SlideShare a Scribd company logo
1 of 28
1
December 08, 2022
Mysore MuleSoft Meetup
Implementing one-way & two-way SSL
3
Safe Harbour Statement
● Both the speaker and the host are organizing this meet-up in individual capacity only.
We are not representing our companies here.
● This presentation is strictly for learning purposes only.
● Organizer/Presenter do not hold any responsibility that same solution will work for
your business requirements.
● This presentation is not meant for any promotional activities.
4
A recording of this meetup will be uploaded to events page within 24 hours.
Questions can be submitted/asked at any time in the Chat/Questions & Answers Tab.
Make it more Interactive!!!
Give us feedback! Rate this meetup session by filling feedback form at the end of the day.
We Love Feedbacks!!! Its Bread & Butter for Meetup.
Housekeeping
5
Introduction
● About the Organizers
6
Shubham Chaurasia
Billennium India
Pro Integration Developer
A SHOW OF HANDS:
Who is new to this Meetup?
Giridhar Meka
Sr. Technical Architect
linkedin.com/in/giridharmeka
linkedin.com/in/shubhamchaurasia1
 3.6 years of working experience as MuleSoft Developer
 Certified MuleSoft Developer and Integration Architect
 Currently working for HashedIn By Deloitte as Senior
Software Engineer
7
Shaik Irfan Ahamed
Sr. Software Engineer
Introduction
● About the Speaker
Agenda
● Introductions
o What is SSL/TLS ?
o What is a Digital Certificate?
o How to implement one-way SSL?
o How to implement two-way SSL?
● Demo
● Trivia
8
SSL/TLS :
SSL (Secure Sockets Layer) and its successor, TLS (Transport Layer Security), are protocols for
establishing authenticated and encrypted links between networked computers
HTTPS:
Hypertext Transfer Protocol Secure (https) is a combination of HTTP with the SSL/ TLS protocol
9
 Confidentiality – Provided by Encryption
 Integrity – Provided by Hashing technique
 Authentication – Provided by Certificates
SSL/TLS Handshake
10
SSL/TLS has 3 Goals
Confidentiality
 Confidentiality can be achieved by Encryption
 There are two types of encryption in widespread use today: symmetric and
asymmetric encryption.
 Symmetric encryption uses a single key to both encrypt and decrypt data
 Asymmetric encryption uses a different keys (public-private keypair) to encrypt
 Asymmetrical encryption is used to initialize the encrypted conversation between two
users, while symmetrical encryption is used for the duration of the communication.
11
Integrity
12
Integrity…
 Hashing is used to provide Integrity
 Both parties establish a mutual secret key
 Sender combines Message + Secret key to create Digest
 Receiver verifies by calculating hash of Message + secret key
13
Authentication
 Prove your Identity
 Digital Certificate is needed to prove the Identity
 Digital Signature itself does not verify the actual identity of the sender
14
Alice
Alice
Digital Certificates
Digital certificates are electronic credentials issued by a trusted third-party, it verifies the
identity of the owner and the owner public key
15
SSL Handshake Protocol
 The user initiates the connection by typing the website address. The browser initiates
SSL/TLS communication by sending a message to the website’s server.
 The website's server sends back the public key or certificate to the user's browser.
 User's browser checks for a public key or certificate. If it is ok, it creates a symmetric
key and sends it back to the website's server. If the certificate is not ok, the
communication fails.
 On receiving the symmetric key, the website's server sent the key and encrypted the
requested data.
 The user's browser decrypts the content using a symmetric key, which completes the
SSL/TLS handshake. The user can see content as now connection is established
16
SSL Handshake Protocol…
17
Keystore & Truststore
 Keystore is used to store private key and identity certificates that a specific program
should present to both parties (server or client) for verification.
 Truststore is used to store certificates from Certified Authorities (CA) that verify the
certificate presented by the server in SSL connection.
18
One-Way SSL
 Client requests for data on HTTPS protocol to the server. That going to initiates the
SSL/TLS handshake process.
 Server returns with its public certificate and public key to the client along with the
server hello message
 The client validates/verifies the received server certificates with CA’s certification
authority
 The client sends back with a symmetric session key using the server’s public key
 The server decrypts the symmetric session key using its private key and sends back
an encrypted session key to start the encrypted session
19
One-Way SSL…
20
Two-way SSL
 Client requests for data on HTTPS protocol to the server.
 Server returns with its public certificate and public key to the client along with the
server hello message.
 The client validates/verifies the received server certificates with CA’s certification
authority
 The client sends back a client certificate with a symmetric session key using the
server’s public key.
 The server validates/verifies the received client certificates with CA’s certification
authority
 After completion of the handshake process, client and server communicate and
transfer data with each other encrypted with the secret keys shared between the two
during a handshake
21
Two-way SSL…
22
Demo
Q&A
Take a stand !
● Nominate yourself for the next meetup speaker and suggest a topic as well.
25
● Share:
○ Tweet using the hashtag #MuleSoftMeetups
○ Join Mysore Group: https://meetups.mulesoft.com/mysore/
● Feedback:
○ Fill out the survey feedback and suggest topics for upcoming events
○ Contact MuleSoft at meetups@mulesoft.com for ways to improve the program
○ Reach out to Mysore Meetup Leaders (Shubham/Giridhar) to suggest
topics for next Meetup
What’s next?
26
Get ready to WIN a MuleSoft Voucher from MuleSoft
Quiz Time
Thank you

