MuleSoft Anypoint Flex Gateway

MuleSoft Anypoint Flex Gateway   Anypoint Flex Gateway is MuleSoft’s new API gateway offering to manage and secure APIs running anywhere (cloud, on premise) in any tech stack (java, .net, python, etc). With the new Anypoint flex gateway, Organizations will be able to manage and govern all the APIs under one roof.     MuleSoft…

Share this:
Read More

Custom Policy

Custom Policy   MuleSoft provide a space where we can develop, add and apply our own custom policy. Sometime the OOTB policies doesn’t suffice the need and then we can leverage the use of custom-policy. To start with we have to first update maven’s setting.xml Adding profile and server information in setting.xml Run the below…

Share this:
Read More

Basic Authentication – LDAP

Basic Authentication – LDAP   Basic Authentication is simple and most widely used authentication mechanism in HTTP based services or APIs. The client sends HTTP requests with the Authorization HTTP header that contains the word Basic word followed by a space and a base64-encoded string username:password . For example, to authorize as username/password the client would send below HTTP…

Share this:
Read More

Spike Control

Spike Control   Spike Control policy limit or restrict the number of request an API can accept in a defined window of time. It doesn’t reject the requests when the number exceed in defined window of time and the policy allows requests to be queued for later reprocessing without closing the connection to the client.…

Share this:
Read More

Rate Limiting

Rate Limiting   Rate Limiting policy limit or restrict the number of request an API can accept in a defined window of time. It rejects the request when the number exceed in defined window of time. We can define multiple limits with window size ranging from milliseconds to years. So we can have limit like…

Share this:
Read More

Message Logging

Message Logging   Message Logging policy is used to logs custom message between policy and flow. We can log information related to request or response. This comes quite handy in case where we want to capture request/response related logs for debugging without changing the code in mule application. Warning: If the payload is used as…

Share this:
Read More

XML Threat Protection

XML Threat Protection   XML Threat Protection policy as the name suggests is a protection policy for the APIs to protect them from miscellaneous HTTP request which are inflated to bring down the APIs server. Request can contain an inflated request in which they can increase the XML depth, Element Child count, Text or Attribute…

Share this:
Read More

JSON Threat Protection

JSON Threat Protection   JSON Threat Protection policy as the name suggests is a protection policy for the APIs to protect them from miscellaneous HTTP request which are inflated to bring down the APIs server. Request can contain an inflated request in which they can increase the JSON depth, object name and values and array…

Share this:
Read More

HTTP Caching

HTTP Caching   HTTP Caching policy creates a caching space to store the response of different request. So if same request come then it will not go back to end system to retrieve the same information instead it will the response from caching. HTTP Caching policy is used for those APIs whose response will not…

Share this:
Read More