SlideShare a Scribd company logo
Securing - Mule
Presented By
Sindhu VL
Securing Steps :
 Anypoint Enterprise Security
 Configuring Security
 FIPS 140-2 Compliance Support
1. Anypoint Enterprise Security :
 Anypoint Enterprise Security is a
collection of security features that
enforce secure access to information in
Mule applications.
 This suite of security features provides
various methods for applying security to
Mule Service-Oriented Architecture
(SOA) implementations and Web
services. The following security features
bridge gaps between trust boundaries in
applications:
 Mule Secure Token Service (STS)
OAuth 2.0a Provider
 Mule Credentials Vault
 Mule Message Encryption Processor
 Mule Digital Signature Processor
 Mule Filter Processor
 Mule CRC32 Processor
Why Do Applications Need
Security?
 Businesses must ensure that the valuable information
they store and make available through software
applications and Web services is secure. Locked away
and protected from unauthorized users and malicious
attackers, protected resources — such as credit card
information or Social Security numbers — must still be
accessible to authorized legitimate users and systems
in order to conduct business transactions.
 To provide secure access to information, applications
and services can apply a variety of security measures.
The suite of security features in Anypoint Enterprise
Security enables developers to protect applications
according to security requirements, prevent security
breaches and facilitate authorized access to data.
Advantages of Anypoint
Enterprise Security :
 Anypoint Enterprise Security adds new features
on top of of Mule ESB Enterprise’s existing
security capabilities. Mule ESB already provides
the following security features:
 Mule Security Manager, client authentication and
authorization on inbound requests as well as
credential mapping for outbound calls
 LDAP and third party identity
management system integration
 Validation of inbound requests through the SAML
2.0 federated identity standard
 Secure FTP (SFTP) Transport that enables Mule
flows to read and write to remote directories over
the SSH protocol.
Mule Credentials Vault :
 Mule can encrypt properties in a
.properties file. The .properties file in
Mule stores data as key-value pairs.
Mule flows may access this data —
usernames, first and last names, credit
card information — as the flow
processes messages. In the context of
Anypoint Enterprise Security, Mule refers
to the .properties file in which it safely
stores encrypted properties as the Mule
Credentials Vault.
 Encrypt a properties file
Mule Message Encryption
Processor :
 Mule can encrypt an entire payload or
several fields of data within a message.
Where sensitive information must move
between users, yet remain hidden from
them, a developer can encrypt message
content to prevent unauthorized access.
Typically, you may need to encrypt data
such as a password, credit card number
or social security number (SSN).
 Encrypt a message payload
Decrypt a message payload
Mule Digital Signature Processor
:
 Mule uses digital signatures to ensure that
messages maintain integrity and authenticity.
Mule can verify that an incoming Web service
request originates from a valid source, and
can sign an outgoing Web service response
to ensure its contents. Digital signatures
ensure that a sender is valid, that a message
is not modified in transit between Web
services, and that no unauthorized user has
tampered with a message.
 Add a digital signature to a message in Mule
Sign part of a message payload
Verify a digital signature in Mule
Mule Filter Processor :
 Mule can filter messages it receives to
avoid processing invalid ones. With a
filter processor in place, Mule discards
any message it receives that does not
match the filter’s parameters — a
message from outside a set range of
IP addresses, for example.
 Filter unsecure messages
Mule CRC32 Processor :
 Mule can apply a cyclic redundancy check (CRC) to
messages to ensure message integrity. CRC uses an
algorithm to apply a check value to a message when it
enters a system, and verifies the value when the
message leaves the system. If the entry and exit values
do not match, CRC marks the message as changed.
Generally, CRC32 (32 indicates the 33-bit polynomial
length in the algorithm) detects unintentional changes to
messages, such as the accumulation of “noise”
between transmission points, but it can also detect
unauthorized intentional changes – for instance,
flagging a message that has been tampered with during
transmission to change it into a Trojan horse.
 Apply a CRC to a message
2. Configuring Security :
 Mule ESB allows you to authenticate
requests via connectors using transport-
specific or generic authentication methods. It
also allows you to control method-level
authorization on your components. The
Security Manager is responsible for
authenticating requests based on one or
more security providers.
 For information on the elements you can
configure for the Security Manager,
seeSecurity Manager Configuration
Reference. The following sections provide
links to information on configuring different
types of security managers.
Spring Security 3.0 :
 Spring Security is the next version of Acegi
and provides a number of authentication and
authorization providers such as JAAS, LDAP,
CAS (Yale Central Authentication service),
and DAO. The following topics will help you
get started securing your flows using Spring
Security:
 Configuring the Spring Security Manager
 Component Authorization Using Spring
Security
 Setting up LDAP Provider for Spring Security
WS-Security and SAML :
 WS-Security is a standard protocol for applying security
to Web services. It contains specifications on how
integrity and confidentiality in a SOAP message can be
enforced via XML signatures and binary security tokens
such as X.509 certificates and Kerberos tickets as well
as encryption headers. It ensures end-to-end security
by working in the application layer as opposed to the
transport layer. Mule provides the following resources
for WS-Security:
 Enabling WS-Security - Describes how to secure your
CXF connectors with WS-Security.
 SAML Module - Mule now supports the SAML standard
for exchange of security information between systems.
This module is available in the enterprise edition of
Mule as of version 2.2.3
Other Security Integration :
 Mule also supports the following
security technologies:
 Encryption Strategies - Secure your
messages by encrypting them.
 PGP Security - Secure your messages
by encrypting them with PGP.
 Jaas Security
3. FIPS 140-2 Compliance
Support :
 As of Mule 3.5.0, Mule ESB can be
configured to run in a FIPS 140-2
certified environment. Note that Mule
does not run in FIPS security mode by
default. There are two requirements:
 Have a certified cryptography module
installed in your Java environment
 Adjust Mule ESB settings to run in
FIPS security mode
Thank You!!!!!!

