secure Development on the Salesforce Platform - Part 3
Secure Development on the Salesforce Platform - Part 3
Mark Adcock
 
Daniel Grabski | Microsofts cybersecurity story
Daniel Grabski | Microsofts cybersecurity storyDaniel Grabski | Microsofts cybersecurity story
Daniel Grabski | Microsofts cybersecurity story
Microsoft Österreich
 
Client Server Network Security
Client Server Network SecurityClient Server Network Security
Client Server Network Security
MithilDoshi1
 
IBM Messaging Security - Why securing your environment is important : IBM Int...
IBM Messaging Security - Why securing your environment is important : IBM Int...IBM Messaging Security - Why securing your environment is important : IBM Int...
IBM Messaging Security - Why securing your environment is important : IBM Int...
Leif Davidsen
 
3433 IBM messaging security why securing your environment is important-feb2...
3433   IBM messaging security why securing your environment is important-feb2...3433   IBM messaging security why securing your environment is important-feb2...
3433 IBM messaging security why securing your environment is important-feb2...
Robert Parker
 
CertainSafe MicroTokenization Technology Detailed Overview
CertainSafe MicroTokenization Technology Detailed OverviewCertainSafe MicroTokenization Technology Detailed Overview
CertainSafe MicroTokenization Technology Detailed Overview
Steven Russo
 

Similar to Anypoint enterprise security (20)

Mule anypoint enterprise security
Mule  anypoint enterprise securityMule  anypoint enterprise security
Mule anypoint enterprise security
 
IoT Security Elements
IoT Security ElementsIoT Security Elements
IoT Security Elements
 
Meletis BelsisManaging and enforcing information security
Meletis BelsisManaging and enforcing information securityMeletis BelsisManaging and enforcing information security
Meletis BelsisManaging and enforcing information security
 
Anypoint platform security components
Anypoint platform security componentsAnypoint platform security components
Anypoint platform security components
 
Anypoint platform cloud
Anypoint platform cloudAnypoint platform cloud
Anypoint platform cloud
 
Baltimore jan2019 mule4
Baltimore jan2019 mule4Baltimore jan2019 mule4
Baltimore jan2019 mule4
 
R ramya devi cloud computing
R ramya devi cloud computingR ramya devi cloud computing
R ramya devi cloud computing
 
Embracing secure, scalable BYOD with Sencha and Centrify
Embracing secure, scalable BYOD with Sencha and CentrifyEmbracing secure, scalable BYOD with Sencha and Centrify
Embracing secure, scalable BYOD with Sencha and Centrify
 
Security and Compliance
Security and ComplianceSecurity and Compliance
Security and Compliance
 
Implementing an improved security for collin’s database and telecommuters
Implementing an improved security for collin’s database and telecommutersImplementing an improved security for collin’s database and telecommuters
Implementing an improved security for collin’s database and telecommuters
 
tibbr Security Overview
tibbr Security Overviewtibbr Security Overview
tibbr Security Overview
 
AWS Cloud Security
AWS Cloud SecurityAWS Cloud Security
AWS Cloud Security
 
Week 09_Cyber security u.pdf
Week 09_Cyber security u.pdfWeek 09_Cyber security u.pdf
Week 09_Cyber security u.pdf
 
Module 5-cloud computing-SECURITY IN THE CLOUD
Module 5-cloud computing-SECURITY IN THE CLOUDModule 5-cloud computing-SECURITY IN THE CLOUD
Module 5-cloud computing-SECURITY IN THE CLOUD
 
Secure Development on the Salesforce Platform - Part 3
Secure Development on the Salesforce Platform - Part 3Secure Development on the Salesforce Platform - Part 3
Secure Development on the Salesforce Platform - Part 3
 
Daniel Grabski | Microsofts cybersecurity story
Daniel Grabski | Microsofts cybersecurity storyDaniel Grabski | Microsofts cybersecurity story
Daniel Grabski | Microsofts cybersecurity story
 
Client Server Network Security
Client Server Network SecurityClient Server Network Security
Client Server Network Security
 
IBM Messaging Security - Why securing your environment is important : IBM Int...
IBM Messaging Security - Why securing your environment is important : IBM Int...IBM Messaging Security - Why securing your environment is important : IBM Int...
IBM Messaging Security - Why securing your environment is important : IBM Int...
 
3433 IBM messaging security why securing your environment is important-feb2...
3433   IBM messaging security why securing your environment is important-feb2...3433   IBM messaging security why securing your environment is important-feb2...
3433 IBM messaging security why securing your environment is important-feb2...
 