More Related Content

Similar to Securing the network communication using One-way SSL & Two-way SSL | MuleSoft Mysore Meetup #18

Similar to Securing the network communication using One-way SSL & Two-way SSL | MuleSoft Mysore Meetup #18 (20)

ssl
sslssl
ssl
 
Https
HttpsHttps
Https
 
SSL
SSLSSL
SSL
 
presentation2-151203145018-lva1-app6891.pdf
presentation2-151203145018-lva1-app6891.pdfpresentation2-151203145018-lva1-app6891.pdf
presentation2-151203145018-lva1-app6891.pdf
 
Certificate pinning in android applications
Certificate pinning in android applicationsCertificate pinning in android applications
Certificate pinning in android applications
 
Lecture #22 : Web Privacy & Security Breach
Lecture #22 : Web Privacy & Security BreachLecture #22 : Web Privacy & Security Breach
Lecture #22 : Web Privacy & Security Breach
 
SSL/TLS Handshake
SSL/TLS HandshakeSSL/TLS Handshake
SSL/TLS Handshake
 
SSL-image
SSL-imageSSL-image
SSL-image
 
Lecture17
Lecture17Lecture17
Lecture17
 
Ssl certificate in internet world
Ssl certificate in internet worldSsl certificate in internet world
Ssl certificate in internet world
 
Lecture #21: HTTPS , SSL & TLS
Lecture #21: HTTPS , SSL & TLSLecture #21: HTTPS , SSL & TLS
Lecture #21: HTTPS , SSL & TLS
 
O auth2 with angular js
O auth2 with angular jsO auth2 with angular js
O auth2 with angular js
 
Details about the SSL Certificate
Details about the SSL CertificateDetails about the SSL Certificate
Details about the SSL Certificate
 
The world of encryption
The world of encryptionThe world of encryption
The world of encryption
 
CRYPTOGRAPHY AND NETWORK SECURITY- Transport-level Security
CRYPTOGRAPHY AND NETWORK SECURITY- Transport-level SecurityCRYPTOGRAPHY AND NETWORK SECURITY- Transport-level Security
CRYPTOGRAPHY AND NETWORK SECURITY- Transport-level Security
 
Web security for e-commerce
Web security for e-commerceWeb security for e-commerce
Web security for e-commerce
 
Introduction to Public Key Infrastructure
Introduction to Public Key InfrastructureIntroduction to Public Key Infrastructure
Introduction to Public Key Infrastructure
 
Web application security part 02
Web application security part 02Web application security part 02
Web application security part 02
 
OWASP London 16 Jan-2017 - Identities Exposed by David Johansson
OWASP London 16 Jan-2017 - Identities Exposed by David JohanssonOWASP London 16 Jan-2017 - Identities Exposed by David Johansson
OWASP London 16 Jan-2017 - Identities Exposed by David Johansson
 
TLS - Transport Layer Security
TLS - Transport Layer SecurityTLS - Transport Layer Security
TLS - Transport Layer Security
 