More Related Content

PPTX
Mule enterprise security
PPTX
Anypoint enterprise security overview
PPTX
Mule securing
PPT
Mule cloudhub
PPTX
Mule Security
PPT
Anypoint data gateway
PPTX
Flows in mule
PPT
Mule salesforce integration solutions
Mule enterprise security
Anypoint enterprise security overview
Mule securing
Mule cloudhub
Mule Security
Anypoint data gateway
Flows in mule
Mule salesforce integration solutions

What's hot (19)

PPT
Mule anypoint enterprise security
PPT
Anypoint data gateway
PPT
Mule esb api layer
PPT
Mule security-jaas
PPT
Mule security - jaas
PPT
Mule security
PPT
Mule oracle connectors
PPT
Mule architecture
PPTX
Mule esb
PPTX
Mule introduction
PPT
Mule esb-connectors
PPTX
Mule MMC Integration with LDAP
PPT
Mule anypoint data gateway
PPT
MULE-JAAS
PPT
Mule mule agent
PPT
Mule salesforce integration patterns
PPT
Filters in Mulesoft
PPT
Mule anypoint b2 b
PPT
Mule ESB
Mule anypoint enterprise security
Anypoint data gateway
Mule esb api layer
Mule security-jaas
Mule security - jaas
Mule security
Mule oracle connectors
Mule architecture
Mule esb
Mule introduction
Mule esb-connectors
Mule MMC Integration with LDAP
Mule anypoint data gateway
MULE-JAAS
Mule mule agent
Mule salesforce integration patterns
Filters in Mulesoft
Mule anypoint b2 b
Mule ESB
Ad

Similar to Securing mule (20)

PPTX
Flowsinmule 160517130818
PPTX
Flows in mule
ODP
Anypoint platform security components
PPTX
Mule security
PPTX
Anypoint enterprise security
PPT
Mule security
PPT
Mule security
ODP
Security in mulesoft
PPT
Mule security
PPT
Mule security - pgp
ODP
Mule security
PPTX
Mule soft Meetup #3
PPTX
Baltimore jan2019 mule4
PPT
Mule anypointenterprisesecurity
PPT
Mule security - saml
PPT
Mule security - saml
PPT
Mule security saml
PPT
Mule security saml
PPT
Mule security saml
PPT
Mule security saml
Flowsinmule 160517130818
Flows in mule
Anypoint platform security components
Mule security
Anypoint enterprise security
Mule security
Mule security
Security in mulesoft
Mule security
Mule security - pgp
Mule security
Mule soft Meetup #3
Baltimore jan2019 mule4
Mule anypointenterprisesecurity
Mule security - saml
Mule security - saml
Mule security saml
Mule security saml
Mule security saml
Mule security saml
Ad

More from Sindhu VL (20)

PPTX
Mule - error handling
PPTX
Mule - beginners guide
PPTX
Core concepts - mule
PPTX
Error handling with respect to mule
PPTX
Core concepts in mule
PPTX
Basics of mule for beginners
PPTX
Mule testing
PPTX
Mule debugging
PPTX
Service orchestration by using flows
PPTX
Configuration patterns in mule
PPTX
Bindings of components in mule
PPTX
Using maven with mule
PPTX
Using mule configuration patterns
PPTX
Using flows for service orchestration
PPTX
Component bindings in mule
PPTX
Mule requestor component
PPTX
Encrption in mule
PPTX
Concepts in mule
PPTX
Enterprise service bus mule
PPTX
Mule errors
Mule - error handling
Mule - beginners guide
Core concepts - mule
Error handling with respect to mule
Core concepts in mule
Basics of mule for beginners
Mule testing
Mule debugging
Service orchestration by using flows
Configuration patterns in mule
Bindings of components in mule
Using maven with mule
Using mule configuration patterns
Using flows for service orchestration
Component bindings in mule
Mule requestor component
Encrption in mule
Concepts in mule
Enterprise service bus mule
Mule errors

