Introduction
In this chapter we will take an in-depth look at adding a level of security to your routing logic through a number of security-related Camel components. We will focus on making it difficult for an unauthorized party to gain access to sensitive information while messages are in-flight, to manipulate sensitive payloads, and to trigger operations to which that party is not authorized.
Beyond the topics discussed in this chapter, in order to secure your integrations you will also need to consider factors such as:
- Restricting access to the operating system on which the application runs.
- Password protecting JMX access so that an unauthorized party cannot change the route at runtime to wiretap or log message contents.
- Not storing passwords or keys in plain text on the filesystem.
- Locking down the transport mechanism. For example, applying SSL to message broker connections, or WS-Security and WS-SecurityPolicy with SOAP-based web services.
Security, after all, is a process that is broader...