SlideShare a Scribd company logo
1 of 48
Virtual Meetup
Bangalore Meetup Community
5th Sep 2020
Networking time
Introduce yourself to your Neighbors!!
All contents © MuleSoft Inc.
Agenda
3
1:00PM - 1:30 PM : Short Introductions
1:30PM – 2:00 PM : Data protection/security in mule
2:00 PM – 2:30 PM : QA Session
2:30PM - 2:45PM : Integration Challenges of Today & NetSuite integration simplified with
Mulesoft
2:45PM - 3:00PM : Q&A
3:00 PM : Wrap up of the Event, with the announcement of the next Mulesoft
meetup and choose the topic for the next meetup
All contents © MuleSoft Inc.
Speakers
Santosh C
Happiest Minds Technologies Ltd
Santosh heads the Enterprise Process & Integration Practice at
Happiest Minds and is responsible for driving Partnerships,
strategy, execution, business, and technology across the desired
market segments. He has a proven track record of delivering
technical solutions and solution architecture in Integration
technologies with over 11 years of experience.
Priyanka Taggar
Accenture
Priyanka Taggar is an integration developer with 5+
years of experience in logistics and healthcare domain
with good hands-on API development and batch
processing. Have good experience in integration
technologies such as Mulesoft & web Methods.
All contents © MuleSoft Inc.
MULESOFT Bangalore Meetup Winner : 2020
3 Mulesoft Bangalore Meetups.
Be part of the online quiz part of the
meetup and score will be declared at the
end of the meetup.
End of the 3rd meetup, cumulative the
score.
Top 2 highest score attendees will be
awarded as ‘MULEOSFT Bangalore
Meetup Winner : 2020 ‘
 Digital certificate
 E-voucher
 Mulesoft exam voucher
All contents © MuleSoft Inc.
CHEERS..!!
6
We have prizes to give away!
3 Winners a special prize is ready
A SHOW OF HANDS:
New Members With Us.!!
All contents © MuleSoft Inc. 7
Goal
• Need for Encryption
• How it can be achieved
• Security features in Mule
• Data protection/security
• File transfer encryption
All contents © MuleSoft Inc. 8
What is Encryption
 Encryption is the transformation of plaintext data into a protected form, which hides
the original data’s meaning.
 It is completely unintelligible without an encryption key, which helps decrypt the
data.
 It is required as data protection best practice by multiple data protection laws,
including GDPR.
 Modern encryption keys, are collections of extremely complex mathematical
algorithms that encrypt and decrypt data. It can be read only if someone has access
to the encryption key.
All contents © MuleSoft Inc. 9
Security Features
• Secure Property Placeholder
• Cryptography module
• Encrypting data in transit and rest
All contents © MuleSoft Inc. 10
Secure Property Placeholder
Secure Property Placeholder is an important standard for keeping our sensitive data like
User ID and Password securely (encrypted/cypher-text) in the Property file.
Supported Configuration File Types
Spring-formatted properties: .properties
YAML: .yaml
All contents © MuleSoft Inc. 11
Cryptography module
This module supports three different strategies to encrypt
and sign your messages:
• JCE: For using a wider range of cryptography capabilities
as provided by the Java Cryptography Extension.
• XML: For signing or encrypting XML documents or
elements.
• PGP: Signature/encryption using PGP (Pretty Good
Privacy).
All contents © MuleSoft Inc. 12
JCE Cryptography
JCE cryptography capabilities can be used in two ways:
• Password-based encryption (PBE): This method
enables you to encrypt and sign content by providing
only an encryption password.
• Key-based encryption: Similar to how PGP and XML
encryption works, this method enables you to
configure a key to perform encryption and signing
operations.
You can encrypt all, or part of a message using any of
these two methods.
All contents © MuleSoft Inc. 13
XML Cryptography
It can encrypt string or individual fields using xpath expressions.
Steps:
1. Keystore Generation: XML
Encryption and Decryption
makes use of a keystore.
Keystore can be in JCEKS, JKS,
PKCS12 formats.
2. Crypto Configuration: Create
'Crypto JCE' global connector
configuration
3. Encrypt XML String: This method
requires the payload to be in
XML format before encryption or
decryption is done.
All contents © MuleSoft Inc. 14
PGP Cryptography: How it works
 PGP encryption works by generating a key pair: a private key and a public key.
 Public key is used to encrypt messages while sending.
 Message encrypted with public key can be decrypted using your private key.
 PGP combines data compression and data encryption reducing size of payload,
resulting in lesser transmission time.
All contents © MuleSoft Inc. 15
•
Data at rest Vs. Data in transit
Data at rest: Information stored in hard drives, file servers,
Databases, etc.
Data in transit: Information that travels through email, HTTP, instant
messaging or any other type of public or private communication
channel.
All contents © MuleSoft Inc. 16
Need for data encryption
• It is vital for organizations to take a strategic and defensive approach by protecting their
data – regardless as to whether it is in transit or at rest.
• Data exchange files are vulnerable as they are files in a very easily-consumed format.
• Encryption of this file at rest adds a new level of protection against potential hackers.
• File transfer servers on the Internet are more exposed to an attack compared to standard
servers.
• To overcome this, all files should be encrypted so that if they ever end up in someone else’s
possession, they couldn’t open it or see the contents.
All contents © MuleSoft Inc. 17
Data Protection Security & Compliance
Requirements
• A MFT solution can address many security and compliance protection requirements while
giving us the control, visibility and flexibility to file transfer activities.
• It goes above and beyond typical minimum data protection requirements to ensure
security, compliance, and control over your most sensitive data.
• To qualify for inclusion in the Managed File Transfer (MFT) category, a product must:
 Be constructed using the FTP network protocol
 Support multiple file transfer protocols
 Automate and secure the file transfer process
 Utilize a proxy to mask identifying details
All contents © MuleSoft Inc. 18
Compliance Requirements
