Chapter 9. Securing Mule

In this chapter

  • Securing Mule with Spring Security
  • Using JAAS with Mule
  • Using security filters to secure endpoints

Security is a challenge in application development and deployment—a challenge that’s exacerbated by application integration. Single sign-on technologies such as Kerberos, CAS, and LDAP minimize these burdens, but it’s unlikely that every application in your environment supports the SSO technology at hand. Even if this is the case, all bets are off when you’re integrating with applications outside of your company’s data centers. Thankfully, Mule employs the same architectural principles we saw in part 1 in its handling of security. This gives you the opportunity to decouple your security concerns from ...

Get Mule in Action now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.