Restrict access based on client IP addresses with drag and drop filters to guard your system from bad actors. Prevent replay attacks using easily configurable message expiry policies. Apply cyclic redundancy checks (CRC) to detect message tampering.
Encryption, digital signatures
Maintain data integrity and confidentiality by encrypting all or part of confidential message payloads or storing access credentials in an encrypted vault. Preserve data integrity with digital signatures.
Protect access to APIs and service endpoints by moving beyond usernames and passwords. Leverage proven security standards such as SAML, OAuth2, and WS-Security or use existing LDAP stores for authentication and authorization. Configure and apply API policies at runtime using Anypoint API Manager.