All contents © MuleSoft Inc. 19
Sending and Receiving Data
The following table summarizes how MFT Solution compares to other file transfer
implementations available on the market
All contents © MuleSoft Inc.
Quiz
15
All contents © MuleSoft Inc.
Q1
Which of the following is NOT an encryption algorithm in Mule?
a. SEED
b. TEA
c. Skipjack
d. Jasypt
All contents © MuleSoft Inc.
Q2
What should be the key entered by Developer to DECRYPT a value
that was encrypted using key "myKey#$%123"?
a. myKey#$%123
b. myKey#$%123
c. myKey#$%123
d. key canNOT contain special characters
All contents © MuleSoft Inc.
Integration Challenges of Today
All contents © MuleSoft Inc.
• Order data in eCommerce system
• Inventory data in SAP
• Customer data in SAP, Salesforce
Project objective: Web app
provides real-time order status and
order history for sales team
engaging with customers
A common project-based approach
Aggregated
customer data
Order status Order history
Web app API
All contents © MuleSoft Inc.
Integration project
6 months later…
Aggregated
customer data
Order status Order history
mobile APIMobile API
Aggregated
customer data
Order historyOrder status
The next “new project”
Web app APIWeb app API
All contents © MuleSoft Inc. 28
Data and business apps are increasingly
distributed
Cloud
SaaS
Microservices
Big Data
Devices
IoT
APIs
All contents © MuleSoft Inc. 29
Traditional integration approaches make IT a
bottleneck
Complexity
Increases Rapidly
Each Project Just As
Hard As The Last
Fragility And
Paralysis Ensue
We think there’s a better way
All contents © MuleSoft Inc. 31
The modern API as an Enabler
Core capabilities into reusable building blocks
Secure and governed access to core
systems
Can be moved across environments
without re-development work
APIs give you a standardized way to
amplify your unified customer journey
Customer ID
Order
History
API Contract
Logic
Connectivity
Customer
Orders
All contents © MuleSoft Inc.
The API-led connectivity approach
System
APIs
Process
APIs
Experience
APIs
Customers
Web app APIMobile API
Orders
Salesforce
customers
SAP
customers
Shipment
status
Toll
shipments
UPS
shipments
Order
status
Order
history
All contents © MuleSoft Inc.
System
APIs
Process
APIs
System
APIs
Process
APIs
Experience
APIs
Unlock assets and decentralize access
Discover, reuse assets and compose
information
Discover, self-serve, reuse and
consumeDevelopers
LOB IT
Central IT
Enable and empower the entire organization
All contents © MuleSoft Inc. 34
Key Anypoint Platform Value Statements
One product to learn with
hundreds of pre-built
assets to accelerate time
to build APIs, integration &
tests
SPEED OF
DELIVERY
Built on open technologies,
and resilient to old and new
deployment architectures
and trend, secure by default,
with full visibility into all
deployments.
FUTURE-PROOF
ARCHITECTURE
DEVELOPER
SELF-SERVICE
Developers enabled to
rapidly innovate via self-
service access to the
relevant APIs and
integration assets
All contents © MuleSoft Inc. 35
Speed: Reuse through Anypoint Exchange
Speed up
integration
development
through discovery
and reuse of
integration assets
in exchange
All contents © MuleSoft Inc. 36
Speed: Reuse through Anypoint Exchange
Enable developer
self-service to
scale up
development
efforts across
projects.
All contents © MuleSoft Inc. 37
Self-Service: Easy Discovery and Consumption
Simplify
application
development
efforts by
following a design
first approach
All contents © MuleSoft Inc. 38
Future-Proof: Build Once, Deploy Anywhere
Deployed
on On-
Premise
Deployed
on Cloud
All contents © MuleSoft Inc. 39
Anypoint Visualizer
Real-time service mapping visualization
● Displays different aspects
of an application network
graph.
● Provides a graphical
representation of the
APIs, and Mule
applications, and third-
party systems within your
application network
All contents © MuleSoft Inc. 40
• Introduction
NetSuite is a SaaS-based ERP which allows companies to manage important business using
a single tool. NetSuite provides a suite of cloud-based financials /Enterprise Resource
Planning (ERP) and omnichannel commerce software. NetSuite has capabilities of ERP, CRM,
Manufacturing, e-commerce, retail.
MuleSoft provides a NetSuite connector, which enables to automate the business process
and synchronize the data between NetSuite and third-party tools. NetSuite Connector make
use of different authentication levels, and support error handling.
How We can config NetSuite using MuleSoft
All contents © MuleSoft Inc. 41
Connecting NetSuite using REST calls to REST Lets that expose APIs created with Suite
Script.
Multiple types of Authentication.
Error Handling support.
Features of NetSuite Connector
All contents © MuleSoft Inc. 42
MuleSoft has provided NetSuite connector for easy interaction with the data
We can config the connector in two ways
1.Restlet Login
2.Restlet Token
Ways of connecting NetSuite using MuleSoft
All contents © MuleSoft Inc. 43
• We should pass Scriptid & Deployid and also the Payload of the
element to be search, as shown in the below screenshots.
Passing Required Params for RestLet Token
Q&A
All contents © MuleSoft Inc.
Quiz
15
All contents © MuleSoft Inc.
Which of these definitions best describes interoperability - one of the key benefits of
using an API-led approach?
a) Interoperability is the ability of different systems, devices,
and applications to access, exchange, integrate and cooperatively use data in a coordinated manner.,
b) Interoperability is the coupling of no more than two systems to build a bridge ۥfor which data can be
exchanged.
c) Interoperability is the means by which applications become easily monitored, maintained and operated.,
d) Interoperability is the process of deploying applications in a clustered way to ensure resilience through high
availability.
•
All contents © MuleSoft Inc.
What’s next
47
• Share:
– Tweet your pictures with the hashtag #BangaloreMuleMeetup
– Share the pics in WhatsApp group
• Let the community know you.. 
– Invite your network to join: https://meetups.mulesoft.com/bangalore/
• Feedback:
– Contact either Rajesh, Gaurav, Pruthvi, Swapnil or vasant to suggest
topics for next meetup
– Contact MuleSoft at meetup@mulesoft.com for ways to improve the
program
Thanks!
Meetup bangalore-sept5th 2020 (1)

