Architecture & Technologies

Mulesoft

MuleSoft

Duration

2 Days

Languages

French - English

Trainer(s)

Lionel BAKEKOLO - Mule ESB & API Led connectivity expert - Astrakhan

Mulesoft, a leader in integration and API platforms, through its Anypoint Platform solution, which offers a single, unified iPaaS platform and complete API lifecycle management, uniquely enables organizations to use API-based connectivity to unlock their data, promote reuse (through its API store) and create connected experiences faster.

The objectives of this training are to know the main functions and functionalities of Mulesoft, to know the principles and concepts related to the development of integration flows (API Led Connectivity) on Mulesoft, to become familiar with the development environment (Anypoint Studio/Flow Designer), to know the main components and to implement some simple integration flows on Flow Designer & Anypoint Studio (IDE).

Target Audience

  • API Developers
  • Architects

Prerequisites

  • Experience with object-oriented language
  • Knowledge of Json, Xml, Csv data formats
  • Basic knowledge of HTTP, REST, SOAP, JDBC, JMS integration technologies

Course Delivery

On site, in your offices

Workshops

Training Program

Introduction to the uses and functionalities of Mulesoft/Anypoint platform

  • Description of the Mulesoft platform: Design Center, Exchange, Management Center (Api Manager, environments, visualization, monitoring)
  • Reminder of API design principles & role of Design Thinking
  • The HTTP protocol and its verbs

Development

  • Building and deploying a first proxy API
  • Build an application network using API-driven connectivity and the Anypoint platform
  • Using the Anypoint platform to discover, consume, design, create, deploy, manage and govern APIs
  • Environment management
  • Good design practices
  • Deploying a proxy API from a Web Service Request for access to an API

Testing

  • Presentation of Munit
  • Debugging, analysis of the flow and of a Mule message (Mule event)

Security

  • Implementation of Oauth 2.0: Client Credentials, Password, Grant Code
  • Client ID enforcement
  • Cross-Origin resource sharing
  • Protection against content-based attacks

The publication

  • Creation and configuration of API Products

Analysis of flows and traffic

Advanced features

  • Hosted Targets
  • Shared resources
  • Exception handling
  • Cache management

Detailed presentation of the policies

  • Security Policies
  • Mediation Policies
  • Load and quota limitation policies
  • Format conversion policies
  • Policies for calling external functions (JWT)