CertainSafe MicroTokenization Technology Detailed Overview
CertainSafe MicroTokenization Technology Detailed OverviewCertainSafe MicroTokenization Technology Detailed Overview
CertainSafe MicroTokenization Technology Detailed Overview
 

More from Krishna_in

Validations module
Validations moduleValidations module
Validations module
Krishna_in
 
Mule maven Plugin
Mule maven PluginMule maven Plugin
Mule maven Plugin
Krishna_in
 
API Policies
API PoliciesAPI Policies
API Policies
Krishna_in
 
Data Weave
Data WeaveData Weave
Data Weave
Krishna_in
 
Splitter flow control reference
Splitter flow control referenceSplitter flow control reference
Splitter flow control reference
Krishna_in
 
Scatter gather flow control
Scatter gather flow controlScatter gather flow control
Scatter gather flow control
Krishna_in
 
Datasense
DatasenseDatasense
Datasense
Krishna_in
 
Choice flow control reference
Choice flow control referenceChoice flow control reference
Choice flow control reference
Krishna_in
 
Soa(service oriented architecture)
Soa(service oriented architecture)Soa(service oriented architecture)
Soa(service oriented architecture)
Krishna_in
 
Soa project fundamentals
Soa project fundamentalsSoa project fundamentals
Soa project fundamentals
Krishna_in
 
Soa planning
Soa planningSoa planning
Soa planning
Krishna_in
 
Soa methodology
Soa methodologySoa methodology
Soa methodology
Krishna_in
 
Soa governance
Soa governanceSoa governance
Soa governance
Krishna_in
 
Principles of soa
Principles of soaPrinciples of soa
Principles of soa
Krishna_in
 
Mule transformers
Mule transformersMule transformers
Mule transformers
Krishna_in
 
Mule exception strategies
Mule exception strategiesMule exception strategies
Mule exception strategies
Krishna_in
 
Mule components
Mule componentsMule components
Mule components
Krishna_in
 
Mule agent architecture
Mule agent architectureMule agent architecture
Mule agent architecture
Krishna_in
 
Message state
Message stateMessage state
Message state
Krishna_in
 
Global elements
Global elementsGlobal elements
Global elements
Krishna_in
 

More from Krishna_in (20)

Validations module
Validations moduleValidations module
Validations module
 
Mule maven Plugin
Mule maven PluginMule maven Plugin
Mule maven Plugin
 
API Policies
API PoliciesAPI Policies
API Policies
 
Data Weave
Data WeaveData Weave
Data Weave
 
Splitter flow control reference
Splitter flow control referenceSplitter flow control reference
Splitter flow control reference
 
Scatter gather flow control
Scatter gather flow controlScatter gather flow control
Scatter gather flow control
 
Datasense
DatasenseDatasense
Datasense
 
Choice flow control reference
Choice flow control referenceChoice flow control reference
Choice flow control reference
 
Soa(service oriented architecture)
Soa(service oriented architecture)Soa(service oriented architecture)
Soa(service oriented architecture)
 
Soa project fundamentals
Soa project fundamentalsSoa project fundamentals
Soa project fundamentals
 
Soa planning
Soa planningSoa planning
Soa planning
 
Soa methodology
Soa methodologySoa methodology
Soa methodology
 
Soa governance
Soa governanceSoa governance
Soa governance
 
Principles of soa
Principles of soaPrinciples of soa
Principles of soa
 
Mule transformers
Mule transformersMule transformers
Mule transformers
 
Mule exception strategies
Mule exception strategiesMule exception strategies
Mule exception strategies
 
Mule components
Mule componentsMule components
Mule components
 
Mule agent architecture
Mule agent architectureMule agent architecture
Mule agent architecture
 
Message state
Message stateMessage state
Message state
 
Global elements
Global elementsGlobal elements
Global elements
 

Anypoint enterprise security

  • 2. • Anypoint Enterprise Security is a collection of security features that enforce secure access to information in Mule applications. • This suite of security features provides various methods for applying security to Mule Service-Oriented Architecture (SOA) implementations and Web services.
  • 3. The following security features bridge gaps between trust boundaries in applications: • Mule Secure Token Service (STS) OAuth 2.0a Provider • Mule Credentials Vault • Mule Message Encryption Processor • Mule Digital Signature Processor • Mule Filter Processor • Mule CRC32 Processor
  • 4. Why Do Applications Need Security? • Businesses must ensure that the valuable information they store and make available through software applications and Web services is secure. Locked away and protected from unauthorized users and malicious attackers, protected resources — such as credit card information or Social Security numbers — must still be accessible to authorized legitimate users and systems in order to conduct business transactions.
  • 5. • To provide secure access to information, applications and services can apply a variety of security measures. The suite of security features in Anypoint Enterprise Security enables developers to protect applications according to security requirements, prevent security breaches and facilitate authorized access to data.
  • 6. Advantages of Anypoint Enterprise Security • Anypoint Enterprise Security adds new features on top of of Mule ESB Enterprise’s existing security capabilities. Mule ESB already provides the following security features: • Mule Security Manager, client authentication and authorization on inbound requests as well as credential mapping for outbound calls
  • 7. • LDAP and third party identity management system integration • Validation of inbound requests through the SAML 2.0 federated identity standard • Secure FTP (SFTP) Transport that enables Mule flows to read and write to remote directories over the SSH protocol.