More Related Content

What's hot

Containerising the Mule Runtime with Kubernetes & From Zero to Batch : MuleS...
Containerising the Mule Runtime with Kubernetes & From Zero to Batch  : MuleS...Containerising the Mule Runtime with Kubernetes & From Zero to Batch  : MuleS...
Containerising the Mule Runtime with Kubernetes & From Zero to Batch : MuleS...Angel Alberici
 
Meet up slides_mumbai_05022020_final
Meet up slides_mumbai_05022020_finalMeet up slides_mumbai_05022020_final
Meet up slides_mumbai_05022020_finalAkshata Sawant
 
Rtf externalize tls MuleSoft meetup
Rtf externalize tls MuleSoft meetupRtf externalize tls MuleSoft meetup
Rtf externalize tls MuleSoft meetupSandeep Deshmukh
 
MuleSoft Meetup Virtual_ 2_Charlotte
MuleSoft Meetup Virtual_ 2_CharlotteMuleSoft Meetup Virtual_ 2_Charlotte
MuleSoft Meetup Virtual_ 2_CharlotteSubhash Patel
 
Hyderabad meet up-sep12
Hyderabad meet up-sep12Hyderabad meet up-sep12
Hyderabad meet up-sep12Sravan Lingam
 
MuleSoft Meetup Singapore June 2021
MuleSoft Meetup Singapore June 2021MuleSoft Meetup Singapore June 2021
MuleSoft Meetup Singapore June 2021Julian Douch
 
MuleSoft Surat Virtual Meetup#24 - MuleSoft and Salesforce Integration and De...
MuleSoft Surat Virtual Meetup#24 - MuleSoft and Salesforce Integration and De...MuleSoft Surat Virtual Meetup#24 - MuleSoft and Salesforce Integration and De...
MuleSoft Surat Virtual Meetup#24 - MuleSoft and Salesforce Integration and De...Jitendra Bafna
 
MuleSoft MUnit Test Recorder Meetup
MuleSoft MUnit Test Recorder MeetupMuleSoft MUnit Test Recorder Meetup
MuleSoft MUnit Test Recorder MeetupAngel Alberici
 
Sustainability Challenge, Postman, Rest sheet and Anypoint provider : MuleSof...
Sustainability Challenge, Postman, Rest sheet and Anypoint provider : MuleSof...Sustainability Challenge, Postman, Rest sheet and Anypoint provider : MuleSof...
Sustainability Challenge, Postman, Rest sheet and Anypoint provider : MuleSof...Angel Alberici
 
Metadata definition between flows on Studio 7 : MuleSoft Virtual Muleys Meetups
Metadata definition between flows on Studio 7  : MuleSoft Virtual Muleys MeetupsMetadata definition between flows on Studio 7  : MuleSoft Virtual Muleys Meetups
Metadata definition between flows on Studio 7 : MuleSoft Virtual Muleys MeetupsAngel Alberici
 
Sustainability Challenge, Postman, Rest sheet and Anypoint provider : MuleSof...
Sustainability Challenge, Postman, Rest sheet and Anypoint provider : MuleSof...Sustainability Challenge, Postman, Rest sheet and Anypoint provider : MuleSof...
Sustainability Challenge, Postman, Rest sheet and Anypoint provider : MuleSof...Angel Alberici
 
How Secure is Your API?
How Secure is Your API?How Secure is Your API?
How Secure is Your API?Mary Joy Sabal
 
Using the Mule 4 SDK to build a connector : MuleSoft Virtual Muleys Meetups
Using the Mule 4 SDK to build a connector  : MuleSoft Virtual Muleys MeetupsUsing the Mule 4 SDK to build a connector  : MuleSoft Virtual Muleys Meetups
Using the Mule 4 SDK to build a connector : MuleSoft Virtual Muleys MeetupsAngel Alberici
 
Melbourne Virtual MuleSoft Meetup October 2021
Melbourne Virtual MuleSoft Meetup October 2021Melbourne Virtual MuleSoft Meetup October 2021
Melbourne Virtual MuleSoft Meetup October 2021Daniel Soffner
 
#3 calicut meetup - understanding slb, dlb and web sockets
#3   calicut meetup - understanding slb, dlb and web sockets#3   calicut meetup - understanding slb, dlb and web sockets
#3 calicut meetup - understanding slb, dlb and web socketsJohnMathewPhilip
 
Sydney MuleSoft Meetup #16 - 19 November 2020
Sydney MuleSoft Meetup #16 - 19 November 2020Sydney MuleSoft Meetup #16 - 19 November 2020
Sydney MuleSoft Meetup #16 - 19 November 2020Royston Lobo
 
MuleSoft Kochi Meetup #3– Integration with Web Sockets
 MuleSoft Kochi Meetup #3– Integration with Web Sockets MuleSoft Kochi Meetup #3– Integration with Web Sockets
MuleSoft Kochi Meetup #3– Integration with Web Socketssumitahuja94
 
Operationalizing your C4E VirtualMuleys & Deployment Considerations: Cloudhub...
Operationalizing your C4E VirtualMuleys & Deployment Considerations: Cloudhub...Operationalizing your C4E VirtualMuleys & Deployment Considerations: Cloudhub...
Operationalizing your C4E VirtualMuleys & Deployment Considerations: Cloudhub...Angel Alberici
 

What's hot (20)

Containerising the Mule Runtime with Kubernetes & From Zero to Batch : MuleS...
Containerising the Mule Runtime with Kubernetes & From Zero to Batch  : MuleS...Containerising the Mule Runtime with Kubernetes & From Zero to Batch  : MuleS...
Containerising the Mule Runtime with Kubernetes & From Zero to Batch : MuleS...
 
Meet up slides_mumbai_05022020_final
Meet up slides_mumbai_05022020_finalMeet up slides_mumbai_05022020_final
Meet up slides_mumbai_05022020_final
 
Rtf externalize tls MuleSoft meetup
Rtf externalize tls MuleSoft meetupRtf externalize tls MuleSoft meetup
Rtf externalize tls MuleSoft meetup
 
Manchester Meetup #3
Manchester Meetup #3Manchester Meetup #3
Manchester Meetup #3
 
MuleSoft Meetup Virtual_ 2_Charlotte
MuleSoft Meetup Virtual_ 2_CharlotteMuleSoft Meetup Virtual_ 2_Charlotte
MuleSoft Meetup Virtual_ 2_Charlotte
 
Hyderabad meet up-sep12
Hyderabad meet up-sep12Hyderabad meet up-sep12
Hyderabad meet up-sep12
 
MuleSoft Meetup Singapore June 2021
MuleSoft Meetup Singapore June 2021MuleSoft Meetup Singapore June 2021
MuleSoft Meetup Singapore June 2021
 
Meetup bangalore-may22nd2021
Meetup bangalore-may22nd2021Meetup bangalore-may22nd2021
Meetup bangalore-may22nd2021
 
MuleSoft Surat Virtual Meetup#24 - MuleSoft and Salesforce Integration and De...
MuleSoft Surat Virtual Meetup#24 - MuleSoft and Salesforce Integration and De...MuleSoft Surat Virtual Meetup#24 - MuleSoft and Salesforce Integration and De...
MuleSoft Surat Virtual Meetup#24 - MuleSoft and Salesforce Integration and De...
 
