In what type of API implementation does MuleSoft recommend adding an API proxy to enforce the Client ID Enforcement policy, rather than embedding the policy directly in the application's JVM?
An organization wants to make sure only known partners can invoke the organization's APIs. To achieve this security goal, the organization wants to enforce a Client ID Enforcement policy in API Manager so that only registered partner applications can invoke the organization's APIs. In what type of API implementation does...
What combination of runtime plane and control plane options meets these project lifecycle goals?
A company wants to move its Mule API implementations into production as quickly as possible. To protect access to all Mule application data and metadata, the company requires that all Mule applications be deployed to the company's customer-hosted infrastructure within the corporate firewall . What combination of runtime plane and...
What is the best API fault-tolerant invocation strategy to reduce overall errors in the process API, given these conditions and constraints?
A system API is deployed to a primary environment as well as to a disaster recovery (DR) environment, with different DNS names in each environment. A process API is a client to the system API and is being rate limited by the system API, with different limits in each of...
What is the best API fault-tolerant invocation strategy to reduce overall errors in the process API, given these conditions and constraints?
A system API is deployed to a primary environment as well as to a disaster recovery (DR) environment, with different DNS names in each environment. A process API is a client to the system API and is being rate limited by the system API, with different limits in each of...
What is a typical result of using a fine-grained rather than a coarse-grained API deployment model to implement a given business process?
What is a typical result of using a fine-grained rather than a coarse-grained API deployment model to implement a given business process?A . A decrease in the number of connections within the application network supporting the business processB . A higher number of discoverable API-related assets in the application networkC...
What best describes the Fully Qualified Domain Names (FQDNs), also known as DNS entries, created when a Mule application is deployed to the CloudHub Shared Worker Cloud?
What best describes the Fully Qualified Domain Names (FQDNs), also known as DNS entries, created when a Mule application is deployed to the CloudHub Shared Worker Cloud?A . A fixed number of FQDNs are created, IRRESPECTIVE of the environment and VPC designB . The FQDNs are determined by the application...
Which of the following sequence is correct?
Which of the following sequence is correct?A . API Client implementes logic to call an API >> API Consumer requests access to API >> API Implementation routes the request to >> APIB . API Consumer requests access to API >> API Client implementes logic to call an API >> API...
What is the best API fault-tolerant invocation strategy to reduce overall errors in the process API, given these conditions and constraints?
A system API is deployed to a primary environment as well as to a disaster recovery (DR) environment, with different DNS names in each environment. A process API is a client to the system API and is being rate limited by the system API, with different limits in each of...
What is the best API fault-tolerant invocation strategy to reduce overall errors in the process API, given these conditions and constraints?
A system API is deployed to a primary environment as well as to a disaster recovery (DR) environment, with different DNS names in each environment. A process API is a client to the system API and is being rate limited by the system API, with different limits in each of...
What is a key requirement when using an external Identity Provider for Client Management in Anypoint Platform?
What is a key requirement when using an external Identity Provider for Client Management in Anypoint Platform?A . Single sign-on is required to sign in to Anypoint PlatformB . The application network must include System APIs that interact with the Identity ProviderC . To invoke OAuth 2.0-protected APIs managed by...