Flex Gateway新着情報
Governance新着情報
Monitoring API ManagerYou can now access the Settings page tab for users in three different ways:
Click the user’s name in the Name column.
Click the username of the user in the Username column.
Click the More actions menu (…) in the user’s row, and select Manage User.
For more information, see Access the User’s Settings Page.
The ability to add new PingFederate client providers is deprecated. You can continue to use and manage existing PingFederate client providers.
The Audit Log Query API now returns versioned object information, which is captured at the time of log generation. Previously, queries returned only the latest object information, and you had to opt in to receive versioned information. This enhancement is now standard for query results. However, the data model for query results remains unchanged.
You can now update Azure AD Client secrets in Anypoint Platform access management. For more information, see Client Secrets.
You can now manage connected apps at the business group level. Previously configured connected apps are automatically associated with your root organization. Note that users who have the Organization Administrator permission in a business group can manage only the connected apps that are configured within the respective business group.
The Audit Log Query API now enables you to specify a query parameter when you call the API. This opt-in feature enables API responses to include versioned object information that was captured when the audit log was generated. For more information, see the Audit Log Query API in Exchange.
The Telemetry Exporter feature in Anypoint Monitoring enables you to export audit log data to third-party analytics and observability apps.
The modern UI is now the only Access Management experience for all organizations. Organizations that had access to the legacy UI can no longer switch to this view. The modern UI includes the following enhancements:
The Teams feature for robust and scalable permissions management. Your root organization is automatically given an "Everyone at <root organization>" team that enables you to provide a basic set of permissions for all users in your organization.
A polished business group interface featuring more details, including a broader look at membership, permissions, environments, and limits. This interface enables you to view and manage access to all of your business groups at once instead of having to switch between each business group.
Visual representations of feature consumption for business groups, users, teams, roles, and SAML identity providers
Custom confidentiality notifications
Configurable audit log retention period
Improved audit log query performance
Ability to sync your organization with MuleSoft Composer
As part of the modern UI adoption, the following features and functions have moved:
The list of environments is now accessible from the Business Groups section in Access Management.
Roles are now accessible from the Business Groups section in Access Management.
As part of the modern UI adoption, the following features have been deprecated:
The business group picker in the Anypoint Platform navigation bar is no longer available. Select a business group from the Business Groups section in Access Management.
The Anypoint Platform Sign Up page includes the following new fields:
Job Title
Country
State/Province
Number of Employees
Industry
Additionally, the Full Name field has been changed to First Name and Last Name fields.
The connected app scope assignment, Permission changes
, now logs audits together under a single entry with the corresponding sub-action (Add assignments
, Replace assignments
, and Delete assignments
) instead of multiple entries for each assignment.
The modern UI is now the default Access Management experience for all organizations. The modern UI provides a more accessible and intuitive user experience while enabling you to use additional features, such as custom confidentiality notifications and limits pages across Access Management.
Organizations that had access to the legacy UI can switch back to it using the Hide New Features button until January 26, 2024.
A new connected apps scope, Create BGs under a given org
, enables you to use apps that have the client_credentials
grant type to create business groups.
The interface that’s used to assign permissions to users, teams, and connected apps is enhanced for improved usability.
For newly created organizations, audit logs now have a default retention period of one year. If your organization was created before July 10, 2023 and you did not manually change the retention period, the default retention period is still six years.
When an organization administrator logs in to Anypoint Platform, they are prompted to verify that their organization is compliant with impending multi-factor authentication enforcement.
The profile linking capability is now available for all organizations globally.
The openid:google_wif
scope is now available for use with connected apps. This scope enables you to configure Anypoint as an IdP for Google Cloud by providing an id_token
and an access token during the OAuth2 token flow for client_credentials
connected apps.
The Audit Log Query endpoint now applies rate limits (requests per minute
) per IP address that vary depending on your control plane:
US: 700
EU: 40
Gov: 40
You can now link your SSO login to other Anypoint Platform profiles that share the same email address. An organization administrator must enable this feature. Only identity providers that use OpenID Connect are supported. This feature is available only for organizations located in the EU control plane.
In the Connected Apps audit logs, the Token Retrieval Success
and Token Retrieval Failure
entries now have clientIP
in their payloads.
Access Management’s modern UI is now enabled by default for new organizations. Organizations that still use the legacy UI can migrate to the modern UI using the Try New Features dialog in the Access Management navigation menu.