MuleSoft MUnit Test Recorder Meetup
MuleSoft MUnit Test Recorder MeetupMuleSoft MUnit Test Recorder Meetup
MuleSoft MUnit Test Recorder Meetup
 
Sustainability Challenge, Postman, Rest sheet and Anypoint provider : MuleSof...
Sustainability Challenge, Postman, Rest sheet and Anypoint provider : MuleSof...Sustainability Challenge, Postman, Rest sheet and Anypoint provider : MuleSof...
Sustainability Challenge, Postman, Rest sheet and Anypoint provider : MuleSof...
 
Metadata definition between flows on Studio 7 : MuleSoft Virtual Muleys Meetups
Metadata definition between flows on Studio 7  : MuleSoft Virtual Muleys MeetupsMetadata definition between flows on Studio 7  : MuleSoft Virtual Muleys Meetups
Metadata definition between flows on Studio 7 : MuleSoft Virtual Muleys Meetups
 
Sustainability Challenge, Postman, Rest sheet and Anypoint provider : MuleSof...
Sustainability Challenge, Postman, Rest sheet and Anypoint provider : MuleSof...Sustainability Challenge, Postman, Rest sheet and Anypoint provider : MuleSof...
Sustainability Challenge, Postman, Rest sheet and Anypoint provider : MuleSof...
 
How Secure is Your API?
How Secure is Your API?How Secure is Your API?
How Secure is Your API?
 
Using the Mule 4 SDK to build a connector : MuleSoft Virtual Muleys Meetups
Using the Mule 4 SDK to build a connector  : MuleSoft Virtual Muleys MeetupsUsing the Mule 4 SDK to build a connector  : MuleSoft Virtual Muleys Meetups
Using the Mule 4 SDK to build a connector : MuleSoft Virtual Muleys Meetups
 
Melbourne Virtual MuleSoft Meetup October 2021
Melbourne Virtual MuleSoft Meetup October 2021Melbourne Virtual MuleSoft Meetup October 2021
Melbourne Virtual MuleSoft Meetup October 2021
 
#3 calicut meetup - understanding slb, dlb and web sockets
#3   calicut meetup - understanding slb, dlb and web sockets#3   calicut meetup - understanding slb, dlb and web sockets
#3 calicut meetup - understanding slb, dlb and web sockets
 
Sydney MuleSoft Meetup #16 - 19 November 2020
Sydney MuleSoft Meetup #16 - 19 November 2020Sydney MuleSoft Meetup #16 - 19 November 2020
Sydney MuleSoft Meetup #16 - 19 November 2020
 
MuleSoft Kochi Meetup #3– Integration with Web Sockets
 MuleSoft Kochi Meetup #3– Integration with Web Sockets MuleSoft Kochi Meetup #3– Integration with Web Sockets
MuleSoft Kochi Meetup #3– Integration with Web Sockets
 
Operationalizing your C4E VirtualMuleys & Deployment Considerations: Cloudhub...
Operationalizing your C4E VirtualMuleys & Deployment Considerations: Cloudhub...Operationalizing your C4E VirtualMuleys & Deployment Considerations: Cloudhub...
Operationalizing your C4E VirtualMuleys & Deployment Considerations: Cloudhub...
 

Similar to Meetup bangalore-sept5th 2020 (1)

Mule soft Meetup #3
 Mule soft Meetup #3 Mule soft Meetup #3
Mule soft Meetup #3Gaurav Sethi
 
IRJET-Domain Data Security on Cloud
IRJET-Domain Data Security on CloudIRJET-Domain Data Security on Cloud
IRJET-Domain Data Security on CloudIRJET Journal
 
Zero Trust 20211105
Zero Trust 20211105 Zero Trust 20211105
Zero Trust 20211105 Thomas Treml
 
Open splice dds security
Open splice dds securityOpen splice dds security
Open splice dds securityRamzi Karoui
 
Achieving Secure, sclable and finegrained Cloud computing report
Achieving Secure, sclable and finegrained Cloud computing reportAchieving Secure, sclable and finegrained Cloud computing report
Achieving Secure, sclable and finegrained Cloud computing reportKiran Girase
 
Cryptographie avancée et Logical Data Fabric : Accélérez le partage et la mig...
Cryptographie avancée et Logical Data Fabric : Accélérez le partage et la mig...Cryptographie avancée et Logical Data Fabric : Accélérez le partage et la mig...
Cryptographie avancée et Logical Data Fabric : Accélérez le partage et la mig...Denodo
 
Attribute-Based Encryption for Access of Secured Data in Cloud Storage
Attribute-Based Encryption for Access of Secured Data in Cloud StorageAttribute-Based Encryption for Access of Secured Data in Cloud Storage
Attribute-Based Encryption for Access of Secured Data in Cloud StorageIJSRD
 
Jun 15 privacy in the cloud at financial institutions at the object managemen...
Jun 15 privacy in the cloud at financial institutions at the object managemen...Jun 15 privacy in the cloud at financial institutions at the object managemen...
Jun 15 privacy in the cloud at financial institutions at the object managemen...Ulf Mattsson
 
Migrating Critical Applications to the Cloud - isaca seattle - sanitized
Migrating Critical Applications to the Cloud - isaca seattle - sanitizedMigrating Critical Applications to the Cloud - isaca seattle - sanitized
Migrating Critical Applications to the Cloud - isaca seattle - sanitizedUnifyCloud
 
