API security with MuleSoft
In this section, let’s simplify how we can achieve API security using MuleSoft.
In Figure 10.1, we can see that the application network is formed using reusable building blocks, such as Mule applications, end systems, and non-Mule applications. Here, the outer dotted line depicts the periphery of the Mule application, and the inner dotted line shows the integration between a Mule application and an external end system/non-Mule application.
Figure 10.1 – A snapshot of Anypoint Platform depicting application networks
In order to achieve total security, you can apply security regulations on any of the following:
- On the periphery of the Mule application
- On one or more Mule applications and end systems
- On one or more non-Mule applications and end systems
- On an individual Mule/non-Mule and end system
You can implement the preceding security mechanism in any permutation and combination as per your...