SlideShare a Scribd company logo
MULE –Security
2
Configuring Security
Mule ESB allows you to authenticate requests via endpoints using
transport-specific or generic authentication methods. It also allows you to
control method-level authorization on your service components. The
Security Manager is responsible for authenticating requests based on one
or more security providers. All security is pluggable via the Mule security
API , so you can easily plug in custom implementations.
3
Spring Security 3.0
Spring Security is the next version of Acegi and provides a number of
authentication and authorization providers such as JAAS, LDAP, CAS
(Yale Central Authentication service), and DAO. The following topics will
help you get started securing your services using Spring Security:
•Configuring the Spring Security Manager
•Component Authorization Using Spring Security
•Setting up LDAP Provider for Spring Security
4
Acegi
Acegi provides a number of authentication and authorization providers such
as JAAS, LDAP, CAS (Yale Central Authentication service), and DAO. The
following topics will help you get started securing your services using
Acegi:
•Configuring the Acegi Security Manager
•Component Authorization Using Acegi
•Setting up LDAP Provider for Acegi
5
WS-Security and SAML
WS-Security is a standard protocol for applying security to Web services. It
contains specifications on how integrity and confidentiality in a SOAP
message can be enforced via XML signatures and binary security tokens
such as X.509 certificates and Kerberos tickets as well as encryption
headers. It ensures end-to-end security by working in the application layer
as opposed to the transport layer
6
WS-Security Example The WS-Security example demonstrates the
different possibilities available for incorporating WS-Security into your Mule
application. This example is available in the enterprise edition of Mule as of
version 2.2.3.
Enabling WS-Security - Describes how to secure your CXF SOAP
endpoints with WS-Security.
SAML Module - Mule now supports the SAML standard for exchange of
security information between systems. This module is available in the
enterprise edition of Mule as of version 2.2.3
7
Other Security Integration
Mule also supports the following security technologies:
Encryption Strategies - Secure your messages by encrypting them.
PGP Security - Secure your messages by encrypting them with PGP.
Jaas Security
Mule  security

More Related Content

What's hot

Mulesoft ppt
Mulesoft pptMulesoft ppt
Mulesoft ppt
kishore ippili
 
Mule anypoint b2 b
Mule  anypoint b2 bMule  anypoint b2 b
Mule anypoint b2 b
D.Rajesh Kumar
 
Mule esb
Mule esbMule esb
Mule esb
Prabhat gangwar
 
Mule architecture
Mule architectureMule architecture
Mule architecture
Khasim Saheb
 
Mule securing
Mule   securingMule   securing
Mule securing
Sindhu VL
 
Mule Esb
Mule EsbMule Esb
Mule Esb
javeed_mhd
 
Mule architecture
Mule architectureMule architecture
Mule architecture
D.Rajesh Kumar
 
mulesoft at a glance
mulesoft at a glancemulesoft at a glance
mulesoft at a glance
Khasim Saheb
 
Mule anypoint connector dev kit
Mule  anypoint connector dev kitMule  anypoint connector dev kit
Mule anypoint connector dev kit
D.Rajesh Kumar
 
Mule esb-architecture
Mule esb-architectureMule esb-architecture
Mule esb-architecture
himajareddys
 
Mule 3.8
Mule 3.8Mule 3.8
Mule 3.8
D.Rajesh Kumar
 
Mule esb overview
Mule esb overviewMule esb overview
Mule esb overview
Swami Satish
 
Mule esb
Mule esbMule esb
Mule esb
charan teja R
 
Mule reference
Mule referenceMule reference
Mule reference
himajareddys
 
Mule mule agent
Mule  mule agentMule  mule agent
Mule mule agent
D.Rajesh Kumar
 

What's hot (15)