Migrating Critical Applications To The Cloud - ISACA Seattle - Sanitized
Migrating Critical Applications To The Cloud - ISACA Seattle - SanitizedMigrating Critical Applications To The Cloud - ISACA Seattle - Sanitized
Migrating Critical Applications To The Cloud - ISACA Seattle - SanitizedNorm Barber
 
Anypoint platform cloud
Anypoint platform cloudAnypoint platform cloud
Anypoint platform cloudSudheer Y
 
Baltimore jan2019 mule4
Baltimore jan2019 mule4Baltimore jan2019 mule4
Baltimore jan2019 mule4ManjuKumara GH
 
IRJET- Securing the Transfer of Confidential Data in Fiscal Devices using Blo...
IRJET- Securing the Transfer of Confidential Data in Fiscal Devices using Blo...IRJET- Securing the Transfer of Confidential Data in Fiscal Devices using Blo...
IRJET- Securing the Transfer of Confidential Data in Fiscal Devices using Blo...IRJET Journal
 
IRJET - A Novel Approach Implementing Deduplication using Message Locked Encr...
IRJET - A Novel Approach Implementing Deduplication using Message Locked Encr...IRJET - A Novel Approach Implementing Deduplication using Message Locked Encr...
IRJET - A Novel Approach Implementing Deduplication using Message Locked Encr...IRJET Journal
 
A robust and verifiable threshold multi authority access control system in pu...
A robust and verifiable threshold multi authority access control system in pu...A robust and verifiable threshold multi authority access control system in pu...
A robust and verifiable threshold multi authority access control system in pu...IJARIIT
 
Secure Channel Establishment Techniques for Homomorphic Encryption in Cloud C...
Secure Channel Establishment Techniques for Homomorphic Encryption in Cloud C...Secure Channel Establishment Techniques for Homomorphic Encryption in Cloud C...
Secure Channel Establishment Techniques for Homomorphic Encryption in Cloud C...IRJET Journal
 

Similar to Meetup bangalore-sept5th 2020 (1) (20)

Mule soft Meetup #3
 Mule soft Meetup #3 Mule soft Meetup #3
Mule soft Meetup #3
 
IRJET-Domain Data Security on Cloud
IRJET-Domain Data Security on CloudIRJET-Domain Data Security on Cloud
IRJET-Domain Data Security on Cloud
 
Zero Trust 20211105
Zero Trust 20211105 Zero Trust 20211105
Zero Trust 20211105
 
Open splice dds security
Open splice dds securityOpen splice dds security
Open splice dds security
 
Achieving Secure, sclable and finegrained Cloud computing report
Achieving Secure, sclable and finegrained Cloud computing reportAchieving Secure, sclable and finegrained Cloud computing report
Achieving Secure, sclable and finegrained Cloud computing report
 
1784 1788
1784 17881784 1788
1784 1788
 
1784 1788
1784 17881784 1788
1784 1788
 
Cryptographie avancée et Logical Data Fabric : Accélérez le partage et la mig...
Cryptographie avancée et Logical Data Fabric : Accélérez le partage et la mig...Cryptographie avancée et Logical Data Fabric : Accélérez le partage et la mig...
Cryptographie avancée et Logical Data Fabric : Accélérez le partage et la mig...
 
Attribute-Based Encryption for Access of Secured Data in Cloud Storage
Attribute-Based Encryption for Access of Secured Data in Cloud StorageAttribute-Based Encryption for Access of Secured Data in Cloud Storage
Attribute-Based Encryption for Access of Secured Data in Cloud Storage
 
Jun 15 privacy in the cloud at financial institutions at the object managemen...
Jun 15 privacy in the cloud at financial institutions at the object managemen...Jun 15 privacy in the cloud at financial institutions at the object managemen...
Jun 15 privacy in the cloud at financial institutions at the object managemen...
 
Migrating Critical Applications to the Cloud - isaca seattle - sanitized
Migrating Critical Applications to the Cloud - isaca seattle - sanitizedMigrating Critical Applications to the Cloud - isaca seattle - sanitized
Migrating Critical Applications to the Cloud - isaca seattle - sanitized
 
Migrating Critical Applications To The Cloud - ISACA Seattle - Sanitized
Migrating Critical Applications To The Cloud - ISACA Seattle - SanitizedMigrating Critical Applications To The Cloud - ISACA Seattle - Sanitized
Migrating Critical Applications To The Cloud - ISACA Seattle - Sanitized
 
Anypoint platform cloud
Anypoint platform cloudAnypoint platform cloud
Anypoint platform cloud
 
Baltimore jan2019 mule4
Baltimore jan2019 mule4Baltimore jan2019 mule4
Baltimore jan2019 mule4
 
IRJET- Securing the Transfer of Confidential Data in Fiscal Devices using Blo...
IRJET- Securing the Transfer of Confidential Data in Fiscal Devices using Blo...IRJET- Securing the Transfer of Confidential Data in Fiscal Devices using Blo...
IRJET- Securing the Transfer of Confidential Data in Fiscal Devices using Blo...
 
IRJET - A Novel Approach Implementing Deduplication using Message Locked Encr...
IRJET - A Novel Approach Implementing Deduplication using Message Locked Encr...IRJET - A Novel Approach Implementing Deduplication using Message Locked Encr...
IRJET - A Novel Approach Implementing Deduplication using Message Locked Encr...
 
WHISHWORKS-MuleSoft Hyderabad Meetup -Oct 2018
WHISHWORKS-MuleSoft Hyderabad Meetup -Oct 2018WHISHWORKS-MuleSoft Hyderabad Meetup -Oct 2018
WHISHWORKS-MuleSoft Hyderabad Meetup -Oct 2018
 
A robust and verifiable threshold multi authority access control system in pu...
A robust and verifiable threshold multi authority access control system in pu...A robust and verifiable threshold multi authority access control system in pu...
A robust and verifiable threshold multi authority access control system in pu...
 
Secure Channel Establishment Techniques for Homomorphic Encryption in Cloud C...
Secure Channel Establishment Techniques for Homomorphic Encryption in Cloud C...Secure Channel Establishment Techniques for Homomorphic Encryption in Cloud C...
Secure Channel Establishment Techniques for Homomorphic Encryption in Cloud C...
 
