In a vulnerable online world, what should you expect from a SaaS provider?
Last month the massive Heartbleed security vulnerability was exposed. Three weeks later a security flaw in Microsoft Internet Explorer was revealed. It seems as
End-to-end OAuth for APIs in less than 5 minutes!
How quickly can you enable OAuth on an API and allow for client applications to be rapidly built for them? With the new OAuth
Man in the Mirror, Apple’s Security Flaw, and the Importance of Unit Testing
The "Man-in-the-Middle” attack is such a well-recognized security risk, with established solutions and preventative measures in place that when I first heard about the
Google, OAuth, and the Confused Deputy – A tale of Security
It sounds like the title for a fantasy movie, but Google, OAuth and the "confused deputy" is a very common issue. Wikipedia defines a
Simplify authentication and user management with Mule and Stormpath
The dreaded user table. Think about it: whenever you start working on a new end-user application, you’ll have to create a table to store
PGP Encryption and SalesForce Integration using MuleSoft’s AnyPoint Platform
On my previous 3-part blog, I showed how Mule ESB can be used to service-enable and orchestrate traditional on-premise technologies like an Oracle database
SOA School: Architecting Watertight Security for the New Enterprise
Security is an ever-present concern for IT. It can be a rather daunting area when one considers all of the different possible dangers and
Data encryption with Mule Enterprise Security
Mule Enterprise Security is a set of capabilities that build on top of Mule Enterprise’s existing security capabilities, including: Secure Token Service and OAuth 2.0 ProviderDigital signing
How to Protect Your APIs with OAuth
On this 10th 'Day of Christmas' Mule blog post, we tackle an increasingly important question in the world of APIs: Presume that you would
Connector Callback Testing – Local
Testing using an external API can be a PITA, especially if the API uses any HTTP Callbacks or redirects such as OAuth or WebHooks.