Search icon CANCEL
Subscription
0
Cart icon
Your Cart (0 item)
Close icon
You have no products in your basket yet
Arrow left icon
Explore Products
Best Sellers
New Releases
Books
Videos
Audiobooks
Learning Hub
Free Learning
Arrow right icon
Arrow up icon
GO TO TOP
MuleSoft Platform Architect's Guide

You're reading from   MuleSoft Platform Architect's Guide A practical guide to using Anypoint Platform's capabilities to architect, deliver, and operate APIs

Arrow left icon
Product type Paperback
Published in Jul 2024
Publisher Packt
ISBN-13 9781805126188
Length 498 pages
Edition 1st Edition
Concepts
Arrow right icon
Authors (2):
Arrow left icon
Jim Andrews Jim Andrews
Author Profile Icon Jim Andrews
Jim Andrews
Jitendra Bafna Jitendra Bafna
Author Profile Icon Jitendra Bafna
Jitendra Bafna
Arrow right icon
View More author details
Toc

Table of Contents (21) Chapters Close

Preface 1. Chapter 1: What is the MuleSoft Platform? FREE CHAPTER 2. Chapter 2: Platform Foundation Components and the Underlying Architecture 3. Chapter 3: Leveraging Catalyst and the MuleSoft Knowledge Hub 4. Chapter 4: An Introduction to Application Networks 5. Chapter 5: Speeding with Accelerators 6. Chapter 6: Aligning Desired Business Outcomes to Functional Requirements 7. Chapter 7: Microservices, Application Networks, EDA, and API-led Design 8. Chapter 8: Non-Functional Requirements Influence in Shaping the API Architecture 9. Chapter 9: Hassle-free Deployment with Anypoint iPaaS (CloudHub 1.0) 10. Chapter 10: Hassle-Free Deployment with Anypoint iPaaS (CloudHub 2.0) 11. Chapter 11: Containerizing the Runtime Plane with Runtime Fabric 12. Chapter 12: Deploying to Your Own Data Center 13. Chapter 13: Government Cloud and the EU Control Plane – Special Considerations 14. Chapter 14: Functional Monitoring, Alerts, and Operation Monitors 15. Chapter 15: Controlling API Sprawl with Universal API Management 16. Chapter 16: Addressing Non-Functional Requirements – from a Thought to an Operation 17. Chapter 17: Prepare for Success 18. Chapter 18: Tackling Tricky Topics 19. Index 20. Other Books You May Enjoy

Mule runtime on-premises security

Security is critical for any business to ensure that information stored and retrieved via software applications is secure and protected, and it must be secured from unauthorized users. Information such as credit card details and Social Security numbers should be accessed in a secure way to perform any transaction, and it must only be accessible to legitimate or authorized users.

The Mule runtime provides various tools for implementing security:

  • A cryptography module for encrypting and decrypting data. Supported strategies are JCE, PGP, and XML to encrypt and sign data.
  • Secure configuration properties for storing credentials or sensitive data in a properties file in encrypted form.
  • Enabling a FIPS 140-2 certified environment
  • Out-of-the-box API policies such as JWT validation tokens, client credentials enforcement policy, and other security policies that can be enabled on APIs for authorization and authentication.
  • TLS security...
lock icon The rest of the chapter is locked
Register for a free Packt account to unlock a world of extra content!
A free Packt account unlocks extra newsletters, articles, discounted offers, and much more. Start advancing your knowledge today.
Unlock this book and the full library FREE for 7 days
Get unlimited access to 7000+ expert-authored eBooks and videos courses covering every tech area you can think of
Renews at $19.99/month. Cancel anytime
Banner background image