SlideShare a Scribd company logo
MULE –SAML
2
SAML Module
As of version 2.2.3, Mule enterprise offers support for the Security
Assertion Markup Language (SAML), which is a standard for exchange of
security information between federated systems. For more information on
SAML, see http://saml.xml.org/wiki/saml-wiki-knowledgebase.
3
SAML Module
Current support in Mule is limited to SAML 1.1 and CXF web services only.
Future versions of Mule will support the use of SAML with other transports.
The supported SAML module is only available in the enterprise edition of
Mule, although an unsupported version is available on the MuleForge.
4
Using the SAML Module
This section describes how to configure the SAML module in your Mule
configuration.
Adding the SAML Module JAR
The use the SAML module, the mule-module-saml JAR file must be in a
location on the classpath of your application.
5
Configuring the Security Manager
<mule xmlns:saml="http://www.mulesource.org/schema/mule/saml"
xsi:schemaLocation="http://www.mulesource.org/schema/mule/saml
http://www.mulesource.org/schema/mule/saml/current/mule-saml.xsd">
<!-- Rest of your mule configuration -->
</mule>
6
Next, you configure the SAML security manager as shown below. The
following example starts off with the definition of the SAML security
manager and its accompanying security provider. The security provider
specifies the default security realm to use by security filters if none is
specified. This is especially useful in case you have only one security
realm.
7
<saml:security-manager>
<saml:saml-security-provider name="samlSecurityProvider" default-
realm="senderVouches">
<saml:keystore-provider name="default-key-provider"
key-store-file="classpath:saml.ks"
key-store-type="JKS"
key-store-password="changeit"/>
<saml:sender-vouches-realm name="senderVouches" sign-key-
alias="mulesaml"
sign-key-password="changeit" key-provider-ref="default-key-provider"
resign-assertions="true"/>
<saml:holder-of-key-realm name="holderOfKey" key-provider-
ref="default-key-provider" />
</saml:saml-security-provider>
</saml:security-manager>
8
Within the security provider, you define a key provider, which reads keys
and certificates from a standard Java keystore file. You configure this file
using the normal Spring options to define resources. In this case, the
keystore is read from the classpath.
In this example, two security realms are defined. One uses the sender
vouches SAML scheme and is also the default realm. The other is a holder
of key realm. Both use the same key provider as defined above. For more
information on these realms, see MULE3USER:Choosing a SAML Profile
below.
9
Configuring Security on an Endpoint
Once you've defined a security manager, you can configure security filters
on CXF endpoints as shown in the examples below. The first example does
not specify a security realm, so the default realm is used. Both filters
specify the same certificate that is used to verify the SAML assertions as
issued by the assertion provider.
<saml:cxf-security-filter certificate-alias="mulesaml"/>
<saml:cxf-security-filter certificate-alias="mulesaml" security-realm="non-
default"/>
10
Choosing a SAML Profile
SAML defines two different profiles: Sender-vouches (SV) and Holder-of-
key (HOK).
The Sender Vouches profile means that the sender of a message is
authorized to act for one of its users towards another system. In this case,
the sender of the message vouches its correctness. If both systems trust
each other, this profile is appropriate.
Holder-of-key means that the user himself is authorized to perform the
actions. In this case, the owner (holder) of the key is acting. If your target
system trusts the token issuer (and therefore the user) you'll use Holder-of-
key.
Thank You

More Related Content

PPT
Mule security
PPT
Mule security - saml
PPT
Mule security - saml
PPT
Mule security
PPT
Mule anypoint b2 b
PPTX
Introduction to testing mule
PPT
Mule mule agent
PPT
Mule security
Mule security
Mule security - saml
Mule security - saml
Mule security
Mule anypoint b2 b
Introduction to testing mule
Mule mule agent
Mule security

What's hot (14)

PDF
Mulesoft ppt
PPT
Mule fips
PPTX
Mule expression language - Part 1
PPTX
Mule esb for beginners
PPT
Mule fips 140-2 compliance support
PPTX
Anypoint mq (mulesoft) introduction
PPTX
Munit
PPTX
Mule quartz
PPTX
Flows in mule
PPTX
Mule management console Architecture
PPTX
Mule esb
PPTX
Mule ESB - Intra application communication
PPTX
Mule securing
PPTX
Mulesoft idempotent Message Filter
Mulesoft ppt
Mule fips
Mule expression language - Part 1
Mule esb for beginners
Mule fips 140-2 compliance support
Anypoint mq (mulesoft) introduction
Munit
Mule quartz
Flows in mule
Mule management console Architecture
Mule esb
Mule ESB - Intra application communication
Mule securing
Mulesoft idempotent Message Filter
Ad

Viewers also liked (20)

