SlideShare a Scribd company logo
By Anirban Sen Chowdhary
Web Services Security (WS-Security, WSS) is an extension to SOAP to
apply security to Web services.
If a web service is exposed to external world, the data it carries can
comes under the threat to several potential security vulnerabilities.
So, in order to protect our web service we require Web Services Security
WS-Security describes 3 main mechanisms:
• How to sign SOAP messages to assure integrity. Signed messages
also provide non-repudiation.
• How to encrypt SOAP messages to assure confidentiality.
• How to attach security tokens to ascertain the sender's identity.
WS-Security incorporates security features in the header of a SOAP
message.
It works in application layer.
In this example we will be implementing a simple username and
password in the WS Security format.
So, we will expose a SOAP web service that will implement WS Security
:-
To expose a web service with security in Mule we need spring security in
our flow :-
<mule-ss:security-manager>
<mule-ss:delegate-security-provider name="memory-provider" delegate-
ref="authenticationManager" />
</mule-ss:security-manager>
<spring:beans>
<ss:authentication-manager alias="authenticationManager">
<ss:authentication-provider>
<ss:user-service id="userService">
<ss:user name=“anirban" password=“password authorities="ROLE_ADMIN" />
</ss:user-service>
</ss:authentication-provider>
</ss:authentication-manager>
</spring:beans>
<cxf:ws-security name="inboundSecurityConfig">
<cxf:mule-security-manager />
<cxf:ws-config>
<cxf:property key="action" value="UsernameToken" />
</cxf:ws-config>
</cxf:ws-security>
.
And our Mule flow will be :-
<flow name="securedSoapService">
<http:inbound-endpoint exchange-pattern="request-response"
host="localhost" port="8090" path="designation" doc:name="HTTP">
<cxf:jaxws-service
serviceClass="com.getdesignation.test.services.schema.maindata.v1.GetDesigna
tion">
<cxf:ws-security ref="inboundSecurityConfig"/>
</cxf:jaxws-service>
</http:inbound-endpoint>
<component
class="com.getdesignation.test.services.schema.maindata.v1.Impl.GetDesignatio
nImpl" />
</flow>
Following will be our flow in graphical mode ready with security :-
Now, we will be testing our secured web service in SOAPUI
You can see here, we are testing the service by giving username and
password in the header section of SOAP request and I am getting the
response back from the service
So, you can see WS-Security offers confidentiality and integrity
protection from the creation of the message to it's consumption.
WS-Security offers more protection than HTTPS would, and SOAP offers
a richer API than any other security .
Thus we can say WS-Security has measures for authentication, integrity,
confidentiality and non-repudiation
In my next slide I will bring some other techniques of implementing WS
Security in Mule.
Hope you have enjoyed this simpler version.
Ws security with mule

More Related Content

PDF
Certificate of Experience Ahmed Galal
Ahmed El mahdy
 
PDF
work experience certificate 3
Manoj Kumar.T.T
 
PDF
4_Experience Letter as Data Entry Operator Dept manager
zahid farooq zahidfarooq
 
PDF
Experience Letter - Baker Hughes
Azrul Azwar Samsuddin
 
PPTX
IT security : Keep calm and monitor PowerShell
ManageEngine
 
PDF
Experience Certificate
RAMESH C
 
PDF
Wipro Experience Certificate
Nesaraj Nesaraj
 
PDF
City & Guilds Certificate 1
Oshanthini Johnson
 
Certificate of Experience Ahmed Galal
Ahmed El mahdy
 
work experience certificate 3
Manoj Kumar.T.T
 
4_Experience Letter as Data Entry Operator Dept manager
zahid farooq zahidfarooq
 
Experience Letter - Baker Hughes
Azrul Azwar Samsuddin
 
IT security : Keep calm and monitor PowerShell
ManageEngine
 
Experience Certificate
RAMESH C
 
Wipro Experience Certificate
Nesaraj Nesaraj
 
City & Guilds Certificate 1
Oshanthini Johnson
 

What's hot (20)

PDF
N4 Certificate
Jeanette Botha
 
PDF
ok-manual-despiece-vespa-75-primavera
RutersdeMallorca
 
PDF
Experience Letter
Ahmed Abdulnaby
 
PDF
Super Coats Experience Certificate
Omer Mukthar Mohamed Mohamed
 
PDF
Working Certificate - 1 to 9 Pages - Samsung - System - Lahoud - Dotanah - Do...
Abdulkader Sayed
 
