HowTo – Apply an OAuth policy on a REST API

In the previous post in the “APIfy your integrations” series, we went through an API design-first approach to building integrations to back-end systems.

We defined the API specification using RAML, implemented the API by importing the RAML into Anypoint Studio and deployed the implementation to mule runtime in cloud or on-premise.

We are now ready to share the API with the developer community.

Salesforce Connector June 2015 Release: What’s New

We are happy to announce the June ’15 release of the Salesforce Connector v6.2.1. With this release, we now support 56 different operations across multiple Salesforce APIs including the Apex REST API. This release also includes significant authentication capabilities such as OAuth v2.0 JWT bearer token and OAuth v2.0 SAML bearer assertion.

Benefits of using the Salesforce Connector

MuleSoft’s Salesforce Connector,

Anypoint Platform Now Supporting OpenAM!

motif

I am excited to announce Anypoint Platform’s support for ForgeRock’s OpenAM! As with the PingFederate support that came natively with the release of the Anypoint Platform for APIs last year, our new out-of-the-box support with OpenAM is seamless and can be configured for any organization with the push of a button. Once configured with OpenAM as an external identity provider, Anypoint Platform supports two key capabilities:

The ability to support SAML 2.0 based identity federation

This capability allows an organization’s user base to log into Anypoint Platform using their existing credentials as-is –

Secure your APIs

January 13 2015

0 comments 0
motif

Securing an API in Anypoint Platform is easy. In a previous post we showed how Anypoint Platform for APIs allows you to fully protect your API. We concluded then that the combination of HTTPS and OAuth 2.0 are a rule-of-thumb best practice for Web API security. In this post, we’ll take a deeper dive into the makeup of a security configuration in Anypoint Platform and explore in more detail the areas of Basic Authentication and OAuth2 Authorization in the context of Identity Management.

End-to-end OAuth for APIs in less than 5 minutes!

motif

How quickly can you enable OAuth on an API and allow for client applications to be rapidly built for them? With the new OAuth 2.0 policy that is now available with the Anypoint Platform for APIs, the answer is no more than five minutes! Have a look for yourself with the following viewlet:

Google, OAuth, and the Confused Deputy – A tale of Security

motif

It sounds like the title for a fantasy movie, but Google, OAuth and the “confused deputy” is a very common issue. Wikipedia defines a confused deputy as “a computer program that is innocently fooled by some other party into misusing its authority. It is a specific type of privilege escalation” (complete article here).

The Wikipedia article shares an example of a compiler exposed as a paid service.

Mule OAuth2 support: Even easier still

motif

This post is brought to you by… you! Yes, a couple of weeks back I was writing about how dealing with OAuth2 secured APIs got way easier since Mule’s August 2013 Release. We got such a great feedback that we decided to incorporate some of it in our latest October 2013 release.

 

 

Token Management vs. Token Nightmare

So let’s do a quick recap.

OAuth 2 just got a bit easier

motif

Ever since Devkit made its first entry into the Mule family, a big variety of OAuth enabled Cloud Connectors were made available. Salesforce, Facebook, Twitter, Dropbox, LinkedIn and Google Apps suite are just some examples of the APIs we’ve connected to using that support.

When we started thinking about the August 2013 release we decided to take it one step forward and make it easier than ever.

How to Protect Your APIs with OAuth

motif

On this 10th ‘Day of Christmas’ Mule blog post, we tackle an increasingly important question in the world of APIs: Presume that you would like to create a remote API (which perhaps exposes some legacy business logic) for access by internal and/or external clients. How can you make sure that access to your API is protected in such a way that:

A) Only clients that you trust can access them;

MS Office is so last year, Connect to Google Apps

motif

Google Apps offers a cloud alternative to many of the office products.  If you have a Gmail account then you have Google Apps including Spreadsheets, Docs, Presentations, Contacts, Calendars and Tasks.  Of course Google Apps have APIS and of course we have the connectors to make it easy to connect Google Apps and your applications together.  Lets get the connectors and then take a look at what you can do.