Mulesoft ppt
Mulesoft pptMulesoft ppt
Mulesoft ppt
 
Mule anypoint b2 b
Mule  anypoint b2 bMule  anypoint b2 b
Mule anypoint b2 b
 
Mule esb
Mule esbMule esb
Mule esb
 
Mule architecture
Mule architectureMule architecture
Mule architecture
 
Mule securing
Mule   securingMule   securing
Mule securing
 
Mule Esb
Mule EsbMule Esb
Mule Esb
 
Mule architecture
Mule architectureMule architecture
Mule architecture
 
mulesoft at a glance
mulesoft at a glancemulesoft at a glance
mulesoft at a glance
 
Mule anypoint connector dev kit
Mule  anypoint connector dev kitMule  anypoint connector dev kit
Mule anypoint connector dev kit
 
Mule esb-architecture
Mule esb-architectureMule esb-architecture
Mule esb-architecture
 
Mule 3.8
Mule 3.8Mule 3.8
Mule 3.8
 
Mule esb overview
Mule esb overviewMule esb overview
Mule esb overview
 
Mule esb
Mule esbMule esb
Mule esb
 
Mule reference
Mule referenceMule reference
Mule reference
 
Mule mule agent
Mule  mule agentMule  mule agent
Mule mule agent
 

Viewers also liked

advances in manufacturing technology
 advances in manufacturing technology advances in manufacturing technology
advances in manufacturing technology
balajirao mahendrakar
 
Carnaval
CarnavalCarnaval
Carnavalmsnancy
 
API Layer
API LayerAPI Layer
API Layer
himajareddys
 
Security spring security manager
Security   spring security managerSecurity   spring security manager
Security spring security manager
himajareddys
 
advanced metal forming previous question papers
 advanced metal forming previous question papers advanced metal forming previous question papers
advanced metal forming previous question papers
balajirao mahendrakar
 
Platform As A Service
Platform As A ServicePlatform As A Service
Platform As A Service
Silvestri Consulting
 
Risk assessment
Risk assessmentRisk assessment
Risk assessment
Charlotte Revell
 
Mule – design considerations
Mule – design considerationsMule – design considerations
Mule – design considerations
D.Rajesh Kumar
 
RAVINDER SINGH(updated CV for tech super)
RAVINDER SINGH(updated CV for tech super)RAVINDER SINGH(updated CV for tech super)
RAVINDER SINGH(updated CV for tech super)Ravinder singh
 
Mule security - spring security manager
Mule  security - spring security managerMule  security - spring security manager
Mule security - spring security manager
D.Rajesh Kumar
 
Continuous Integration Bamboo ve Php Uygulaması
Continuous Integration Bamboo ve Php UygulamasıContinuous Integration Bamboo ve Php Uygulaması
Continuous Integration Bamboo ve Php Uygulaması
Mustafa Ileri
 
ADI DAYS - Franco Zanardi
ADI DAYS - Franco ZanardiADI DAYS - Franco Zanardi
ADI DAYS - Franco Zanardi
Zanardi Fonderie S.p.A.
 
Introduction to dataweave
Introduction to dataweaveIntroduction to dataweave
Introduction to dataweave
Swati Deshpande
 
Variables in dataweave
Variables in dataweaveVariables in dataweave
Variables in dataweave
Swati Deshpande
 
Open to What? The future of European education in the digital revolution - Dr...
Open to What?The future of European education in the digital revolution - Dr...Open to What?The future of European education in the digital revolution - Dr...
Open to What? The future of European education in the digital revolution - Dr...
EDEN Digital Learning Europe
 
Ang facebook-bilang-alternatibong-online-strategy-sa-negosyo(final)
Ang facebook-bilang-alternatibong-online-strategy-sa-negosyo(final)Ang facebook-bilang-alternatibong-online-strategy-sa-negosyo(final)
Ang facebook-bilang-alternatibong-online-strategy-sa-negosyo(final)
Lady Pauline Sorongon
 
Independent cinema
Independent cinemaIndependent cinema
Independent cinema
asheigh johnson
 

Viewers also liked (18)

advances in manufacturing technology
 advances in manufacturing technology advances in manufacturing technology
advances in manufacturing technology
 