V5 i7 0169
V5 i7 0169V5 i7 0169
V5 i7 0169
 

More from D.Rajesh Kumar

Mule soft meetup_-_finland_july_11th__2020
Mule soft meetup_-_finland_july_11th__2020Mule soft meetup_-_finland_july_11th__2020
Mule soft meetup_-_finland_july_11th__2020D.Rajesh Kumar
 
Meetup bangalore 9_novupdated
Meetup bangalore 9_novupdatedMeetup bangalore 9_novupdated
Meetup bangalore 9_novupdatedD.Rajesh Kumar
 
Meetup bangalore aug31st2019
Meetup bangalore aug31st2019Meetup bangalore aug31st2019
Meetup bangalore aug31st2019D.Rajesh Kumar
 
Meetup bangalore june29th2019
Meetup bangalore june29th2019Meetup bangalore june29th2019
Meetup bangalore june29th2019D.Rajesh Kumar
 
mulesoft meetup @ bangalore
mulesoft meetup @ bangaloremulesoft meetup @ bangalore
mulesoft meetup @ bangaloreD.Rajesh Kumar
 
Meetup_Bangalore_Rajesh
Meetup_Bangalore_RajeshMeetup_Bangalore_Rajesh
Meetup_Bangalore_RajeshD.Rajesh Kumar
 
Calico to secure host interfaces
Calico to secure host interfacesCalico to secure host interfaces
Calico to secure host interfacesD.Rajesh Kumar
 
Calico and how interprets neutron api
Calico and how interprets neutron apiCalico and how interprets neutron api
Calico and how interprets neutron apiD.Rajesh Kumar
 
Calico with open stack and chef
Calico with open stack and chefCalico with open stack and chef
Calico with open stack and chefD.Rajesh Kumar
 
Calico with open stack
Calico with open stackCalico with open stack
Calico with open stackD.Rajesh Kumar
 
Slack connector with in MULE
Slack connector with in MULESlack connector with in MULE
Slack connector with in MULED.Rajesh Kumar
 
MuleSoft Offers a Data Migration Solution
MuleSoft Offers a Data Migration SolutionMuleSoft Offers a Data Migration Solution
MuleSoft Offers a Data Migration SolutionD.Rajesh Kumar
 
Mule version-crowd highlights
Mule version-crowd highlightsMule version-crowd highlights
Mule version-crowd highlightsD.Rajesh Kumar
 

More from D.Rajesh Kumar (20)

Mule soft meetup_-_finland_july_11th__2020
Mule soft meetup_-_finland_july_11th__2020Mule soft meetup_-_finland_july_11th__2020
Mule soft meetup_-_finland_july_11th__2020
 
Meetup bangalore 9_novupdated
Meetup bangalore 9_novupdatedMeetup bangalore 9_novupdated
Meetup bangalore 9_novupdated
 
Meetup bangalore aug31st2019
Meetup bangalore aug31st2019Meetup bangalore aug31st2019
Meetup bangalore aug31st2019
 
Meetup bangalore june29th2019
Meetup bangalore june29th2019Meetup bangalore june29th2019
Meetup bangalore june29th2019
 
mulesoft meetup @ bangalore
mulesoft meetup @ bangaloremulesoft meetup @ bangalore
mulesoft meetup @ bangalore
 
Meetup_Bangalore_Rajesh
Meetup_Bangalore_RajeshMeetup_Bangalore_Rajesh
Meetup_Bangalore_Rajesh
 
Calico and container
Calico and containerCalico and container
Calico and container
 
Calico docker+ipam
Calico docker+ipamCalico docker+ipam
Calico docker+ipam
 
Calico architecture
Calico architectureCalico architecture
Calico architecture
 
Calico to secure host interfaces
Calico to secure host interfacesCalico to secure host interfaces
Calico to secure host interfaces
 
Calico and how interprets neutron api
Calico and how interprets neutron apiCalico and how interprets neutron api
Calico and how interprets neutron api
 
Calico with open stack and chef
Calico with open stack and chefCalico with open stack and chef
Calico with open stack and chef
 
Calico with open stack
Calico with open stackCalico with open stack
Calico with open stack
 
Calico with docker
Calico with dockerCalico with docker
Calico with docker
 
Object Store in Mule
Object Store in MuleObject Store in Mule
Object Store in Mule
 
Slack connector with in MULE
Slack connector with in MULESlack connector with in MULE
Slack connector with in MULE
 
MuleSoft Offers a Data Migration Solution
MuleSoft Offers a Data Migration SolutionMuleSoft Offers a Data Migration Solution
MuleSoft Offers a Data Migration Solution
 
Mule version-crowd highlights
Mule version-crowd highlightsMule version-crowd highlights
Mule version-crowd highlights
 
Mule ctf
Mule  ctfMule  ctf
Mule ctf
 
Sdlc with mule esb
Sdlc with mule esbSdlc with mule esb
Sdlc with mule esb
 

Recently uploaded

Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j
 
How to Remove Document Management Hurdles with X-Docs?
How to Remove Document Management Hurdles with X-Docs?How to Remove Document Management Hurdles with X-Docs?
How to Remove Document Management Hurdles with X-Docs?XfilesPro
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 3652toLead Limited
 
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...HostedbyConfluent
 
Benefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksBenefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksSoftradix Technologies
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountPuma Security, LLC
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking MenDelhi Call girls
 
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphSIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphNeo4j
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Allon Mureinik
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationSafe Software
 
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | DelhiFULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhisoniya singh
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking MenDelhi Call girls
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsMaria Levchenko
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxMalak Abu Hammad
 
Azure Monitor & Application Insight to monitor Infrastructure & Application
Azure Monitor & Application Insight to monitor Infrastructure & ApplicationAzure Monitor & Application Insight to monitor Infrastructure & Application
Azure Monitor & Application Insight to monitor Infrastructure & ApplicationAndikSusilo4
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...shyamraj55
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationRadu Cotescu
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking MenDelhi Call girls
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Patryk Bandurski
 
Key Features Of Token Development (1).pptx
Key  Features Of Token  Development (1).pptxKey  Features Of Token  Development (1).pptx
Key Features Of Token Development (1).pptxLBM Solutions
 

Recently uploaded (20)

Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
 
How to Remove Document Management Hurdles with X-Docs?
How to Remove Document Management Hurdles with X-Docs?How to Remove Document Management Hurdles with X-Docs?
How to Remove Document Management Hurdles with X-Docs?
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
 