PDF
Current Tobacco advetise & legal provisions sk 190815
PPT
healthcare toolkit
PDF
Appendix 14
PDF
Is This Really a SAN Problem? Understanding the Performance of Your IO Subsy...
PDF
저작권침해실태 및 경제적효과
DOCX
Resume of Caryl ODowd 09-2016a
DOCX
Task 5 planning
DOCX
Sue's Story - April 5, 1998
PPT
SEcurity ldap for spring security
PPT
Manifest skolskog knjiznicara_2.0
PDF
KC case study
PPT
Anypoint vpc
PPTX
Managing stack traces
ODP
Mule esb availability
PPTX
Github plugin setup in anypointstudio
PPTX
Wsdl connector introduction
PPTX
Building Performant, Reliable, and Scalable Integrations with Mule ESB
PPT
Clustering concepts
Current Tobacco advetise & legal provisions sk 190815
healthcare toolkit
Appendix 14
Is This Really a SAN Problem? Understanding the Performance of Your IO Subsy...
저작권침해실태 및 경제적효과
Resume of Caryl ODowd 09-2016a
Task 5 planning
Sue's Story - April 5, 1998
SEcurity ldap for spring security
Manifest skolskog knjiznicara_2.0
KC case study
Anypoint vpc
Managing stack traces
Mule esb availability
Github plugin setup in anypointstudio
Wsdl connector introduction
Building Performant, Reliable, and Scalable Integrations with Mule ESB
Clustering concepts
Ad

Similar to Mule SAML (20)

PPT
Mule security
PPT
Mule security
PPT
Mule security - pgp
PPT
Mule security - spring security manager
PPT
Security springsecuritymanager-sathyaraj
PPT
Security spring security manager
PPT
Security spring security manager
PPT
Mule with spring security manager
PPTX
Flows in mule
PPTX
Flowsinmule 160517130818
PPT
Spring security integrate with mule
PPTX
Securing mule
PDF
Manual of the CSS Alarm Handler (Beast)
PDF
CENTERA_MIGRATOR_PPT_NOTES
PPTX
Mule architecture
PPTX
Mule architecture
PPTX
Apache Camel framework Presentation and selection of apache camel for various...
ODP
IBM WebSphere MQ for z/OS - Security
PDF
NetSim VANET User Manual
PDF
CamelOne 2013 Karaf A-MQ Camel CXF Security
Mule security
Mule security
Mule security - pgp
Mule security - spring security manager
Security springsecuritymanager-sathyaraj
Security spring security manager
Security spring security manager
Mule with spring security manager
Flows in mule
Flowsinmule 160517130818
Spring security integrate with mule
Securing mule
Manual of the CSS Alarm Handler (Beast)
CENTERA_MIGRATOR_PPT_NOTES
Mule architecture
Mule architecture
Apache Camel framework Presentation and selection of apache camel for various...
IBM WebSphere MQ for z/OS - Security
NetSim VANET User Manual
CamelOne 2013 Karaf A-MQ Camel CXF Security

More from D.Rajesh Kumar (20)

PPTX
Mule soft meetup_-_finland_september_25th__2020 v2.0
PPTX
Meetup bangalore-sept5th 2020 (1)
PPTX
Mule soft meetup_-_finland_july_11th__2020
PPTX
Bangalore mulesoft meetup#10
PPTX
Meetup bangalore 9_novupdated
PPTX
Meetup bangalore aug31st2019
PPTX
Meetup bangalore june29th2019
PPTX
mulesoft meetup @ bangalore
PPTX
Meetup_Bangalore_Rajesh
PPT
Calico and container
PPT
Calico docker+ipam
PPT
Calico architecture
PPT
Calico to secure host interfaces
PPT
Calico and how interprets neutron api
PPT
Calico with open stack and chef
PPT
Calico with open stack
PPT
Calico with docker
PPT
Object Store in Mule
PPT
Slack connector with in MULE
PPT
MuleSoft Offers a Data Migration Solution
Mule soft meetup_-_finland_september_25th__2020 v2.0
Meetup bangalore-sept5th 2020 (1)
Mule soft meetup_-_finland_july_11th__2020
Bangalore mulesoft meetup#10
Meetup bangalore 9_novupdated
Meetup bangalore aug31st2019
Meetup bangalore june29th2019
mulesoft meetup @ bangalore
Meetup_Bangalore_Rajesh
Calico and container
Calico docker+ipam
Calico architecture
Calico to secure host interfaces
Calico and how interprets neutron api
Calico with open stack and chef
Calico with open stack
Calico with docker
Object Store in Mule
Slack connector with in MULE
MuleSoft Offers a Data Migration Solution

Recently uploaded (20)