Recently uploaded (20)

PPTX
ENG4-Q2-W5-PPT (1).pptx nhdedhhehejjedheh
PDF
Govind singh Corporate office interior Portfolio
PPT
robotS AND ROBOTICSOF HUMANS AND MACHINES
PPTX
Acoustics new a better way to learn sound science
PPTX
VERNACULAR_DESIGN_PPT FINAL WITH PROPOSED PLAN.pptx
PPTX
PROPOSAL tentang PLN di metode pelaksanaan.pptx
PDF
Social Media USAGE .............................................................
PDF
intro_to_rust.pptx_123456789012446789.pdf
PPTX
Presentation1.pptxnmnmnmnjhjhkjkjkkjkjjk
PPTX
22CDH01-V3-UNIT III-UX-UI for Immersive Design
PPTX
CLASS_11_BUSINESS_STUDIES_PPT_CHAPTER_1_Business_Trade_Commerce.pptx
PPTX
2. Competency Based Interviewing - September'16.pptx
PPTX
Necrosgwjskdnbsjdmdndmkdndndnmdndndkdmdndkdkndmdmis.pptx
PPTX
LITERATURE CASE STUDY DESIGN SEMESTER 5.pptx
PPTX
Acoustics new for. Sound insulation and absorber
PPT
aksharma-dfs.pptgfgfgdfgdgdfgdfgdgdrgdgdgdgdgdgadgdgd
PDF
321 LIBRARY DESIGN.pdf43354445t6556t5656
PPTX
UNIT III - GRAPHICS AND AUDIO FOR MOBILE
PPT
WHY_R12 Uaafafafpgradeaffafafafaffff.ppt
PPTX
8086.pptx microprocessor and microcontroller
ENG4-Q2-W5-PPT (1).pptx nhdedhhehejjedheh
Govind singh Corporate office interior Portfolio
robotS AND ROBOTICSOF HUMANS AND MACHINES
Acoustics new a better way to learn sound science
VERNACULAR_DESIGN_PPT FINAL WITH PROPOSED PLAN.pptx
PROPOSAL tentang PLN di metode pelaksanaan.pptx
Social Media USAGE .............................................................
intro_to_rust.pptx_123456789012446789.pdf
Presentation1.pptxnmnmnmnjhjhkjkjkkjkjjk
22CDH01-V3-UNIT III-UX-UI for Immersive Design
CLASS_11_BUSINESS_STUDIES_PPT_CHAPTER_1_Business_Trade_Commerce.pptx
2. Competency Based Interviewing - September'16.pptx
Necrosgwjskdnbsjdmdndmkdndndnmdndndkdmdndkdkndmdmis.pptx
LITERATURE CASE STUDY DESIGN SEMESTER 5.pptx
Acoustics new for. Sound insulation and absorber
aksharma-dfs.pptgfgfgdfgdgdfgdfgdgdrgdgdgdgdgdgadgdgd
321 LIBRARY DESIGN.pdf43354445t6556t5656
UNIT III - GRAPHICS AND AUDIO FOR MOBILE
WHY_R12 Uaafafafpgradeaffafafafaffff.ppt
8086.pptx microprocessor and microcontroller

