By Anirban Sen Chowdhary
Web Services Security (WS-Security, WSS) is an extension to SOAP to
apply security to Web services.
If a web service is exposed to external world, the data it carries can
comes under the threat to several potential security vulnerabilities.
So, in order to protect our web service we require Web Services Security
WS-Security describes 3 main mechanisms:
• How to sign SOAP messages to assure integrity. Signed messages
also provide non-repudiation.
• How to encrypt SOAP messages to assure confidentiality.
• How to attach security tokens to ascertain the sender's identity.
WS-Security incorporates security features in the header of a SOAP
message.
It works in application layer.
In this example we will be implementing a simple username and
password in the WS Security format.
So, we will expose a SOAP web service that will implement WS Security
:-
To expose a web service with security in Mule we need spring security in
our flow :-
<mule-ss:security-manager>
<mule-ss:delegate-security-provider name="memory-provider" delegate-
ref="authenticationManager" />
</mule-ss:security-manager>
<spring:beans>
<ss:authentication-manager alias="authenticationManager">
<ss:authentication-provider>
<ss:user-service id="userService">
<ss:user name=“anirban" password=“password authorities="ROLE_ADMIN" />
</ss:user-service>
</ss:authentication-provider>
</ss:authentication-manager>
</spring:beans>
<cxf:ws-security name="inboundSecurityConfig">
<cxf:mule-security-manager />
<cxf:ws-config>
<cxf:property key="action" value="UsernameToken" />
</cxf:ws-config>
</cxf:ws-security>
.
And our Mule flow will be :-
<flow name="securedSoapService">
<http:inbound-endpoint exchange-pattern="request-response"
host="localhost" port="8090" path="designation" doc:name="HTTP">
<cxf:jaxws-service
serviceClass="com.getdesignation.test.services.schema.maindata.v1.GetDesigna
tion">
<cxf:ws-security ref="inboundSecurityConfig"/>
</cxf:jaxws-service>
</http:inbound-endpoint>
<component
class="com.getdesignation.test.services.schema.maindata.v1.Impl.GetDesignatio
nImpl" />
</flow>
Following will be our flow in graphical mode ready with security :-
Now, we will be testing our secured web service in SOAPUI
You can see here, we are testing the service by giving username and
password in the header section of SOAP request and I am getting the
response back from the service
So, you can see WS-Security offers confidentiality and integrity
protection from the creation of the message to it's consumption.
WS-Security offers more protection than HTTPS would, and SOAP offers
a richer API than any other security .
Thus we can say WS-Security has measures for authentication, integrity,
confidentiality and non-repudiation
In my next slide I will bring some other techniques of implementing WS
Security in Mule.
Hope you have enjoyed this simpler version.
Ws security with mule

More Related Content

PDF
VMware Tanzu Service Mesh from the Developer’s Perspective
PDF
Lughat ul arabia1
PPTX
What is RabbitMQ ?
PDF
IBM MQ cloud architecture blueprint
PPTX
Kerajaan Bani Abbasiyyah
PDF
Pemikiran Politik Zaman Abbasi
PPT
Access Management with Aruba ClearPass
PDF
Nota Arudh STAM
VMware Tanzu Service Mesh from the Developer’s Perspective
Lughat ul arabia1
What is RabbitMQ ?
IBM MQ cloud architecture blueprint
Kerajaan Bani Abbasiyyah
Pemikiran Politik Zaman Abbasi
Access Management with Aruba ClearPass
Nota Arudh STAM

What's hot (20)