Carnaval
CarnavalCarnaval
Carnaval
 
API Layer
API LayerAPI Layer
API Layer
 
Security spring security manager
Security   spring security managerSecurity   spring security manager
Security spring security manager
 
advanced metal forming previous question papers
 advanced metal forming previous question papers advanced metal forming previous question papers
advanced metal forming previous question papers
 
CV_Mohamed Mohssen
CV_Mohamed MohssenCV_Mohamed Mohssen
CV_Mohamed Mohssen
 
Platform As A Service
Platform As A ServicePlatform As A Service
Platform As A Service
 
Risk assessment
Risk assessmentRisk assessment
Risk assessment
 
Mule – design considerations
Mule – design considerationsMule – design considerations
Mule – design considerations
 
RAVINDER SINGH(updated CV for tech super)
RAVINDER SINGH(updated CV for tech super)RAVINDER SINGH(updated CV for tech super)
RAVINDER SINGH(updated CV for tech super)
 
Mule security - spring security manager
Mule  security - spring security managerMule  security - spring security manager
Mule security - spring security manager
 
Continuous Integration Bamboo ve Php Uygulaması
Continuous Integration Bamboo ve Php UygulamasıContinuous Integration Bamboo ve Php Uygulaması
Continuous Integration Bamboo ve Php Uygulaması
 
ADI DAYS - Franco Zanardi
ADI DAYS - Franco ZanardiADI DAYS - Franco Zanardi
ADI DAYS - Franco Zanardi
 
Introduction to dataweave
Introduction to dataweaveIntroduction to dataweave
Introduction to dataweave
 
Variables in dataweave
Variables in dataweaveVariables in dataweave
Variables in dataweave
 
Open to What? The future of European education in the digital revolution - Dr...
Open to What?The future of European education in the digital revolution - Dr...Open to What?The future of European education in the digital revolution - Dr...
Open to What? The future of European education in the digital revolution - Dr...
 
Ang facebook-bilang-alternatibong-online-strategy-sa-negosyo(final)
Ang facebook-bilang-alternatibong-online-strategy-sa-negosyo(final)Ang facebook-bilang-alternatibong-online-strategy-sa-negosyo(final)
Ang facebook-bilang-alternatibong-online-strategy-sa-negosyo(final)
 
Independent cinema
Independent cinemaIndependent cinema
Independent cinema
 

Similar to Mule security

Flows in mule
Flows in muleFlows in mule
Flows in mule
Sindhu VL
 
Flowsinmule 160517130818
Flowsinmule 160517130818Flowsinmule 160517130818
Flowsinmule 160517130818
ppts123456
 
Securing mule
Securing   muleSecuring   mule
Securing mule
Sindhu VL
 
Flows in mule
Flows in muleFlows in mule
Flows in mule
Son Nguyen
 
Mule anypoint enterprise security
Mule  anypoint enterprise securityMule  anypoint enterprise security
Mule anypoint enterprise security
D.Rajesh Kumar
 
CamelOne 2013 Karaf A-MQ Camel CXF Security
CamelOne 2013 Karaf A-MQ Camel CXF SecurityCamelOne 2013 Karaf A-MQ Camel CXF Security
CamelOne 2013 Karaf A-MQ Camel CXF Security
Kenneth Peeples
 
Cloud Security Fundamentals Webinar
Cloud Security Fundamentals WebinarCloud Security Fundamentals Webinar
Cloud Security Fundamentals Webinar
Joseph Holbrook, Chief Learning Officer (CLO)
 
Soa Testing An Approach For Testing Security Aspects Of Soa Based Application
Soa Testing   An Approach For Testing Security Aspects Of Soa Based ApplicationSoa Testing   An Approach For Testing Security Aspects Of Soa Based Application
Soa Testing An Approach For Testing Security Aspects Of Soa Based Application
Jaipal Naidu
 
Security again: Web services with mule
Security again: Web services with muleSecurity again: Web services with mule
Security again: Web services with mule
StrawhatLuffy11
 