More from MysoreMuleSoftMeetup

Payment Integration using Braintree Connector | MuleSoft Mysore Meetup #37
Payment Integration using Braintree Connector | MuleSoft Mysore Meetup #37Payment Integration using Braintree Connector | MuleSoft Mysore Meetup #37
Payment Integration using Braintree Connector | MuleSoft Mysore Meetup #37
MysoreMuleSoftMeetup
 

More from MysoreMuleSoftMeetup (20)

MuleSoft Integration with AWS Lambda [Serverless Function] | MuleSoft Mysore ...
MuleSoft Integration with AWS Lambda [Serverless Function] | MuleSoft Mysore ...MuleSoft Integration with AWS Lambda [Serverless Function] | MuleSoft Mysore ...
MuleSoft Integration with AWS Lambda [Serverless Function] | MuleSoft Mysore ...
 
Munits in Mule 4 [Deep-Dive] | MuleSoft Mysore Meetup #40
Munits in Mule 4 [Deep-Dive] | MuleSoft Mysore Meetup #40Munits in Mule 4 [Deep-Dive] | MuleSoft Mysore Meetup #40
Munits in Mule 4 [Deep-Dive] | MuleSoft Mysore Meetup #40
 
Unlocking Seamless End-to-End Automation with the MuleSoft Automation Suite |...
Unlocking Seamless End-to-End Automation with the MuleSoft Automation Suite |...Unlocking Seamless End-to-End Automation with the MuleSoft Automation Suite |...
Unlocking Seamless End-to-End Automation with the MuleSoft Automation Suite |...
 
State Management in Mule applications | MuleSoft Mysore Meetup #42
State Management in Mule applications |  MuleSoft Mysore Meetup #42State Management in Mule applications |  MuleSoft Mysore Meetup #42
State Management in Mule applications | MuleSoft Mysore Meetup #42
 
Anypoint Code Builder (ACB) + AI + Hands-On | MuleSoft Mysore Meetup #41
Anypoint Code Builder (ACB) + AI + Hands-On |  MuleSoft Mysore Meetup #41Anypoint Code Builder (ACB) + AI + Hands-On |  MuleSoft Mysore Meetup #41
Anypoint Code Builder (ACB) + AI + Hands-On | MuleSoft Mysore Meetup #41
 
Transaction Management in Mule 4 | MuleSoft Mysore Meetup #39
Transaction Management in Mule 4 |  MuleSoft Mysore Meetup #39Transaction Management in Mule 4 |  MuleSoft Mysore Meetup #39
Transaction Management in Mule 4 | MuleSoft Mysore Meetup #39
 
Exploring the realms of MuleSoft RPA | MuleSoft Mysore Meetup #38
Exploring the realms of MuleSoft RPA | MuleSoft Mysore Meetup #38Exploring the realms of MuleSoft RPA | MuleSoft Mysore Meetup #38
Exploring the realms of MuleSoft RPA | MuleSoft Mysore Meetup #38
 
Payment Integration using Braintree Connector | MuleSoft Mysore Meetup #37
Payment Integration using Braintree Connector | MuleSoft Mysore Meetup #37Payment Integration using Braintree Connector | MuleSoft Mysore Meetup #37
Payment Integration using Braintree Connector | MuleSoft Mysore Meetup #37
 
Azure DevOps Pipeline setup for Mule APIs #36
Azure DevOps Pipeline setup for Mule APIs #36Azure DevOps Pipeline setup for Mule APIs #36
Azure DevOps Pipeline setup for Mule APIs #36
 
Mastering the Puzzle Integration Patterns Decoded | MuleSoft Mysore Meetup #35
Mastering the Puzzle Integration Patterns Decoded | MuleSoft Mysore Meetup #35Mastering the Puzzle Integration Patterns Decoded | MuleSoft Mysore Meetup #35
Mastering the Puzzle Integration Patterns Decoded | MuleSoft Mysore Meetup #35
 
Discovering Seamless Integration: MuleSoft, AWS and Snowflake | MuleSoft Myso...
Discovering Seamless Integration: MuleSoft, AWS and Snowflake | MuleSoft Myso...Discovering Seamless Integration: MuleSoft, AWS and Snowflake | MuleSoft Myso...
Discovering Seamless Integration: MuleSoft, AWS and Snowflake | MuleSoft Myso...
 