To enhance accessibility and usability, the Connected Apps feature’s scope workflow has been polished.
The following pages now have sections showing limits imposed by Anypoint Platform:
Business groups (including the page for your root organization)
Users
Teams
Roles
SAML identity providers
Note that this feature is available only if you have enabled the New Features Access Management user interface.
Organization administrators can now create a custom confidentiality notification that appears when users log in to their organization.
The Audit Log Query API now supports more efficient querying. For more information, see the tutorial in the Audit Logs documentation.
For improved loading times, the pagination on the Audit Logs page has changed to display many
instead of listing the number of entries if that number exceeds 10,000.
If your organization has not opted in to the new and improved features, Access Management now prompts you to try the new features and offers UI prompts to enable smooth adoption.
Business group overviews now have the Access Overview section that enables you to view a list of users who have a specified permission across business groups.
When you select a business group in the Business Groups page, the Settings section for that business group opens by default.
Sliders for vCore allocations have been readded to the Settings section of business groups.
To enhance usability, the Teams feature and permissions workflows have been polished.
Audit logs now collect and display data for the connected apps login
action via token retrieval success
and token retrieval failure
.
Multi-factor authentication (MFA) is now required for all non-SSO user accounts unless they are on their organization’s exemption list. At login, Anypoint Platform now prompts users to configure a verification method if they have not already.
You no longer have the option to make MFA optional across your entire organization.
For enhanced security, Anypoint Platform now prompts non-SSO user accounts to verify their email address.
You can now change the retention period for your organization’s audit logs. To change audit log retention periods, you must have the Audit Log Config Manager permission over your root organization.
The Connected Apps feature now includes generated documentation based on supported scopes and permissions. This documentation is accessible in Access Management > Connected Apps > Scopes Documentation tab.
For enhanced security, Access Management might ask users to re-authenticate before they can modify their email addresses. Similarly, Access Management might ask organization administrators to re-authenticate before they can modify their organization users’ email addresses. This change prevents bad actors from taking advantage of stale browser sessions.
User accounts that are added to an existing organization must configure multi-factor authentication (MFA).
When you create a new organization, multi-factor authentication (MFA) is enabled by default. While it is best to use the Connected Apps feature instead of service accounts, an organization administrator can add service accounts or other user accounts without MFA to an exemption list.
You can now check the retention period for your organization’s audit logs using the Audit Logging API.
You can now configure Azure Active Directory (Azure AD) as a client provider. As your client provider, Azure AD provides a stateless microservice to convert OAuth 2.0 client application registration requests to requests supported by Azure AD. Additionally, configuring Azure AD as a client provider enables you to authenticate and authorize existing API consumers.
When you configure the Issuer field while adding a client provider, such as Okta, that is compatible with this spec, metadata from $ISSUER/.well-known/oauth-authorization-server
is discovered and validated prior to merging. Once the validation is complete, a complete list of available grant types appears. If you want to fetch metadata for validation for an existing client provider, save that client provider again, and the validation occurs automatically.
This change makes the client provider registration process smoother for Okta users. Additionally, this change also enables the use of the Client Credentials grant type.
When you use dynamic client registration to configure a client provider, you can now configure the length of time at which a client provider times out. The minimum timeout value is five seconds, and the maximum value is 20 seconds.
Organization administrators can now configure up to 25 SAML 2.0 or OpenID Connect identity providers (IdPs) for single sign-on.
To support multiple external IdPs, there are new endpoints available for the Access Management API; existing identity provider configurations are unaffected.
In Organization settings and Runtime Manager subscription information, the name of VPN counter is now Network Connections. The Network Connections setting enables you to allocate your VPN connections and AWS Transit Gateway attachments in your organization.
Users who have not enabled multi-factor authentication (MFA) will be prompted to enable MFA weekly until they enable it. While MuleSoft recommends enabling MFA on all user accounts (preferably by requiring it for the entire organization), using MFA is still optional.
The Teams feature provides improved user and permission management. Teams provides user grouping mechanisms in Anypoint Platform, which streamlines collaboration, reuse, and scalability. Use teams to:
Manage users and permissions across multiple business groups
Define permissions and then assign them to multiple users in one click
Set global permissions (for example, give everyone in your organization the Exchange Viewer permission)
Share Exchange assets with a specific group of users
Additionally, the Access Management navigation menu and user interface have been revamped to simplify navigation and permission management across business groups.