PDF
N4 CERTIFICATE.PDF
Pogisho Sekgobela
 
PDF
CCC experience certificate
Exprtoors
 
PDF
Fauna and flora of dibru saikhowa national park
TapanMoran
 
PDF
DuA e Nudba Arabic and Urdu
iqtada askary
 
PDF
IOSH Certificate
Tariq Natoo
 
PDF
Amer Zubair - QS
Amer Zubair
 
PDF
Experience Certificate (SL)
Somir Roy Songeet
 
PDF
Work experience certificate 2
Manoj Kumar.T.T
 
PDF
Imaging the Unseen: Taking the First Picture of a Black Hole
Databricks
 
PPTX
Tor and Deep Web - PPT
Rahul John
 
PDF
Experience Certificate - Ali & Sons Contracting
Asfar Thazhath Palliyil
 
PDF
Four Seasons experience letter in Arabic.PDF
Mohamed Khalaf
 
PDF
LETTER OF NO OBJECTION SANG SAUDI ARABIA
Robert Lloyd Cornelius
 
PDF
NESMA experience certificate
Fakhri Al Bobali
 
PDF
Management Diploma The Open University Berezhnova
Larissa Berezhnova
 
N4 Certificate
Jeanette Botha
 
ok-manual-despiece-vespa-75-primavera
RutersdeMallorca
 
Experience Letter
Ahmed Abdulnaby
 
Super Coats Experience Certificate
Omer Mukthar Mohamed Mohamed
 
Working Certificate - 1 to 9 Pages - Samsung - System - Lahoud - Dotanah - Do...
Abdulkader Sayed
 
N4 CERTIFICATE.PDF
Pogisho Sekgobela
 
CCC experience certificate
Exprtoors
 
Fauna and flora of dibru saikhowa national park
TapanMoran
 
DuA e Nudba Arabic and Urdu
iqtada askary
 
IOSH Certificate
Tariq Natoo
 
Amer Zubair - QS
Amer Zubair
 
Experience Certificate (SL)
Somir Roy Songeet
 
Work experience certificate 2
Manoj Kumar.T.T
 
Imaging the Unseen: Taking the First Picture of a Black Hole
Databricks
 
Tor and Deep Web - PPT
Rahul John
 
Experience Certificate - Ali & Sons Contracting
Asfar Thazhath Palliyil
 
Four Seasons experience letter in Arabic.PDF
Mohamed Khalaf
 
LETTER OF NO OBJECTION SANG SAUDI ARABIA
Robert Lloyd Cornelius
 
NESMA experience certificate
Fakhri Al Bobali
 
Management Diploma The Open University Berezhnova
Larissa Berezhnova
 
Ad

Similar to Ws security with mule (20)

PPTX
Mule securing
Sindhu VL
 
PPTX
Securing mule
Sindhu VL
 
PPT
Mule security
himajareddys
 
PPT
Mule security
D.Rajesh Kumar
 
PPT
Mule security - pgp
D.Rajesh Kumar
 
PPT
Mule security
vishnukanthro45
 
PPT
Mule security
charan teja R
 
PPTX
Security again: Web services with mule
StrawhatLuffy11
 
PDF
Spring ws
Souleymane MATO
 
ODP
Security in mulesoft
akshay yeluru
 
PDF
Secured SOA
WSO2
 
PPT
Mule security - saml
vishnukanthro45
 
PPT
Mule security - saml
charan teja R
 
PPTX
Mule security
krishna2162
 
PPT
Mule with spring security manager
Son Nguyen
 
PDF
Secured SOA
Prabath Siriwardena
 
PDF
WSO2 SOA Security
WSO2
 
PPT
Mule security
Praneethchampion
 
PPT
Mule security saml
princeirfancivil
 
PPT
Mule security saml
Anand kalla
 
Mule securing
Sindhu VL
 
Securing mule
Sindhu VL
 
Mule security
himajareddys
 
Mule security
D.Rajesh Kumar
 
Mule security - pgp
D.Rajesh Kumar
 
Mule security
vishnukanthro45
 
Mule security
charan teja R
 
Security again: Web services with mule
StrawhatLuffy11
 
Spring ws
Souleymane MATO
 
Security in mulesoft
akshay yeluru
 
Secured SOA
WSO2
 
Mule security - saml
vishnukanthro45
 
Mule security - saml
charan teja R
 
Mule security
krishna2162
 
Mule with spring security manager
Son Nguyen
 
Secured SOA
Prabath Siriwardena
 
WSO2 SOA Security
WSO2
 
Mule security
Praneethchampion
 
Mule security saml
princeirfancivil
 
Mule security saml
Anand kalla
 
Ad

More from Anirban Sen Chowdhary (20)