Securing mule

  • 2. Securing Steps :  Anypoint Enterprise Security  Configuring Security  FIPS 140-2 Compliance Support
  • 3. 1. Anypoint Enterprise Security :  Anypoint Enterprise Security is a collection of security features that enforce secure access to information in Mule applications.  This suite of security features provides various methods for applying security to Mule Service-Oriented Architecture (SOA) implementations and Web services. The following security features bridge gaps between trust boundaries in applications:
  • 4.  Mule Secure Token Service (STS) OAuth 2.0a Provider  Mule Credentials Vault  Mule Message Encryption Processor  Mule Digital Signature Processor  Mule Filter Processor  Mule CRC32 Processor
  • 5. Why Do Applications Need Security?  Businesses must ensure that the valuable information they store and make available through software applications and Web services is secure. Locked away and protected from unauthorized users and malicious attackers, protected resources — such as credit card information or Social Security numbers — must still be accessible to authorized legitimate users and systems in order to conduct business transactions.  To provide secure access to information, applications and services can apply a variety of security measures. The suite of security features in Anypoint Enterprise Security enables developers to protect applications according to security requirements, prevent security breaches and facilitate authorized access to data.
  • 6. Advantages of Anypoint Enterprise Security :  Anypoint Enterprise Security adds new features on top of of Mule ESB Enterprise’s existing security capabilities. Mule ESB already provides the following security features:  Mule Security Manager, client authentication and authorization on inbound requests as well as credential mapping for outbound calls  LDAP and third party identity management system integration  Validation of inbound requests through the SAML 2.0 federated identity standard  Secure FTP (SFTP) Transport that enables Mule flows to read and write to remote directories over the SSH protocol.
  • 7. Mule Credentials Vault :  Mule can encrypt properties in a .properties file. The .properties file in Mule stores data as key-value pairs. Mule flows may access this data — usernames, first and last names, credit card information — as the flow processes messages. In the context of Anypoint Enterprise Security, Mule refers to the .properties file in which it safely stores encrypted properties as the Mule Credentials Vault.  Encrypt a properties file
  • 8. Mule Message Encryption Processor :  Mule can encrypt an entire payload or several fields of data within a message. Where sensitive information must move between users, yet remain hidden from them, a developer can encrypt message content to prevent unauthorized access. Typically, you may need to encrypt data such as a password, credit card number or social security number (SSN).  Encrypt a message payload Decrypt a message payload
  • 9. Mule Digital Signature Processor :  Mule uses digital signatures to ensure that messages maintain integrity and authenticity. Mule can verify that an incoming Web service request originates from a valid source, and can sign an outgoing Web service response to ensure its contents. Digital signatures ensure that a sender is valid, that a message is not modified in transit between Web services, and that no unauthorized user has tampered with a message.  Add a digital signature to a message in Mule Sign part of a message payload Verify a digital signature in Mule
  • 10. Mule Filter Processor :  Mule can filter messages it receives to avoid processing invalid ones. With a filter processor in place, Mule discards any message it receives that does not match the filter’s parameters — a message from outside a set range of IP addresses, for example.  Filter unsecure messages
  • 11. Mule CRC32 Processor :  Mule can apply a cyclic redundancy check (CRC) to messages to ensure message integrity. CRC uses an algorithm to apply a check value to a message when it enters a system, and verifies the value when the message leaves the system. If the entry and exit values do not match, CRC marks the message as changed. Generally, CRC32 (32 indicates the 33-bit polynomial length in the algorithm) detects unintentional changes to messages, such as the accumulation of “noise” between transmission points, but it can also detect unauthorized intentional changes – for instance, flagging a message that has been tampered with during transmission to change it into a Trojan horse.  Apply a CRC to a message
  • 12. 2. Configuring Security :  Mule ESB allows you to authenticate requests via connectors using transport- specific or generic authentication methods. It also allows you to control method-level authorization on your components. The Security Manager is responsible for authenticating requests based on one or more security providers.  For information on the elements you can configure for the Security Manager, seeSecurity Manager Configuration Reference. The following sections provide links to information on configuring different types of security managers.
  • 13. Spring Security 3.0 :  Spring Security is the next version of Acegi and provides a number of authentication and authorization providers such as JAAS, LDAP, CAS (Yale Central Authentication service), and DAO. The following topics will help you get started securing your flows using Spring Security:  Configuring the Spring Security Manager  Component Authorization Using Spring Security  Setting up LDAP Provider for Spring Security
  • 14. WS-Security and SAML :  WS-Security is a standard protocol for applying security to Web services. It contains specifications on how integrity and confidentiality in a SOAP message can be enforced via XML signatures and binary security tokens such as X.509 certificates and Kerberos tickets as well as encryption headers. It ensures end-to-end security by working in the application layer as opposed to the transport layer. Mule provides the following resources for WS-Security:  Enabling WS-Security - Describes how to secure your CXF connectors with WS-Security.  SAML Module - Mule now supports the SAML standard for exchange of security information between systems. This module is available in the enterprise edition of Mule as of version 2.2.3
  • 15. Other Security Integration :  Mule also supports the following security technologies:  Encryption Strategies - Secure your messages by encrypting them.  PGP Security - Secure your messages by encrypting them with PGP.  Jaas Security
  • 16. 3. FIPS 140-2 Compliance Support :  As of Mule 3.5.0, Mule ESB can be configured to run in a FIPS 140-2 certified environment. Note that Mule does not run in FIPS security mode by default. There are two requirements:  Have a certified cryptography module installed in your Java environment  Adjust Mule ESB settings to run in FIPS security mode