Application Design Thinking wrt Integration Architecture - Part II | MuleSoft...
Application Design Thinking wrt Integration Architecture - Part II | MuleSoft...Application Design Thinking wrt Integration Architecture - Part II | MuleSoft...
Application Design Thinking wrt Integration Architecture - Part II | MuleSoft...
 
HL7 Integration using Mulesoft | MuleSoft Mysore Meetp #32
HL7 Integration using Mulesoft | MuleSoft Mysore Meetp #32HL7 Integration using Mulesoft | MuleSoft Mysore Meetp #32
HL7 Integration using Mulesoft | MuleSoft Mysore Meetp #32
 
Application Design Thinking wrt Integration Architecture - Part I | MuleSoft ...
Application Design Thinking wrt Integration Architecture - Part I | MuleSoft ...Application Design Thinking wrt Integration Architecture - Part I | MuleSoft ...
Application Design Thinking wrt Integration Architecture - Part I | MuleSoft ...
 
Slack and ChatGPT Integration using MuleSoft | MuleSoft Mysore Meetup #30
Slack and ChatGPT Integration using MuleSoft | MuleSoft Mysore Meetup #30Slack and ChatGPT Integration using MuleSoft | MuleSoft Mysore Meetup #30
Slack and ChatGPT Integration using MuleSoft | MuleSoft Mysore Meetup #30
 
Platform configuration on CloudHub 2.0 | MuleSoft Mysore Meetup #29
Platform configuration on CloudHub 2.0 | MuleSoft Mysore Meetup #29Platform configuration on CloudHub 2.0 | MuleSoft Mysore Meetup #29
Platform configuration on CloudHub 2.0 | MuleSoft Mysore Meetup #29
 
MuleSoft Integration with ChatGPT — Part 1 | MuleSoft Mysore Meetup #27
MuleSoft Integration with ChatGPT — Part 1 | MuleSoft Mysore Meetup #27MuleSoft Integration with ChatGPT — Part 1 | MuleSoft Mysore Meetup #27
MuleSoft Integration with ChatGPT — Part 1 | MuleSoft Mysore Meetup #27
 
Handling NFRs for the API through API policies (Custom Policies) -Part 2 | Mu...
Handling NFRs for the API through API policies (Custom Policies) -Part 2 | Mu...Handling NFRs for the API through API policies (Custom Policies) -Part 2 | Mu...
Handling NFRs for the API through API policies (Custom Policies) -Part 2 | Mu...
 
Handling NFRs for the API through OoTB API policies Part-1 | MuleSoft Mysore ...
Handling NFRs for the API through OoTB API policies Part-1 | MuleSoft Mysore ...Handling NFRs for the API through OoTB API policies Part-1 | MuleSoft Mysore ...
Handling NFRs for the API through OoTB API policies Part-1 | MuleSoft Mysore ...
 
Maven Archetypes - Learn about importance of Maven Archetypes in MuleSoft | M...
Maven Archetypes - Learn about importance of Maven Archetypes in MuleSoft | M...Maven Archetypes - Learn about importance of Maven Archetypes in MuleSoft | M...
Maven Archetypes - Learn about importance of Maven Archetypes in MuleSoft | M...
 

Recently uploaded

1029-Danh muc Sach Giao Khoa khoi 6.pdf
1029-Danh muc Sach Giao Khoa khoi  6.pdf1029-Danh muc Sach Giao Khoa khoi  6.pdf
1029-Danh muc Sach Giao Khoa khoi 6.pdf
QucHHunhnh
 
The basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptxThe basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptx
heathfieldcps1
 
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
ZurliaSoop
 

Recently uploaded (20)

Kodo Millet PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...
Kodo Millet  PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...Kodo Millet  PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...
Kodo Millet PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...
 
1029-Danh muc Sach Giao Khoa khoi 6.pdf
1029-Danh muc Sach Giao Khoa khoi  6.pdf1029-Danh muc Sach Giao Khoa khoi  6.pdf
1029-Danh muc Sach Giao Khoa khoi 6.pdf
 
Making communications land - Are they received and understood as intended? we...
Making communications land - Are they received and understood as intended? we...Making communications land - Are they received and understood as intended? we...
Making communications land - Are they received and understood as intended? we...
 