PPTX
Change the game with Game changer
Anirban Sen Chowdhary
 
PPTX
Ring central desktop app overview
Anirban Sen Chowdhary
 
PPTX
Overview in ringcentral digital line
Anirban Sen Chowdhary
 
PPTX
Some basics with ring central
Anirban Sen Chowdhary
 
PPTX
Ring central and python
Anirban Sen Chowdhary
 
PPTX
RingCentral application development overview
Anirban Sen Chowdhary
 
PPTX
Cloze connect ringcentral
Anirban Sen Chowdhary
 
PPTX
Overview on ring central errors part 4
Anirban Sen Chowdhary
 
PPTX
Setting up your ring central sandbox in steps
Anirban Sen Chowdhary
 
PPTX
Overview on ring central errors: part 2
Anirban Sen Chowdhary
 
PPTX
Overview on ring central errors
Anirban Sen Chowdhary
 
PPTX
Call recording overview ring central
Anirban Sen Chowdhary
 
PPTX
Ring central engaging with amazon alexa
Anirban Sen Chowdhary
 
PPTX
How ring central sdk changing the game
Anirban Sen Chowdhary
 
PPTX
When ring central connect salesforce
Anirban Sen Chowdhary
 
PPTX
Mule 4 connecting ring central
Anirban Sen Chowdhary
 
PPTX
Ring central sdk
Anirban Sen Chowdhary
 
PPTX
Ring central with okta
Anirban Sen Chowdhary
 
PPTX
Ring central connecting salesforce overview
Anirban Sen Chowdhary
 
PPTX
Ring central call logs overview (part 2)
Anirban Sen Chowdhary
 
Change the game with Game changer
Anirban Sen Chowdhary
 
Ring central desktop app overview
Anirban Sen Chowdhary
 
Overview in ringcentral digital line
Anirban Sen Chowdhary
 
Some basics with ring central
Anirban Sen Chowdhary
 
Ring central and python
Anirban Sen Chowdhary
 
RingCentral application development overview
Anirban Sen Chowdhary
 
Cloze connect ringcentral
Anirban Sen Chowdhary
 
Overview on ring central errors part 4
Anirban Sen Chowdhary
 
Setting up your ring central sandbox in steps
Anirban Sen Chowdhary
 
Overview on ring central errors: part 2
Anirban Sen Chowdhary
 
Overview on ring central errors
Anirban Sen Chowdhary
 
Call recording overview ring central
Anirban Sen Chowdhary
 
Ring central engaging with amazon alexa
Anirban Sen Chowdhary
 
How ring central sdk changing the game
Anirban Sen Chowdhary
 
When ring central connect salesforce
Anirban Sen Chowdhary
 
Mule 4 connecting ring central
Anirban Sen Chowdhary
 
Ring central sdk
Anirban Sen Chowdhary
 
Ring central with okta
Anirban Sen Chowdhary
 
Ring central connecting salesforce overview
Anirban Sen Chowdhary
 
Ring central call logs overview (part 2)
Anirban Sen Chowdhary
 

Recently uploaded (20)

PPTX
Dev Dives: Automate, test, and deploy in one place—with Unified Developer Exp...
AndreeaTom
 
PDF
A Day in the Life of Location Data - Turning Where into How.pdf
Precisely
 
PDF
The Evolution of KM Roles (Presented at Knowledge Summit Dublin 2025)
Enterprise Knowledge
 
PDF
Security features in Dell, HP, and Lenovo PC systems: A research-based compar...
Principled Technologies
 
PDF
Tea4chat - another LLM Project by Kerem Atam
a0m0rajab1
 
PDF
MASTERDECK GRAPHSUMMIT SYDNEY (Public).pdf
Neo4j
 
PDF
Unlocking the Future- AI Agents Meet Oracle Database 23ai - AIOUG Yatra 2025.pdf
Sandesh Rao
 
PPTX
OA presentation.pptx OA presentation.pptx
pateldhruv002338
 
PDF
Event Presentation Google Cloud Next Extended 2025
minhtrietgect
 
PDF
Oracle AI Vector Search- Getting Started and what's new in 2025- AIOUG Yatra ...
Sandesh Rao
 
PDF
Automating ArcGIS Content Discovery with FME: A Real World Use Case
Safe Software
 
PDF
Get More from Fiori Automation - What’s New, What Works, and What’s Next.pdf
Precisely
 
PDF
Make GenAI investments go further with the Dell AI Factory
Principled Technologies
 
PPTX
New ThousandEyes Product Innovations: Cisco Live June 2025
ThousandEyes
 
PDF
AI Unleashed - Shaping the Future -Starting Today - AIOUG Yatra 2025 - For Co...
Sandesh Rao
 
PDF
Trying to figure out MCP by actually building an app from scratch with open s...
Julien SIMON
 
PPTX
The-Ethical-Hackers-Imperative-Safeguarding-the-Digital-Frontier.pptx
sujalchauhan1305
 
PDF
Research-Fundamentals-and-Topic-Development.pdf
ayesha butalia
 
PDF
Google I/O Extended 2025 Baku - all ppts
HusseinMalikMammadli
 
PDF
Presentation about Hardware and Software in Computer
snehamodhawadiya
 
Dev Dives: Automate, test, and deploy in one place—with Unified Developer Exp...
AndreeaTom
 
