SlideShare a Scribd company logo
Signature Security Feature
Mule
1. Sign Signature
2. Verify Signature
Mule Digital Signature Processor
• The Mule Digital Signature Processor adds a digital
signature to a message payload, or part of the
payload, to prove the identity of the message’s
sender. Mule can also verify a signature on a
message it receives to confirm the authenticity of the
message’s sender. To sign or verify the signature of a
message, Mule uses one of the following two Digital
Signature Strategies:
• JCE Signer
• XML Signer
Adding a Digital JCE Signature to a
Message
• HTTP Connector
• Convent String to Byte Array(This is required
because mule sign on byte array format)
• Sign the message payload
Global Signature configuration
information
• Set JCE_SIGNER as default Signer, Other option is XML_SIGHNER
Global Signature configuration
information
• Select Jce Signer Tab
• Select Radio Button – Define attribute
• Algorithm – HmacMD5
• Key – Sample value
Sign Signature
• Connector Configuration done at last slide
• Operation will be Sign
• Input reference is payload, data that will be signed
• Variable, signed value will be stored by mule signature
Sign Signature Flow
Sample URL :http://localhost:8081/sign , body Contain sunil as text
“sunil” signature will be generated
Verify Signature
• Connector Configuration same as done for sign signature
• Operation will be “Verify Signature”
• Input reference is actual value of signature
• Expected Signature will contain the signature that need to be verified
Verify Signature Flow
Sample URL :
http://localhost:8081/verifySignature?user=sunil&token=7i3AoaN5hJih8AEH9bUxag
==
Verify sunil signature passed in token
Verify Signature Flow
Sample URL :
http://localhost:8081/verifySignature?user=sunil&token=7i3AoaN5hJih8AEH9bUxag
==
Verify sunil signature passed in token

More Related Content

PPTX
Mule digital signature processor
PPT
Digital signaturepattern 10 30
PPT
03-SSL (1).ppt03-SSL (1).ppt03-SSL (1).ppt03-SSL (1).ppt03-SSL (1).ppt03-SSL ...
PPT
this is ppt this is ppt this is ppt this is ppt
PPT
03-SSL (2).ppt
PPT
03-SSL (1).ppt
PPTX
Flows in mule
PDF
Network Security CS2
Mule digital signature processor
Digital signaturepattern 10 30
03-SSL (1).ppt03-SSL (1).ppt03-SSL (1).ppt03-SSL (1).ppt03-SSL (1).ppt03-SSL ...
this is ppt this is ppt this is ppt this is ppt
03-SSL (2).ppt
03-SSL (1).ppt
Flows in mule
Network Security CS2

Similar to Signature Security mule (20)

PPTX
Mule Security
PPTX
Flowsinmule 160517130818
PPTX
unit - III.pptx
PPT
Secure socket later
PPT
Digital signature
PPTX
Flows in mule
PDF
Unit 4_SSL_Handshake Protocol_Record Layer Protocol.pdf
PPTX
Anypoint enterprise security overview
PPT
Secure Socket Layer.ppt [ssl for websecurity]
PPT
Secure Mobile Payment
PPT
ngrubksgj.pptdagji;jgisofjapfjagiahguhkg
KEY
SWID Tag Creation Tool
PPTX
SSL And TLS
PDF
M11 - Securing your MQ environment. Integration technical conference 2019
PPTX
The Fundamental of Secure Socket Layer (SSL)
PPTX
Fundamental of Secure Socket Layer (SSl) | Part - 1
PPT
cryptography and network security thid.ppt
PPTX
Astute's PeopleSoft Integration Testing Utilities and Tools Implementation
PPTX
Securing mule
PPT
2 - IP Security2 - IP Security2 - IP Security2 - IP Security
Mule Security
Flowsinmule 160517130818
unit - III.pptx
Secure socket later
Digital signature
Flows in mule
Unit 4_SSL_Handshake Protocol_Record Layer Protocol.pdf
Anypoint enterprise security overview
Secure Socket Layer.ppt [ssl for websecurity]
Secure Mobile Payment
ngrubksgj.pptdagji;jgisofjapfjagiahguhkg
SWID Tag Creation Tool
SSL And TLS
M11 - Securing your MQ environment. Integration technical conference 2019
The Fundamental of Secure Socket Layer (SSL)
Fundamental of Secure Socket Layer (SSl) | Part - 1
cryptography and network security thid.ppt
Astute's PeopleSoft Integration Testing Utilities and Tools Implementation
Securing mule
2 - IP Security2 - IP Security2 - IP Security2 - IP Security
Ad

More from Sunil Kumar (9)

