This plugin enables the development of cloud connectors that require OAuth 1.0a o OAuth 2.0 for authentication.

Tagsplugintoolsauthenticationclientmulemulesoftoauth
DateJun 21, 2016
Filespom (5 KB)  jar (59 KB)  View All
RepositoriesMulesoft ReleasesMulesoft
Ranking#430998 in MvnRepository (See Top Artifacts)
Used By1 artifacts
VulnerabilitiesVulnerabilities from dependencies:
CVE-2020-15250
CVE-2018-1272
CVE-2018-1271
View 6 more ...

Note: There is a new version for this artifact

New Version3.9.18

Scope:
Scope:
Format:
Scope:
Scope:
Scope:
Scope:
Scope:
Scope:

Note: this artifact is located at Mulesoft Releases repository (https://repository.mulesoft.org/releases/)

Provided Dependencies (3)

Category/License Group / ArtifactVersionUpdates

org.eclipse » eclipse-workbench 3.6.1.M20100826-1330

org.eclipse » eclipse-runtime 3.6.0.v20100505
OSGi
Apache 2.0
org.osgi » core 4.3.06.0.0

Test Dependencies (2)

Category/License Group / ArtifactVersionUpdates
Testing
EPL 2.0
junit » junit1 vulnerability 4.8.26.0.1
Mocking
MIT
org.mockito » mockito-all 1.8.25.20.0

System Dependencies (1)

Category/License Group / ArtifactVersionUpdates

com.sun » tools 1.61.5.0

Licenses

LicenseURL
MuleSoft License Agreement

Related Books

Cloud Native Data Security with OAuth: A Scalable Zero Trust ArchitectureCloud Native Data Security with OAuth: A Scalable Zero Trust Architecture (2025)
by Archer, Gary, Kahrer, Judith, Trojanowski, Michał
OAuth 2.0: All you need to know (Identity in Cybersecurity)OAuth 2.0: All you need to know (Identity in Cybersecurity) (2025)
by Relington, James
Ultimate Web Authentication Handbook: Strengthen Web Security by Leveraging Cryptography and Authentication Protocols such as OAuth, SAML and FIDO (English Edition)Ultimate Web Authentication Handbook: Strengthen Web Security by Leveraging Cryptography and Authentication Protocols such as OAuth, SAML and FIDO (English Edition) (2023)
by Dash, Sambit Kumar
Keycloak - Identity and Access Management for Modern Applications: Harness the power of Keycloak, OpenID Connect, and OAuth 2.0 to secure applicationsKeycloak - Identity and Access Management for Modern Applications: Harness the power of Keycloak, OpenID Connect, and OAuth 2.0 to secure applications (2023)
by Thorgersen, Stian, Silva, Pedro Igor
Solving Identity Management in Modern Applications: Demystifying OAuth 2, OpenID Connect, and SAML 2Solving Identity Management in Modern Applications: Demystifying OAuth 2, OpenID Connect, and SAML 2 (2022)
by Wilson, Yvonne, Hingnikar, Abhishek
Advanced API Security: OAuth 2.0 and BeyondAdvanced API Security: OAuth 2.0 and Beyond (2019)
by Siriwardena, Prabath
OAuth 2.0 SimplifiedOAuth 2.0 Simplified (2018)
by Parecki, Aaron
OAuth 2 in ActionOAuth 2 in Action (2017)
by Richer, Justin, Sanso, Antonio
OAuth 2.0: Learn OAuth in a simple wayOAuth 2.0: Learn OAuth in a simple way (2016)
by Warnock, Dan
OAuth 2.0: Introduction to API Security with OAuth 2.0OAuth 2.0: Introduction to API Security with OAuth 2.0 (2016)
by Moore, Joseph
Mastering OAuth 2.0: Create powerful applications to interact with popular service providers such as Facebook, Google, Twitter, and more by leveraging the OAuth 2.0 Authorization FrameworkMastering OAuth 2.0: Create powerful applications to interact with popular service providers such as Facebook, Google, Twitter, and more by leveraging the OAuth 2.0 Authorization Framework (2015)
by Bihis, Charles
OAuth 2.0: Getting Started in Web-API Security (API University Series)OAuth 2.0: Getting Started in Web-API Security (API University Series) (2015)
by Biehl, Matthias
OAuth 2.0: Getting Started in API Security (API-University Series Book 1)OAuth 2.0: Getting Started in API Security (API-University Series Book 1) (2014)
by Biehl, Matthias
Advanced API Security: Securing APIs with OAuth 2.0, OpenID Connect, JWS, and JWEAdvanced API Security: Securing APIs with OAuth 2.0, OpenID Connect, JWS, and JWE (2014)
by Siriwardena, Prabath
Mule in ActionMule in Action (2014)
by David Dossot, John D'Emic, Victor Romero
OAuth 2.0 Identity and Access Management PatternsOAuth 2.0 Identity and Access Management Patterns (2013)
by Spasovski, Martin
Mule ESB CookbookMule ESB Cookbook (2013)
by Laliwala, Dr. Zakir, Samad, Abdul, Desai, Azaz, Vyas, Uchit
Getting Started with Mule Cloud Connect: Accelerating Integration with SaaS, Social Media, and Open APIsGetting Started with Mule Cloud Connect: Accelerating Integration with SaaS, Social Media, and Open APIs (2012)
by Carter, Ryan
Getting Started with OAuth 2.0: Programming Clients for Secure Web API Authorization and AuthenticationGetting Started with OAuth 2.0: Programming Clients for Secure Web API Authorization and Authentication (2012)
by Boyd, Ryan
Mule in ActionMule in Action (2009)
by Dossot, David, D'Emic, John
Open-Source ESBs in Action: Example Implementations in Mule and ServiceMixOpen-Source ESBs in Action: Example Implementations in Mule and ServiceMix (2008)
by Tijs Rademakers, Jos Dirksen
OAuth 2.0 ServersOAuth 2.0 Servers
by Parecki, Aaron