All about Oracle Security Developer Tools
All about Oracle Security Developer ToolsAll about Oracle Security Developer Tools
All about Oracle Security Developer Tools
sophina_dillard
 
Security Features of different Cloud Service Models: A Review
Security Features of different Cloud Service Models: A ReviewSecurity Features of different Cloud Service Models: A Review
Security Features of different Cloud Service Models: A Review
AM Publications,India
 
SOA Security Model For EAI
SOA Security Model For EAISOA Security Model For EAI
SOA Security Model For EAI
vivekjv
 
Uunit 5-xml&web security
Uunit 5-xml&web securityUunit 5-xml&web security
Uunit 5-xml&web security
ssuser3a47cb
 
ESM v5.0 Service Layer Developer's Guide
ESM v5.0 Service Layer Developer's GuideESM v5.0 Service Layer Developer's Guide
ESM v5.0 Service Layer Developer's Guide
Protect724
 
ESM v5.0 Service Layer Developer's Guide
ESM v5.0 Service Layer Developer's GuideESM v5.0 Service Layer Developer's Guide
ESM v5.0 Service Layer Developer's Guide
Protect724
 
(Pdf) yury chemerkin ita_2013
(Pdf) yury chemerkin ita_2013(Pdf) yury chemerkin ita_2013
(Pdf) yury chemerkin ita_2013STO STRATEGY
 
Anypoint platform cloud
Anypoint platform cloudAnypoint platform cloud
Anypoint platform cloud
Sudheer Y
 
(Pdf) yury chemerkin intelligence_sec_2013
(Pdf) yury chemerkin intelligence_sec_2013(Pdf) yury chemerkin intelligence_sec_2013
(Pdf) yury chemerkin intelligence_sec_2013STO STRATEGY
 
A secure middleware architecture for web services
A secure middleware architecture for web servicesA secure middleware architecture for web services
A secure middleware architecture for web services
Mangalah Gauari Mahaletchnan
 

Similar to Mule security (20)

Flows in mule
Flows in muleFlows in mule
Flows in mule
 
Flowsinmule 160517130818
Flowsinmule 160517130818Flowsinmule 160517130818
Flowsinmule 160517130818
 
Securing mule
Securing   muleSecuring   mule
Securing mule
 
Flows in mule
Flows in muleFlows in mule
Flows in mule
 
Mule anypoint enterprise security
Mule  anypoint enterprise securityMule  anypoint enterprise security
Mule anypoint enterprise security
 
CamelOne 2013 Karaf A-MQ Camel CXF Security
CamelOne 2013 Karaf A-MQ Camel CXF SecurityCamelOne 2013 Karaf A-MQ Camel CXF Security
CamelOne 2013 Karaf A-MQ Camel CXF Security
 
Cloud Security Fundamentals Webinar
Cloud Security Fundamentals WebinarCloud Security Fundamentals Webinar
Cloud Security Fundamentals Webinar
 
Soa Testing An Approach For Testing Security Aspects Of Soa Based Application
Soa Testing   An Approach For Testing Security Aspects Of Soa Based ApplicationSoa Testing   An Approach For Testing Security Aspects Of Soa Based Application
Soa Testing An Approach For Testing Security Aspects Of Soa Based Application
 
Security again: Web services with mule
Security again: Web services with muleSecurity again: Web services with mule
Security again: Web services with mule
 
All about Oracle Security Developer Tools
All about Oracle Security Developer ToolsAll about Oracle Security Developer Tools
All about Oracle Security Developer Tools
 
Security Features of different Cloud Service Models: A Review
Security Features of different Cloud Service Models: A ReviewSecurity Features of different Cloud Service Models: A Review
Security Features of different Cloud Service Models: A Review
 
SOA Security Model For EAI
SOA Security Model For EAISOA Security Model For EAI
SOA Security Model For EAI
 
Uunit 5-xml&web security
Uunit 5-xml&web securityUunit 5-xml&web security
Uunit 5-xml&web security
 
