10

Secure Your API

In the previous chapter, we have learned how to deploy a Mule application, what the different deployment environments are, and how to choose your deployment environment.

There are several factors that need to be considered while choosing a deployment model; hence, it’s an important decision while building your application network.

We are also aware that APIs are responsible for carrying data/metadata and communicating with several end systems and, hence, are at a potentially high risk of being attacked. It’s important to secure your API and thereby protect your integration ecosystem. In this chapter, we shall learn about API security and the need for securing your API and Mule application.

We shall also focus on how to implement ...

Get MuleSoft for Salesforce Developers now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.