Mixin Classes in Odoo 17 How to Extend Models Using Mixin Classes
Mixin Classes in Odoo 17  How to Extend Models Using Mixin ClassesMixin Classes in Odoo 17  How to Extend Models Using Mixin Classes
Mixin Classes in Odoo 17 How to Extend Models Using Mixin Classes
 
Introduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The BasicsIntroduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The Basics
 
The basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptxThe basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptx
 
SOC 101 Demonstration of Learning Presentation
SOC 101 Demonstration of Learning PresentationSOC 101 Demonstration of Learning Presentation
SOC 101 Demonstration of Learning Presentation
 
General Principles of Intellectual Property: Concepts of Intellectual Proper...
General Principles of Intellectual Property: Concepts of Intellectual  Proper...General Principles of Intellectual Property: Concepts of Intellectual  Proper...
General Principles of Intellectual Property: Concepts of Intellectual Proper...
 
Food safety_Challenges food safety laboratories_.pdf
Food safety_Challenges food safety laboratories_.pdfFood safety_Challenges food safety laboratories_.pdf
Food safety_Challenges food safety laboratories_.pdf
 
Basic Civil Engineering first year Notes- Chapter 4 Building.pptx
Basic Civil Engineering first year Notes- Chapter 4 Building.pptxBasic Civil Engineering first year Notes- Chapter 4 Building.pptx
Basic Civil Engineering first year Notes- Chapter 4 Building.pptx
 
Asian American Pacific Islander Month DDSD 2024.pptx
Asian American Pacific Islander Month DDSD 2024.pptxAsian American Pacific Islander Month DDSD 2024.pptx
Asian American Pacific Islander Month DDSD 2024.pptx
 
On National Teacher Day, meet the 2024-25 Kenan Fellows
On National Teacher Day, meet the 2024-25 Kenan FellowsOn National Teacher Day, meet the 2024-25 Kenan Fellows
On National Teacher Day, meet the 2024-25 Kenan Fellows
 
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx
 
Unit-IV; Professional Sales Representative (PSR).pptx
Unit-IV; Professional Sales Representative (PSR).pptxUnit-IV; Professional Sales Representative (PSR).pptx
Unit-IV; Professional Sales Representative (PSR).pptx
 
Holdier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdfHoldier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdf
 
Micro-Scholarship, What it is, How can it help me.pdf
Micro-Scholarship, What it is, How can it help me.pdfMicro-Scholarship, What it is, How can it help me.pdf
Micro-Scholarship, What it is, How can it help me.pdf
 
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
 
Accessible Digital Futures project (20/03/2024)
Accessible Digital Futures project (20/03/2024)Accessible Digital Futures project (20/03/2024)
Accessible Digital Futures project (20/03/2024)
 
How to Manage Global Discount in Odoo 17 POS
How to Manage Global Discount in Odoo 17 POSHow to Manage Global Discount in Odoo 17 POS
How to Manage Global Discount in Odoo 17 POS
 
Unit-IV- Pharma. Marketing Channels.pptx
Unit-IV- Pharma. Marketing Channels.pptxUnit-IV- Pharma. Marketing Channels.pptx
Unit-IV- Pharma. Marketing Channels.pptx
 

Securing the network communication using One-way SSL & Two-way SSL | MuleSoft Mysore Meetup #18