Pattern For Ws Security
Pattern For Ws SecurityPattern For Ws Security
Pattern For Ws Security
 
ESM v5.0 Service Layer Developer's Guide
ESM v5.0 Service Layer Developer's GuideESM v5.0 Service Layer Developer's Guide
ESM v5.0 Service Layer Developer's Guide
 
ESM v5.0 Service Layer Developer's Guide
ESM v5.0 Service Layer Developer's GuideESM v5.0 Service Layer Developer's Guide
ESM v5.0 Service Layer Developer's Guide
 
(Pdf) yury chemerkin ita_2013
(Pdf) yury chemerkin ita_2013(Pdf) yury chemerkin ita_2013
(Pdf) yury chemerkin ita_2013
 
Anypoint platform cloud
Anypoint platform cloudAnypoint platform cloud
Anypoint platform cloud
 
(Pdf) yury chemerkin intelligence_sec_2013
(Pdf) yury chemerkin intelligence_sec_2013(Pdf) yury chemerkin intelligence_sec_2013
(Pdf) yury chemerkin intelligence_sec_2013
 
A secure middleware architecture for web services
A secure middleware architecture for web servicesA secure middleware architecture for web services
A secure middleware architecture for web services
 

More from D.Rajesh Kumar

Mule soft meetup_-_finland_september_25th__2020 v2.0
Mule soft meetup_-_finland_september_25th__2020 v2.0Mule soft meetup_-_finland_september_25th__2020 v2.0
Mule soft meetup_-_finland_september_25th__2020 v2.0
D.Rajesh Kumar
 
Meetup bangalore-sept5th 2020 (1)
Meetup bangalore-sept5th 2020 (1)Meetup bangalore-sept5th 2020 (1)
Meetup bangalore-sept5th 2020 (1)
D.Rajesh Kumar
 
Mule soft meetup_-_finland_july_11th__2020
Mule soft meetup_-_finland_july_11th__2020Mule soft meetup_-_finland_july_11th__2020
Mule soft meetup_-_finland_july_11th__2020
D.Rajesh Kumar
 
Bangalore mulesoft meetup#10
Bangalore mulesoft meetup#10Bangalore mulesoft meetup#10
Bangalore mulesoft meetup#10
D.Rajesh Kumar
 
Meetup bangalore 9_novupdated
Meetup bangalore 9_novupdatedMeetup bangalore 9_novupdated
Meetup bangalore 9_novupdated
D.Rajesh Kumar
 
Meetup bangalore aug31st2019
Meetup bangalore aug31st2019Meetup bangalore aug31st2019
Meetup bangalore aug31st2019
D.Rajesh Kumar
 
Meetup bangalore june29th2019
Meetup bangalore june29th2019Meetup bangalore june29th2019
Meetup bangalore june29th2019
D.Rajesh Kumar
 
mulesoft meetup @ bangalore
mulesoft meetup @ bangaloremulesoft meetup @ bangalore
mulesoft meetup @ bangalore
D.Rajesh Kumar
 
Meetup_Bangalore_Rajesh
Meetup_Bangalore_RajeshMeetup_Bangalore_Rajesh
Meetup_Bangalore_Rajesh
D.Rajesh Kumar
 
Calico and container
Calico and containerCalico and container
Calico and container
D.Rajesh Kumar
 
Calico docker+ipam
Calico docker+ipamCalico docker+ipam
Calico docker+ipam
D.Rajesh Kumar
 
Calico architecture
Calico architectureCalico architecture
Calico architecture
D.Rajesh Kumar
 
Calico to secure host interfaces
Calico to secure host interfacesCalico to secure host interfaces
Calico to secure host interfaces
D.Rajesh Kumar
 
Calico and how interprets neutron api
Calico and how interprets neutron apiCalico and how interprets neutron api
Calico and how interprets neutron api
D.Rajesh Kumar
 
Calico with open stack and chef
Calico with open stack and chefCalico with open stack and chef
Calico with open stack and chef
D.Rajesh Kumar
 