A Day in the Life of Location Data - Turning Where into How.pdf
Precisely
 
The Evolution of KM Roles (Presented at Knowledge Summit Dublin 2025)
Enterprise Knowledge
 
Security features in Dell, HP, and Lenovo PC systems: A research-based compar...
Principled Technologies
 
Tea4chat - another LLM Project by Kerem Atam
a0m0rajab1
 
MASTERDECK GRAPHSUMMIT SYDNEY (Public).pdf
Neo4j
 
Unlocking the Future- AI Agents Meet Oracle Database 23ai - AIOUG Yatra 2025.pdf
Sandesh Rao
 
OA presentation.pptx OA presentation.pptx
pateldhruv002338
 
Event Presentation Google Cloud Next Extended 2025
minhtrietgect
 
Oracle AI Vector Search- Getting Started and what's new in 2025- AIOUG Yatra ...
Sandesh Rao
 
Automating ArcGIS Content Discovery with FME: A Real World Use Case
Safe Software
 
Get More from Fiori Automation - What’s New, What Works, and What’s Next.pdf
Precisely
 
Make GenAI investments go further with the Dell AI Factory
Principled Technologies
 
New ThousandEyes Product Innovations: Cisco Live June 2025
ThousandEyes
 
AI Unleashed - Shaping the Future -Starting Today - AIOUG Yatra 2025 - For Co...
Sandesh Rao
 
Trying to figure out MCP by actually building an app from scratch with open s...
Julien SIMON
 
The-Ethical-Hackers-Imperative-Safeguarding-the-Digital-Frontier.pptx
sujalchauhan1305
 
Research-Fundamentals-and-Topic-Development.pdf
ayesha butalia
 
Google I/O Extended 2025 Baku - all ppts
HusseinMalikMammadli
 
Presentation about Hardware and Software in Computer
snehamodhawadiya
 

Ws security with mule

  • 1. By Anirban Sen Chowdhary
  • 2. Web Services Security (WS-Security, WSS) is an extension to SOAP to apply security to Web services. If a web service is exposed to external world, the data it carries can comes under the threat to several potential security vulnerabilities. So, in order to protect our web service we require Web Services Security
  • 3. WS-Security describes 3 main mechanisms: • How to sign SOAP messages to assure integrity. Signed messages also provide non-repudiation. • How to encrypt SOAP messages to assure confidentiality. • How to attach security tokens to ascertain the sender's identity.
  • 4. WS-Security incorporates security features in the header of a SOAP message. It works in application layer. In this example we will be implementing a simple username and password in the WS Security format.
  • 5. So, we will expose a SOAP web service that will implement WS Security :-
  • 6. To expose a web service with security in Mule we need spring security in our flow :- <mule-ss:security-manager> <mule-ss:delegate-security-provider name="memory-provider" delegate- ref="authenticationManager" /> </mule-ss:security-manager> <spring:beans> <ss:authentication-manager alias="authenticationManager"> <ss:authentication-provider> <ss:user-service id="userService"> <ss:user name=“anirban" password=“password authorities="ROLE_ADMIN" /> </ss:user-service> </ss:authentication-provider> </ss:authentication-manager> </spring:beans> <cxf:ws-security name="inboundSecurityConfig"> <cxf:mule-security-manager /> <cxf:ws-config> <cxf:property key="action" value="UsernameToken" /> </cxf:ws-config> </cxf:ws-security>
  • 7. . And our Mule flow will be :- <flow name="securedSoapService"> <http:inbound-endpoint exchange-pattern="request-response" host="localhost" port="8090" path="designation" doc:name="HTTP"> <cxf:jaxws-service serviceClass="com.getdesignation.test.services.schema.maindata.v1.GetDesigna tion"> <cxf:ws-security ref="inboundSecurityConfig"/> </cxf:jaxws-service> </http:inbound-endpoint> <component class="com.getdesignation.test.services.schema.maindata.v1.Impl.GetDesignatio nImpl" /> </flow>
  • 8. Following will be our flow in graphical mode ready with security :-
  • 9. Now, we will be testing our secured web service in SOAPUI You can see here, we are testing the service by giving username and password in the header section of SOAP request and I am getting the response back from the service
  • 10. So, you can see WS-Security offers confidentiality and integrity protection from the creation of the message to it's consumption. WS-Security offers more protection than HTTPS would, and SOAP offers a richer API than any other security . Thus we can say WS-Security has measures for authentication, integrity, confidentiality and non-repudiation
  • 11. In my next slide I will bring some other techniques of implementing WS Security in Mule. Hope you have enjoyed this simpler version.