PPT
Distributed Locking in Mule
PPT
IP Based Security Filter in Mule
PPT
Time based Security Filter in Mule
PPT
Parallel processing for splitter in mule esb
PPT
Start stop mule flow using java
PPT
Find Number of VM message in Mule
PPT
Vm file store
PPT
Custom transformer and annotation
PPT
Custom processor
Distributed Locking in Mule
IP Based Security Filter in Mule
Time based Security Filter in Mule
Parallel processing for splitter in mule esb
Start stop mule flow using java
Find Number of VM message in Mule
Vm file store
Custom transformer and annotation
Custom processor
Ad

Recently uploaded (20)

PDF
Network Security Unit 5.pdf for BCA BBA.
PDF
Spectral efficient network and resource selection model in 5G networks
PPTX
Spectroscopy.pptx food analysis technology
PDF
Agricultural_Statistics_at_a_Glance_2022_0.pdf
PPTX
Programs and apps: productivity, graphics, security and other tools
PDF
Mobile App Security Testing_ A Comprehensive Guide.pdf
PDF
Encapsulation theory and applications.pdf
PDF
Review of recent advances in non-invasive hemoglobin estimation
PDF
Per capita expenditure prediction using model stacking based on satellite ima...
PPTX
MYSQL Presentation for SQL database connectivity
PDF
Diabetes mellitus diagnosis method based random forest with bat algorithm
PDF
NewMind AI Weekly Chronicles - August'25-Week II
PDF
Encapsulation_ Review paper, used for researhc scholars
PDF
Chapter 3 Spatial Domain Image Processing.pdf
PPT
“AI and Expert System Decision Support & Business Intelligence Systems”
PPTX
Digital-Transformation-Roadmap-for-Companies.pptx
PDF
Electronic commerce courselecture one. Pdf
PDF
Unlocking AI with Model Context Protocol (MCP)
PDF
A comparative analysis of optical character recognition models for extracting...
PDF
TokAI - TikTok AI Agent : The First AI Application That Analyzes 10,000+ Vira...
Network Security Unit 5.pdf for BCA BBA.
Spectral efficient network and resource selection model in 5G networks
Spectroscopy.pptx food analysis technology
Agricultural_Statistics_at_a_Glance_2022_0.pdf
Programs and apps: productivity, graphics, security and other tools
Mobile App Security Testing_ A Comprehensive Guide.pdf
Encapsulation theory and applications.pdf
Review of recent advances in non-invasive hemoglobin estimation
Per capita expenditure prediction using model stacking based on satellite ima...
MYSQL Presentation for SQL database connectivity
Diabetes mellitus diagnosis method based random forest with bat algorithm
NewMind AI Weekly Chronicles - August'25-Week II
Encapsulation_ Review paper, used for researhc scholars
Chapter 3 Spatial Domain Image Processing.pdf
“AI and Expert System Decision Support & Business Intelligence Systems”
Digital-Transformation-Roadmap-for-Companies.pptx
Electronic commerce courselecture one. Pdf
Unlocking AI with Model Context Protocol (MCP)
A comparative analysis of optical character recognition models for extracting...
TokAI - TikTok AI Agent : The First AI Application That Analyzes 10,000+ Vira...

Signature Security mule

  • 1. Signature Security Feature Mule 1. Sign Signature 2. Verify Signature
  • 2. Mule Digital Signature Processor • The Mule Digital Signature Processor adds a digital signature to a message payload, or part of the payload, to prove the identity of the message’s sender. Mule can also verify a signature on a message it receives to confirm the authenticity of the message’s sender. To sign or verify the signature of a message, Mule uses one of the following two Digital Signature Strategies: • JCE Signer • XML Signer
  • 3. Adding a Digital JCE Signature to a Message • HTTP Connector • Convent String to Byte Array(This is required because mule sign on byte array format) • Sign the message payload
  • 4. Global Signature configuration information • Set JCE_SIGNER as default Signer, Other option is XML_SIGHNER
  • 5. Global Signature configuration information • Select Jce Signer Tab • Select Radio Button – Define attribute • Algorithm – HmacMD5 • Key – Sample value
  • 6. Sign Signature • Connector Configuration done at last slide • Operation will be Sign • Input reference is payload, data that will be signed • Variable, signed value will be stored by mule signature
  • 7. Sign Signature Flow Sample URL :http://localhost:8081/sign , body Contain sunil as text “sunil” signature will be generated
  • 8. Verify Signature • Connector Configuration same as done for sign signature • Operation will be “Verify Signature” • Input reference is actual value of signature • Expected Signature will contain the signature that need to be verified
  • 9. Verify Signature Flow Sample URL : http://localhost:8081/verifySignature?user=sunil&token=7i3AoaN5hJih8AEH9bUxag == Verify sunil signature passed in token
  • 10. Verify Signature Flow Sample URL : http://localhost:8081/verifySignature?user=sunil&token=7i3AoaN5hJih8AEH9bUxag == Verify sunil signature passed in token