PPTX
Advanced Aruba ClearPass Workshop
PDF
The New Hedge Fund-Prime Broker Relationship
PPTX
KEM DAKWAH 005 KEM HAJI TAMATTUK - BAHAN EDARAN
PDF
SSL/TLS 1.3 Deep Dive
POTX
Network management with Aruba AirWave
DOCX
فضائل سور القران الكريم
PPTX
Deploying and managing IBM MQ in the Cloud
PPT
Bab 8 Kontrak Musawwamah
PPT
Palo alto networks next generation firewalls
PPTX
AWS Certified Solutions Architect Professional Course S6-S9
PDF
AWS Black Belt Online Seminar 2017 AWS WAF
DOCX
Usul fiqh, nasakh.
PPTX
EMEA Airheads - AP Discovery Logic and AP Deployment
PDF
AI in Networking: Transforming Network Operations with Juniper Mist AIDE
PPT
IBM Integration Bus & WebSphere MQ - High Availability & Disaster Recovery
PPTX
Bab 7 konflik fatwa di malaysia
PPT
Amqp Basic
PPTX
End to End Security With Palo Alto Networks (Onur Kasap, engineer Palo Alto N...
PPT
Bab 20 penyebaran islam pada zaman abbasiah
PPTX
Advanced ClearPass Workshop
Advanced Aruba ClearPass Workshop
The New Hedge Fund-Prime Broker Relationship
KEM DAKWAH 005 KEM HAJI TAMATTUK - BAHAN EDARAN
SSL/TLS 1.3 Deep Dive
Network management with Aruba AirWave
فضائل سور القران الكريم
Deploying and managing IBM MQ in the Cloud
Bab 8 Kontrak Musawwamah
Palo alto networks next generation firewalls
AWS Certified Solutions Architect Professional Course S6-S9
AWS Black Belt Online Seminar 2017 AWS WAF
Usul fiqh, nasakh.
EMEA Airheads - AP Discovery Logic and AP Deployment
AI in Networking: Transforming Network Operations with Juniper Mist AIDE
IBM Integration Bus & WebSphere MQ - High Availability & Disaster Recovery
Bab 7 konflik fatwa di malaysia
Amqp Basic
End to End Security With Palo Alto Networks (Onur Kasap, engineer Palo Alto N...
Bab 20 penyebaran islam pada zaman abbasiah
Advanced ClearPass Workshop
Ad

Similar to Ws security with mule (20)

PPTX
Mule securing
PPTX
Securing mule
PPT
Mule security
PPT
Mule security
PPT
Mule security - pgp
PPT
Mule security
PPT
Mule security
PPTX
Security again: Web services with mule
PDF
Spring ws
ODP
Security in mulesoft
PDF
Secured SOA
PPT
Mule security - saml
PPT
Mule security - saml
PPTX
Mule security
PPT
Mule with spring security manager
PDF
Secured SOA
PDF
WSO2 SOA Security
PPT
Mule security saml
PPT
Mule security saml
PPT
Mule security saml
Mule securing
Securing mule
Mule security
Mule security
Mule security - pgp
Mule security
Mule security
Security again: Web services with mule
Spring ws
Security in mulesoft
Secured SOA
Mule security - saml
Mule security - saml
Mule security
Mule with spring security manager
Secured SOA
WSO2 SOA Security
Mule security saml
Mule security saml
Mule security saml
Ad

More from Anirban Sen Chowdhary (20)

PPTX
Change the game with Game changer
PPTX
Ring central desktop app overview
PPTX
Overview in ringcentral digital line
PPTX
Some basics with ring central
PPTX
Ring central and python
PPTX
RingCentral application development overview
PPTX
Cloze connect ringcentral
PPTX
Overview on ring central errors part 4
PPTX
Setting up your ring central sandbox in steps
PPTX
Overview on ring central errors: part 2
PPTX
Overview on ring central errors
PPTX
Call recording overview ring central
PPTX
Ring central engaging with amazon alexa
PPTX
How ring central sdk changing the game
PPTX
When ring central connect salesforce
PPTX
Mule 4 connecting ring central
PPTX
Ring central sdk
PPTX
Ring central with okta
PPTX
Ring central connecting salesforce overview
PPTX
Ring central call logs overview (part 2)
Change the game with Game changer
Ring central desktop app overview
Overview in ringcentral digital line
Some basics with ring central
Ring central and python
RingCentral application development overview
Cloze connect ringcentral
Overview on ring central errors part 4
Setting up your ring central sandbox in steps
Overview on ring central errors: part 2
Overview on ring central errors
Call recording overview ring central
Ring central engaging with amazon alexa
How ring central sdk changing the game
When ring central connect salesforce
Mule 4 connecting ring central
Ring central sdk
Ring central with okta
Ring central connecting salesforce overview
Ring central call logs overview (part 2)

Recently uploaded (20)