  • 1. 1
  • 2. December 08, 2022 Mysore MuleSoft Meetup Implementing one-way & two-way SSL
  • 3. 3
  • 4. Safe Harbour Statement ● Both the speaker and the host are organizing this meet-up in individual capacity only. We are not representing our companies here. ● This presentation is strictly for learning purposes only. ● Organizer/Presenter do not hold any responsibility that same solution will work for your business requirements. ● This presentation is not meant for any promotional activities. 4
  • 5. A recording of this meetup will be uploaded to events page within 24 hours. Questions can be submitted/asked at any time in the Chat/Questions & Answers Tab. Make it more Interactive!!! Give us feedback! Rate this meetup session by filling feedback form at the end of the day. We Love Feedbacks!!! Its Bread & Butter for Meetup. Housekeeping 5
  • 6. Introduction ● About the Organizers 6 Shubham Chaurasia Billennium India Pro Integration Developer A SHOW OF HANDS: Who is new to this Meetup? Giridhar Meka Sr. Technical Architect linkedin.com/in/giridharmeka linkedin.com/in/shubhamchaurasia1
  • 7.  3.6 years of working experience as MuleSoft Developer  Certified MuleSoft Developer and Integration Architect  Currently working for HashedIn By Deloitte as Senior Software Engineer 7 Shaik Irfan Ahamed Sr. Software Engineer Introduction ● About the Speaker
  • 8. Agenda ● Introductions o What is SSL/TLS ? o What is a Digital Certificate? o How to implement one-way SSL? o How to implement two-way SSL? ● Demo ● Trivia 8
  • 9. SSL/TLS : SSL (Secure Sockets Layer) and its successor, TLS (Transport Layer Security), are protocols for establishing authenticated and encrypted links between networked computers HTTPS: Hypertext Transfer Protocol Secure (https) is a combination of HTTP with the SSL/ TLS protocol 9
  • 10.  Confidentiality – Provided by Encryption  Integrity – Provided by Hashing technique  Authentication – Provided by Certificates SSL/TLS Handshake 10 SSL/TLS has 3 Goals
  • 11. Confidentiality  Confidentiality can be achieved by Encryption  There are two types of encryption in widespread use today: symmetric and asymmetric encryption.  Symmetric encryption uses a single key to both encrypt and decrypt data  Asymmetric encryption uses a different keys (public-private keypair) to encrypt  Asymmetrical encryption is used to initialize the encrypted conversation between two users, while symmetrical encryption is used for the duration of the communication. 11
  • 13. Integrity…  Hashing is used to provide Integrity  Both parties establish a mutual secret key  Sender combines Message + Secret key to create Digest  Receiver verifies by calculating hash of Message + secret key 13
  • 14. Authentication  Prove your Identity  Digital Certificate is needed to prove the Identity  Digital Signature itself does not verify the actual identity of the sender 14 Alice Alice
  • 15. Digital Certificates Digital certificates are electronic credentials issued by a trusted third-party, it verifies the identity of the owner and the owner public key 15
  • 16. SSL Handshake Protocol  The user initiates the connection by typing the website address. The browser initiates SSL/TLS communication by sending a message to the website’s server.  The website's server sends back the public key or certificate to the user's browser.  User's browser checks for a public key or certificate. If it is ok, it creates a symmetric key and sends it back to the website's server. If the certificate is not ok, the communication fails.  On receiving the symmetric key, the website's server sent the key and encrypted the requested data.  The user's browser decrypts the content using a symmetric key, which completes the SSL/TLS handshake. The user can see content as now connection is established 16
  • 18. Keystore & Truststore  Keystore is used to store private key and identity certificates that a specific program should present to both parties (server or client) for verification.  Truststore is used to store certificates from Certified Authorities (CA) that verify the certificate presented by the server in SSL connection. 18
  • 19. One-Way SSL  Client requests for data on HTTPS protocol to the server. That going to initiates the SSL/TLS handshake process.  Server returns with its public certificate and public key to the client along with the server hello message  The client validates/verifies the received server certificates with CA’s certification authority  The client sends back with a symmetric session key using the server’s public key  The server decrypts the symmetric session key using its private key and sends back an encrypted session key to start the encrypted session 19
  • 21. Two-way SSL  Client requests for data on HTTPS protocol to the server.  Server returns with its public certificate and public key to the client along with the server hello message.  The client validates/verifies the received server certificates with CA’s certification authority  The client sends back a client certificate with a symmetric session key using the server’s public key.  The server validates/verifies the received client certificates with CA’s certification authority  After completion of the handshake process, client and server communicate and transfer data with each other encrypted with the secret keys shared between the two during a handshake 21
  • 23. Demo
  • 24. Q&A
  • 25. Take a stand ! ● Nominate yourself for the next meetup speaker and suggest a topic as well. 25
  • 26. ● Share: ○ Tweet using the hashtag #MuleSoftMeetups ○ Join Mysore Group: https://meetups.mulesoft.com/mysore/ ● Feedback: ○ Fill out the survey feedback and suggest topics for upcoming events ○ Contact MuleSoft at meetups@mulesoft.com for ways to improve the program ○ Reach out to Mysore Meetup Leaders (Shubham/Giridhar) to suggest topics for next Meetup What’s next? 26
  • 27. Get ready to WIN a MuleSoft Voucher from MuleSoft Quiz Time