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
 
Benefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksBenefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other Frameworks
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphSIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
 
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | DelhiFULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptx
 
Azure Monitor & Application Insight to monitor Infrastructure & Application
Azure Monitor & Application Insight to monitor Infrastructure & ApplicationAzure Monitor & Application Insight to monitor Infrastructure & Application
Azure Monitor & Application Insight to monitor Infrastructure & Application
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
 
Key Features Of Token Development (1).pptx
Key  Features Of Token  Development (1).pptxKey  Features Of Token  Development (1).pptx
Key Features Of Token Development (1).pptx
 

Meetup bangalore-sept5th 2020 (1)

  • 1. Virtual Meetup Bangalore Meetup Community 5th Sep 2020
  • 3. All contents © MuleSoft Inc. Agenda 3 1:00PM - 1:30 PM : Short Introductions 1:30PM – 2:00 PM : Data protection/security in mule 2:00 PM – 2:30 PM : QA Session 2:30PM - 2:45PM : Integration Challenges of Today & NetSuite integration simplified with Mulesoft 2:45PM - 3:00PM : Q&A 3:00 PM : Wrap up of the Event, with the announcement of the next Mulesoft meetup and choose the topic for the next meetup
  • 4. All contents © MuleSoft Inc. Speakers Santosh C Happiest Minds Technologies Ltd Santosh heads the Enterprise Process & Integration Practice at Happiest Minds and is responsible for driving Partnerships, strategy, execution, business, and technology across the desired market segments. He has a proven track record of delivering technical solutions and solution architecture in Integration technologies with over 11 years of experience. Priyanka Taggar Accenture Priyanka Taggar is an integration developer with 5+ years of experience in logistics and healthcare domain with good hands-on API development and batch processing. Have good experience in integration technologies such as Mulesoft & web Methods.
  • 5. All contents © MuleSoft Inc. MULESOFT Bangalore Meetup Winner : 2020 3 Mulesoft Bangalore Meetups. Be part of the online quiz part of the meetup and score will be declared at the end of the meetup. End of the 3rd meetup, cumulative the score. Top 2 highest score attendees will be awarded as ‘MULEOSFT Bangalore Meetup Winner : 2020 ‘  Digital certificate  E-voucher  Mulesoft exam voucher
  • 6. All contents © MuleSoft Inc. CHEERS..!! 6 We have prizes to give away! 3 Winners a special prize is ready A SHOW OF HANDS: New Members With Us.!!
  • 7. All contents © MuleSoft Inc. 7 Goal • Need for Encryption • How it can be achieved • Security features in Mule • Data protection/security • File transfer encryption
  • 8. All contents © MuleSoft Inc. 8 What is Encryption  Encryption is the transformation of plaintext data into a protected form, which hides the original data’s meaning.  It is completely unintelligible without an encryption key, which helps decrypt the data.  It is required as data protection best practice by multiple data protection laws, including GDPR.  Modern encryption keys, are collections of extremely complex mathematical algorithms that encrypt and decrypt data. It can be read only if someone has access to the encryption key.
  • 9. All contents © MuleSoft Inc. 9 Security Features • Secure Property Placeholder • Cryptography module • Encrypting data in transit and rest
  • 10. All contents © MuleSoft Inc. 10 Secure Property Placeholder Secure Property Placeholder is an important standard for keeping our sensitive data like User ID and Password securely (encrypted/cypher-text) in the Property file. Supported Configuration File Types Spring-formatted properties: .properties YAML: .yaml
  • 11. All contents © MuleSoft Inc. 11 Cryptography module This module supports three different strategies to encrypt and sign your messages: • JCE: For using a wider range of cryptography capabilities as provided by the Java Cryptography Extension. • XML: For signing or encrypting XML documents or elements. • PGP: Signature/encryption using PGP (Pretty Good Privacy).
  • 12. All contents © MuleSoft Inc. 12 JCE Cryptography JCE cryptography capabilities can be used in two ways: • Password-based encryption (PBE): This method enables you to encrypt and sign content by providing only an encryption password. • Key-based encryption: Similar to how PGP and XML encryption works, this method enables you to configure a key to perform encryption and signing operations. You can encrypt all, or part of a message using any of these two methods.
  • 13. All contents © MuleSoft Inc. 13 XML Cryptography It can encrypt string or individual fields using xpath expressions. Steps: 1. Keystore Generation: XML Encryption and Decryption makes use of a keystore. Keystore can be in JCEKS, JKS, PKCS12 formats. 2. Crypto Configuration: Create 'Crypto JCE' global connector configuration 3. Encrypt XML String: This method requires the payload to be in XML format before encryption or decryption is done.
  • 14. All contents © MuleSoft Inc. 14 PGP Cryptography: How it works  PGP encryption works by generating a key pair: a private key and a public key.  Public key is used to encrypt messages while sending.  Message encrypted with public key can be decrypted using your private key.  PGP combines data compression and data encryption reducing size of payload, resulting in lesser transmission time.
  • 15. All contents © MuleSoft Inc. 15 • Data at rest Vs. Data in transit Data at rest: Information stored in hard drives, file servers, Databases, etc. Data in transit: Information that travels through email, HTTP, instant messaging or any other type of public or private communication channel.
  • 16. All contents © MuleSoft Inc. 16 Need for data encryption • It is vital for organizations to take a strategic and defensive approach by protecting their data – regardless as to whether it is in transit or at rest. • Data exchange files are vulnerable as they are files in a very easily-consumed format. • Encryption of this file at rest adds a new level of protection against potential hackers. • File transfer servers on the Internet are more exposed to an attack compared to standard servers. • To overcome this, all files should be encrypted so that if they ever end up in someone else’s possession, they couldn’t open it or see the contents.