PDF
From MVP to Full-Scale Product A Startup’s Software Journey.pdf
PDF
UiPath Agentic Automation session 1: RPA to Agents
PDF
1 - Historical Antecedents, Social Consideration.pdf
PDF
Convolutional neural network based encoder-decoder for efficient real-time ob...
PDF
sbt 2.0: go big (Scala Days 2025 edition)
PDF
A Late Bloomer's Guide to GenAI: Ethics, Bias, and Effective Prompting - Boha...
PDF
A proposed approach for plagiarism detection in Myanmar Unicode text
PDF
Consumable AI The What, Why & How for Small Teams.pdf
PDF
Architecture types and enterprise applications.pdf
PDF
Developing a website for English-speaking practice to English as a foreign la...
DOCX
search engine optimization ppt fir known well about this
PPTX
Chapter 5: Probability Theory and Statistics
PDF
Flame analysis and combustion estimation using large language and vision assi...
PPTX
Final SEM Unit 1 for mit wpu at pune .pptx
PPTX
Custom Battery Pack Design Considerations for Performance and Safety
PDF
Hybrid horned lizard optimization algorithm-aquila optimizer for DC motor
PDF
Two-dimensional Klein-Gordon and Sine-Gordon numerical solutions based on dee...
PPTX
Modernising the Digital Integration Hub
PDF
A comparative study of natural language inference in Swahili using monolingua...
PPT
What is a Computer? Input Devices /output devices
From MVP to Full-Scale Product A Startup’s Software Journey.pdf
UiPath Agentic Automation session 1: RPA to Agents
1 - Historical Antecedents, Social Consideration.pdf
Convolutional neural network based encoder-decoder for efficient real-time ob...
sbt 2.0: go big (Scala Days 2025 edition)
A Late Bloomer's Guide to GenAI: Ethics, Bias, and Effective Prompting - Boha...
A proposed approach for plagiarism detection in Myanmar Unicode text
Consumable AI The What, Why & How for Small Teams.pdf
Architecture types and enterprise applications.pdf
Developing a website for English-speaking practice to English as a foreign la...
search engine optimization ppt fir known well about this
Chapter 5: Probability Theory and Statistics
Flame analysis and combustion estimation using large language and vision assi...
Final SEM Unit 1 for mit wpu at pune .pptx
Custom Battery Pack Design Considerations for Performance and Safety
Hybrid horned lizard optimization algorithm-aquila optimizer for DC motor
Two-dimensional Klein-Gordon and Sine-Gordon numerical solutions based on dee...
Modernising the Digital Integration Hub
A comparative study of natural language inference in Swahili using monolingua...
What is a Computer? Input Devices /output devices

Ws security with mule

  • 1. By Anirban Sen Chowdhary
  • 2. Web Services Security (WS-Security, WSS) is an extension to SOAP to apply security to Web services. If a web service is exposed to external world, the data it carries can comes under the threat to several potential security vulnerabilities. So, in order to protect our web service we require Web Services Security
  • 3. WS-Security describes 3 main mechanisms: • How to sign SOAP messages to assure integrity. Signed messages also provide non-repudiation. • How to encrypt SOAP messages to assure confidentiality. • How to attach security tokens to ascertain the sender's identity.
  • 4. WS-Security incorporates security features in the header of a SOAP message. It works in application layer. In this example we will be implementing a simple username and password in the WS Security format.
  • 5. So, we will expose a SOAP web service that will implement WS Security :-
  • 6. To expose a web service with security in Mule we need spring security in our flow :- <mule-ss:security-manager> <mule-ss:delegate-security-provider name="memory-provider" delegate- ref="authenticationManager" /> </mule-ss:security-manager> <spring:beans> <ss:authentication-manager alias="authenticationManager"> <ss:authentication-provider> <ss:user-service id="userService"> <ss:user name=“anirban" password=“password authorities="ROLE_ADMIN" /> </ss:user-service> </ss:authentication-provider> </ss:authentication-manager> </spring:beans> <cxf:ws-security name="inboundSecurityConfig"> <cxf:mule-security-manager /> <cxf:ws-config> <cxf:property key="action" value="UsernameToken" /> </cxf:ws-config> </cxf:ws-security>
  • 7. . And our Mule flow will be :- <flow name="securedSoapService"> <http:inbound-endpoint exchange-pattern="request-response" host="localhost" port="8090" path="designation" doc:name="HTTP"> <cxf:jaxws-service serviceClass="com.getdesignation.test.services.schema.maindata.v1.GetDesigna tion"> <cxf:ws-security ref="inboundSecurityConfig"/> </cxf:jaxws-service> </http:inbound-endpoint> <component class="com.getdesignation.test.services.schema.maindata.v1.Impl.GetDesignatio nImpl" /> </flow>
  • 8. Following will be our flow in graphical mode ready with security :-
  • 9. Now, we will be testing our secured web service in SOAPUI You can see here, we are testing the service by giving username and password in the header section of SOAP request and I am getting the response back from the service
  • 10. So, you can see WS-Security offers confidentiality and integrity protection from the creation of the message to it's consumption. WS-Security offers more protection than HTTPS would, and SOAP offers a richer API than any other security . Thus we can say WS-Security has measures for authentication, integrity, confidentiality and non-repudiation
  • 11. In my next slide I will bring some other techniques of implementing WS Security in Mule. Hope you have enjoyed this simpler version.