Calico with open stack
Calico with open stackCalico with open stack
Calico with open stack
D.Rajesh Kumar
 
Calico with docker
Calico with dockerCalico with docker
Calico with docker
D.Rajesh Kumar
 
Object Store in Mule
Object Store in MuleObject Store in Mule
Object Store in Mule
D.Rajesh Kumar
 
Slack connector with in MULE
Slack connector with in MULESlack connector with in MULE
Slack connector with in MULE
D.Rajesh Kumar
 
MuleSoft Offers a Data Migration Solution
MuleSoft Offers a Data Migration SolutionMuleSoft Offers a Data Migration Solution
MuleSoft Offers a Data Migration Solution
D.Rajesh Kumar
 

More from D.Rajesh Kumar (20)

Mule soft meetup_-_finland_september_25th__2020 v2.0
Mule soft meetup_-_finland_september_25th__2020 v2.0Mule soft meetup_-_finland_september_25th__2020 v2.0
Mule soft meetup_-_finland_september_25th__2020 v2.0
 
Meetup bangalore-sept5th 2020 (1)
Meetup bangalore-sept5th 2020 (1)Meetup bangalore-sept5th 2020 (1)
Meetup bangalore-sept5th 2020 (1)
 
Mule soft meetup_-_finland_july_11th__2020
Mule soft meetup_-_finland_july_11th__2020Mule soft meetup_-_finland_july_11th__2020
Mule soft meetup_-_finland_july_11th__2020
 
Bangalore mulesoft meetup#10
Bangalore mulesoft meetup#10Bangalore mulesoft meetup#10
Bangalore mulesoft meetup#10
 
Meetup bangalore 9_novupdated
Meetup bangalore 9_novupdatedMeetup bangalore 9_novupdated
Meetup bangalore 9_novupdated
 
Meetup bangalore aug31st2019
Meetup bangalore aug31st2019Meetup bangalore aug31st2019
Meetup bangalore aug31st2019
 
Meetup bangalore june29th2019
Meetup bangalore june29th2019Meetup bangalore june29th2019
Meetup bangalore june29th2019
 
mulesoft meetup @ bangalore
mulesoft meetup @ bangaloremulesoft meetup @ bangalore
mulesoft meetup @ bangalore
 
Meetup_Bangalore_Rajesh
Meetup_Bangalore_RajeshMeetup_Bangalore_Rajesh
Meetup_Bangalore_Rajesh
 
Calico and container
Calico and containerCalico and container
Calico and container
 
Calico docker+ipam
Calico docker+ipamCalico docker+ipam
Calico docker+ipam
 
Calico architecture
Calico architectureCalico architecture
Calico architecture
 
Calico to secure host interfaces
Calico to secure host interfacesCalico to secure host interfaces
Calico to secure host interfaces
 
Calico and how interprets neutron api
Calico and how interprets neutron apiCalico and how interprets neutron api
Calico and how interprets neutron api
 
Calico with open stack and chef
Calico with open stack and chefCalico with open stack and chef
Calico with open stack and chef
 
Calico with open stack
Calico with open stackCalico with open stack
Calico with open stack
 
Calico with docker
Calico with dockerCalico with docker
Calico with docker
 
Object Store in Mule
Object Store in MuleObject Store in Mule
Object Store in Mule
 
Slack connector with in MULE
Slack connector with in MULESlack connector with in MULE
Slack connector with in MULE
 
MuleSoft Offers a Data Migration Solution
MuleSoft Offers a Data Migration SolutionMuleSoft Offers a Data Migration Solution
MuleSoft Offers a Data Migration Solution
 

Recently uploaded

Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !
KatiaHIMEUR1
 
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
Product School
 
UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3
DianaGray10
 
UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4
DianaGray10
 
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
Product School
 
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdfSmart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
91mobiles
 
Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*
Frank van Harmelen
 
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Thierry Lestable
 
When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...
Elena Simperl
 
The Future of Platform Engineering
The Future of Platform EngineeringThe Future of Platform Engineering
The Future of Platform Engineering
Jemma Hussein Allen
 
Monitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR EventsMonitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR Events
Ana-Maria Mihalceanu
 
Assuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyesAssuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyes
ThousandEyes
 
Designing Great Products: The Power of Design and Leadership by Chief Designe...
Designing Great Products: The Power of Design and Leadership by Chief Designe...Designing Great Products: The Power of Design and Leadership by Chief Designe...
Designing Great Products: The Power of Design and Leadership by Chief Designe...
Product School
 
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Ramesh Iyer
 
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
Product School
 
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Tobias Schneck
 
Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........
Alison B. Lowndes
 
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
Sri Ambati
 
JMeter webinar - integration with InfluxDB and Grafana
JMeter webinar - integration with InfluxDB and GrafanaJMeter webinar - integration with InfluxDB and Grafana
JMeter webinar - integration with InfluxDB and Grafana
RTTS
 
PCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase TeamPCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase Team
ControlCase
 

Recently uploaded (20)

Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !
 
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
 
UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3
 
UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4
 
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
 
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdfSmart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
 
Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*
 
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
 
When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...
 
The Future of Platform Engineering
The Future of Platform EngineeringThe Future of Platform Engineering
The Future of Platform Engineering
 
Monitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR EventsMonitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR Events
 
Assuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyesAssuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyes
 
Designing Great Products: The Power of Design and Leadership by Chief Designe...
Designing Great Products: The Power of Design and Leadership by Chief Designe...Designing Great Products: The Power of Design and Leadership by Chief Designe...
Designing Great Products: The Power of Design and Leadership by Chief Designe...
 
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
 
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
 
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
 
Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........
 
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
 
JMeter webinar - integration with InfluxDB and Grafana
JMeter webinar - integration with InfluxDB and GrafanaJMeter webinar - integration with InfluxDB and Grafana
JMeter webinar - integration with InfluxDB and Grafana
 
PCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase TeamPCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase Team
 

Mule security

  • 2. 2 Configuring Security Mule ESB allows you to authenticate requests via endpoints using transport-specific or generic authentication methods. It also allows you to control method-level authorization on your service components. The Security Manager is responsible for authenticating requests based on one or more security providers. All security is pluggable via the Mule security API , so you can easily plug in custom implementations.
  • 3. 3 Spring Security 3.0 Spring Security is the next version of Acegi and provides a number of authentication and authorization providers such as JAAS, LDAP, CAS (Yale Central Authentication service), and DAO. The following topics will help you get started securing your services using Spring Security: •Configuring the Spring Security Manager •Component Authorization Using Spring Security •Setting up LDAP Provider for Spring Security
  • 4. 4 Acegi Acegi provides a number of authentication and authorization providers such as JAAS, LDAP, CAS (Yale Central Authentication service), and DAO. The following topics will help you get started securing your services using Acegi: •Configuring the Acegi Security Manager •Component Authorization Using Acegi •Setting up LDAP Provider for Acegi
  • 5. 5 WS-Security and SAML WS-Security is a standard protocol for applying security to Web services. It contains specifications on how integrity and confidentiality in a SOAP message can be enforced via XML signatures and binary security tokens such as X.509 certificates and Kerberos tickets as well as encryption headers. It ensures end-to-end security by working in the application layer as opposed to the transport layer
  • 6. 6 WS-Security Example The WS-Security example demonstrates the different possibilities available for incorporating WS-Security into your Mule application. This example is available in the enterprise edition of Mule as of version 2.2.3. Enabling WS-Security - Describes how to secure your CXF SOAP endpoints with WS-Security. SAML Module - Mule now supports the SAML standard for exchange of security information between systems. This module is available in the enterprise edition of Mule as of version 2.2.3
  • 7. 7 Other Security Integration Mule also supports the following security technologies: Encryption Strategies - Secure your messages by encrypting them. PGP Security - Secure your messages by encrypting them with PGP. Jaas Security