  • 17. All contents © MuleSoft Inc. 17 Data Protection Security & Compliance Requirements • A MFT solution can address many security and compliance protection requirements while giving us the control, visibility and flexibility to file transfer activities. • It goes above and beyond typical minimum data protection requirements to ensure security, compliance, and control over your most sensitive data. • To qualify for inclusion in the Managed File Transfer (MFT) category, a product must:  Be constructed using the FTP network protocol  Support multiple file transfer protocols  Automate and secure the file transfer process  Utilize a proxy to mask identifying details
  • 18. All contents © MuleSoft Inc. 18 Compliance Requirements
  • 19. All contents © MuleSoft Inc. 19 Sending and Receiving Data The following table summarizes how MFT Solution compares to other file transfer implementations available on the market
  • 20.
  • 21. All contents © MuleSoft Inc. Quiz 15
  • 22. All contents © MuleSoft Inc. Q1 Which of the following is NOT an encryption algorithm in Mule? a. SEED b. TEA c. Skipjack d. Jasypt
  • 23. All contents © MuleSoft Inc. Q2 What should be the key entered by Developer to DECRYPT a value that was encrypted using key "myKey#$%123"? a. myKey#$%123 b. myKey#$%123 c. myKey#$%123 d. key canNOT contain special characters
  • 24. All contents © MuleSoft Inc. Integration Challenges of Today
  • 25. All contents © MuleSoft Inc. • Order data in eCommerce system • Inventory data in SAP • Customer data in SAP, Salesforce Project objective: Web app provides real-time order status and order history for sales team engaging with customers A common project-based approach Aggregated customer data Order status Order history Web app API
  • 26. All contents © MuleSoft Inc. Integration project 6 months later… Aggregated customer data Order status Order history mobile APIMobile API Aggregated customer data Order historyOrder status The next “new project” Web app APIWeb app API
  • 27. All contents © MuleSoft Inc. 28 Data and business apps are increasingly distributed Cloud SaaS Microservices Big Data Devices IoT APIs
  • 28. All contents © MuleSoft Inc. 29 Traditional integration approaches make IT a bottleneck Complexity Increases Rapidly Each Project Just As Hard As The Last Fragility And Paralysis Ensue
  • 29. We think there’s a better way
  • 30. All contents © MuleSoft Inc. 31 The modern API as an Enabler Core capabilities into reusable building blocks Secure and governed access to core systems Can be moved across environments without re-development work APIs give you a standardized way to amplify your unified customer journey Customer ID Order History API Contract Logic Connectivity Customer Orders
  • 31. All contents © MuleSoft Inc. The API-led connectivity approach System APIs Process APIs Experience APIs Customers Web app APIMobile API Orders Salesforce customers SAP customers Shipment status Toll shipments UPS shipments Order status Order history
  • 32. All contents © MuleSoft Inc. System APIs Process APIs System APIs Process APIs Experience APIs Unlock assets and decentralize access Discover, reuse assets and compose information Discover, self-serve, reuse and consumeDevelopers LOB IT Central IT Enable and empower the entire organization
  • 33. All contents © MuleSoft Inc. 34 Key Anypoint Platform Value Statements One product to learn with hundreds of pre-built assets to accelerate time to build APIs, integration & tests SPEED OF DELIVERY Built on open technologies, and resilient to old and new deployment architectures and trend, secure by default, with full visibility into all deployments. FUTURE-PROOF ARCHITECTURE DEVELOPER SELF-SERVICE Developers enabled to rapidly innovate via self- service access to the relevant APIs and integration assets
  • 34. All contents © MuleSoft Inc. 35 Speed: Reuse through Anypoint Exchange Speed up integration development through discovery and reuse of integration assets in exchange
  • 35. All contents © MuleSoft Inc. 36 Speed: Reuse through Anypoint Exchange Enable developer self-service to scale up development efforts across projects.
  • 36. All contents © MuleSoft Inc. 37 Self-Service: Easy Discovery and Consumption Simplify application development efforts by following a design first approach
  • 37. All contents © MuleSoft Inc. 38 Future-Proof: Build Once, Deploy Anywhere Deployed on On- Premise Deployed on Cloud
  • 38. All contents © MuleSoft Inc. 39 Anypoint Visualizer Real-time service mapping visualization ● Displays different aspects of an application network graph. ● Provides a graphical representation of the APIs, and Mule applications, and third- party systems within your application network
  • 39. All contents © MuleSoft Inc. 40 • Introduction NetSuite is a SaaS-based ERP which allows companies to manage important business using a single tool. NetSuite provides a suite of cloud-based financials /Enterprise Resource Planning (ERP) and omnichannel commerce software. NetSuite has capabilities of ERP, CRM, Manufacturing, e-commerce, retail. MuleSoft provides a NetSuite connector, which enables to automate the business process and synchronize the data between NetSuite and third-party tools. NetSuite Connector make use of different authentication levels, and support error handling. How We can config NetSuite using MuleSoft
  • 40. All contents © MuleSoft Inc. 41 Connecting NetSuite using REST calls to REST Lets that expose APIs created with Suite Script. Multiple types of Authentication. Error Handling support. Features of NetSuite Connector
  • 41. All contents © MuleSoft Inc. 42 MuleSoft has provided NetSuite connector for easy interaction with the data We can config the connector in two ways 1.Restlet Login 2.Restlet Token Ways of connecting NetSuite using MuleSoft
  • 42. All contents © MuleSoft Inc. 43 • We should pass Scriptid & Deployid and also the Payload of the element to be search, as shown in the below screenshots. Passing Required Params for RestLet Token
  • 43. Q&A
  • 44. All contents © MuleSoft Inc. Quiz 15
  • 45. All contents © MuleSoft Inc. Which of these definitions best describes interoperability - one of the key benefits of using an API-led approach? a) Interoperability is the ability of different systems, devices, and applications to access, exchange, integrate and cooperatively use data in a coordinated manner., b) Interoperability is the coupling of no more than two systems to build a bridge €•for which data can be exchanged. c) Interoperability is the means by which applications become easily monitored, maintained and operated., d) Interoperability is the process of deploying applications in a clustered way to ensure resilience through high availability. •
  • 46. All contents © MuleSoft Inc. What’s next 47 • Share: – Tweet your pictures with the hashtag #BangaloreMuleMeetup – Share the pics in WhatsApp group • Let the community know you..  – Invite your network to join: https://meetups.mulesoft.com/bangalore/ • Feedback: – Contact either Rajesh, Gaurav, Pruthvi, Swapnil or vasant to suggest topics for next meetup – Contact MuleSoft at meetup@mulesoft.com for ways to improve the program