Hi All,
It is critical to ensure that the valuable information that business stores and makes available through software applications and web services are secure, protected from unauthorized users and malicious attackers. But it is also critical that these protected resources, such as credit card information or Social Security numbers, be immediately accessible to authorized, legitimate users and systems to conduct business transactions.
To provide secure access to information, applications and services can apply a variety of security measures. Mule runtime engine (Mule) provides several tools and methods that enable you to protect applications.
1. MuleSoft Cryptography Module
2. JWT Validation Policy (OAuth Authorization and Client Credentials)
3. Digital Signatures
4. Dataweave Crypto Module
5. Enable HTTPS proxy
6. XML threat protection policies
We have Jitendra Bafna(Senior MuleSoft Architect). Jitendra Bafna will share the tips related to Data and API protection in Mule 4.X
We will be playing trivia quiz during the learning session. The top 3 selected winners will be getting training vouchers.
-
Senior Solution Architect
Having overall 12+ years of IT experience and played many roles like Lead API Architect, Solution Architect, Lead Developer, Business/System Analyst, Service Delivery Manager, Onsite coordinator etc. Having expertise in integration, cloud, API's & Microservices, web development, devops technologies and domains like Banking, Oil & Gas, Logistics, Electronic Fund Transfer etc. Having exp…
Deloitte HK
SSE