PPTX
20250228 LYD VKU AI Blended-Learning.pptx
PDF
Mobile App Security Testing_ A Comprehensive Guide.pdf
PPTX
Cloud computing and distributed systems.
PDF
Chapter 3 Spatial Domain Image Processing.pdf
PDF
Electronic commerce courselecture one. Pdf
PDF
Spectral efficient network and resource selection model in 5G networks
PDF
7 ChatGPT Prompts to Help You Define Your Ideal Customer Profile.pdf
PDF
Shreyas Phanse Resume: Experienced Backend Engineer | Java • Spring Boot • Ka...
PDF
Bridging biosciences and deep learning for revolutionary discoveries: a compr...
PDF
The Rise and Fall of 3GPP – Time for a Sabbatical?
PDF
Advanced methodologies resolving dimensionality complications for autism neur...
PDF
Unlocking AI with Model Context Protocol (MCP)
PPTX
A Presentation on Artificial Intelligence
PPTX
KOM of Painting work and Equipment Insulation REV00 update 25-dec.pptx
PPTX
Big Data Technologies - Introduction.pptx
PDF
KodekX | Application Modernization Development
PDF
Modernizing your data center with Dell and AMD
PPTX
Detection-First SIEM: Rule Types, Dashboards, and Threat-Informed Strategy
PPT
Teaching material agriculture food technology
PDF
NewMind AI Monthly Chronicles - July 2025
20250228 LYD VKU AI Blended-Learning.pptx
Mobile App Security Testing_ A Comprehensive Guide.pdf
Cloud computing and distributed systems.
Chapter 3 Spatial Domain Image Processing.pdf
Electronic commerce courselecture one. Pdf
Spectral efficient network and resource selection model in 5G networks
7 ChatGPT Prompts to Help You Define Your Ideal Customer Profile.pdf
Shreyas Phanse Resume: Experienced Backend Engineer | Java • Spring Boot • Ka...
Bridging biosciences and deep learning for revolutionary discoveries: a compr...
The Rise and Fall of 3GPP – Time for a Sabbatical?
Advanced methodologies resolving dimensionality complications for autism neur...
Unlocking AI with Model Context Protocol (MCP)
A Presentation on Artificial Intelligence
KOM of Painting work and Equipment Insulation REV00 update 25-dec.pptx
Big Data Technologies - Introduction.pptx
KodekX | Application Modernization Development
Modernizing your data center with Dell and AMD
Detection-First SIEM: Rule Types, Dashboards, and Threat-Informed Strategy
Teaching material agriculture food technology
NewMind AI Monthly Chronicles - July 2025

Mule SAML

  • 2. 2 SAML Module As of version 2.2.3, Mule enterprise offers support for the Security Assertion Markup Language (SAML), which is a standard for exchange of security information between federated systems. For more information on SAML, see http://saml.xml.org/wiki/saml-wiki-knowledgebase.
  • 3. 3 SAML Module Current support in Mule is limited to SAML 1.1 and CXF web services only. Future versions of Mule will support the use of SAML with other transports. The supported SAML module is only available in the enterprise edition of Mule, although an unsupported version is available on the MuleForge.
  • 4. 4 Using the SAML Module This section describes how to configure the SAML module in your Mule configuration. Adding the SAML Module JAR The use the SAML module, the mule-module-saml JAR file must be in a location on the classpath of your application.
  • 5. 5 Configuring the Security Manager <mule xmlns:saml="http://www.mulesource.org/schema/mule/saml" xsi:schemaLocation="http://www.mulesource.org/schema/mule/saml http://www.mulesource.org/schema/mule/saml/current/mule-saml.xsd"> <!-- Rest of your mule configuration --> </mule>
  • 6. 6 Next, you configure the SAML security manager as shown below. The following example starts off with the definition of the SAML security manager and its accompanying security provider. The security provider specifies the default security realm to use by security filters if none is specified. This is especially useful in case you have only one security realm.
  • 7. 7 <saml:security-manager> <saml:saml-security-provider name="samlSecurityProvider" default- realm="senderVouches"> <saml:keystore-provider name="default-key-provider" key-store-file="classpath:saml.ks" key-store-type="JKS" key-store-password="changeit"/> <saml:sender-vouches-realm name="senderVouches" sign-key- alias="mulesaml" sign-key-password="changeit" key-provider-ref="default-key-provider" resign-assertions="true"/> <saml:holder-of-key-realm name="holderOfKey" key-provider- ref="default-key-provider" /> </saml:saml-security-provider> </saml:security-manager>
  • 8. 8 Within the security provider, you define a key provider, which reads keys and certificates from a standard Java keystore file. You configure this file using the normal Spring options to define resources. In this case, the keystore is read from the classpath. In this example, two security realms are defined. One uses the sender vouches SAML scheme and is also the default realm. The other is a holder of key realm. Both use the same key provider as defined above. For more information on these realms, see MULE3USER:Choosing a SAML Profile below.
  • 9. 9 Configuring Security on an Endpoint Once you've defined a security manager, you can configure security filters on CXF endpoints as shown in the examples below. The first example does not specify a security realm, so the default realm is used. Both filters specify the same certificate that is used to verify the SAML assertions as issued by the assertion provider. <saml:cxf-security-filter certificate-alias="mulesaml"/> <saml:cxf-security-filter certificate-alias="mulesaml" security-realm="non- default"/>
  • 10. 10 Choosing a SAML Profile SAML defines two different profiles: Sender-vouches (SV) and Holder-of- key (HOK). The Sender Vouches profile means that the sender of a message is authorized to act for one of its users towards another system. In this case, the sender of the message vouches its correctness. If both systems trust each other, this profile is appropriate. Holder-of-key means that the user himself is authorized to perform the actions. In this case, the owner (holder) of the key is acting. If your target system trusts the token issuer (and therefore the user) you'll use Holder-of- key.