Enhancements and updates are available on an opt-in basis. You can continue using old views after the Teams feature and user interface enhancement release.
When you change your password, you can no longer reuse your previous three passwords.
If you are using an external identity provider, such as Okta or Salesforce, you can now map users in a federated organization’s OpenID Connect (OIDC) groups to roles in Anypoint Platform.
You can now enable multi-factor authentication (MFA) as a sign-in requirement across your entire organization.
MFA makes logging in to Anypoint Platform more secure.
You can now easily rotate SAML 2.0 SSO keys. You can generate a key or upload an existing public/private key pair.
You can now import SAML 2.0 metadata to configure your identity provider with Anypoint Platform.
You can now export service provider SAML 2.0 metadata to configure Anypoint Platform with your identity provider.
These are the enhancements and new features for Access Management.
Organization administrators can configure whether SAML SSO can be initiated by Anypoint Platform (service provider-initiated SSO), their external identity provider (identity provider-initiated SSO), or both.
You can now log in using SSO from the Anypoint Platform login page via your organization’s domain. This domain is available on your user profile page.
When the permission scopes change for an approved connected app, an organization administrator must approve the new set of scopes.
Anypoint Platform now includes an External Access feature that serves as the foundation for improved cross-organization collaboration such as the sharing of assets.
This release of Access Management provides increased security and development capabilities via the Connected Apps feature.
The Connected Apps feature enables you to delegate access to apps without sharing sensitive credentials or giving third parties full control of their accounts. You can audit the app’s use of data, and you can revoke access anytime.
With this release, developers can create apps that use a Sign in with Anypoint Platform widget. When users interact with this widget, they can authorize apps to access their Anypoint Platform information.
Actions taken by apps are audited. Note that some products do not currently include client IDs in this release of the Connected Apps feature.
These are the enhancements and new features for Access Management:
A VPN counter is added under Business Group settings to allow a fine-grained allocation of purchased VPNs within your organizations.
Audit log dates now display a timestamp for a year.
When configuring an external identity provider, users can now disable server certificate validation. See Configure OpenID Connect Client Management.
Enablement of non-SSO users for your organization allows organization administrators to invite and authenticate users outside of the external SSO configured for your organization.
Organization administrators can enable and disable automapper capability for Flow Designer under the organization settings in Access Manager. See the Flow Designer documentation for more information.
You can enable client deletion in Anypoint Platform, which allows deletions of clients within Anypoint Platform. See Configure OpenID Connect Client Management.
You can enable client deletion and updates in IdP, which allows updates and deletions of external clients in the configured IdP through an outbound call made by Anypoint Platform. To use this feature, you should opt-in to client deletion within Anypoint Platform.
The Audit Log screen and a downloadable CSV file now include environment names for events from API Manager, Runtime Manager, CloudHub, Partner Manager, and MQ.
Version 0.46.0
MuleSoft supports using Salesforce Identity as a SSO (single sign-on) provider with the OpenID Connect protocol. Salesforce is a certified OpenID Provider.
Deleted federated users are no longer able to sign in from the SSO login page. Organization administrators must re-enable deleted users before they can continue operations on Anypoint Platform.
You can’t create a Business Group name using special characters. Only the following characters are valid:
Letter
Number
Apostrophe
Space
Comma
Period
Hyphen
Underscore
Existing Business Groups whose names contain special characters aren’t affected.
Version 0.29.0
Access Management v0.29.0 enables external Anypoint users to create client applications on public API portals. These external users will be shown under a New tab for external users in the Users section of the Access Management UI. This release also includes infrastructure changes that improve platform performance.
Version 0.27.0
Access Management v0.27.0 supports identity providers, such as Okta, that are compliant with the OpenID Connect Dynamic Client Registration protocol for API Client Management. You can now use these providers to protect API Gateways through a generic access token enforcement policy. This release also includes infrastructure improvements to help with performance. For more information, see the client management documentation.
Version 0.23.1
Access Management v0.23.1 enhances the user experience for configuring external identity forms through tooltips and form validation mechanisms. It provides several infrastructure improvements. MuleSoft has also validated our OpenID Connect SSO solution with Okta, OpenAM, and Ping Federate.
Version 0.22.0
Access Management v0.22 supports OpenID Connect-compliant identity providers (IdPs) for Single Sign On to Anypoint Platform. Through a new UI for external identity configurations, this release also brings the client UI configuration forms for PingFederate and OpenAM into the platform.
Version 0.18.0
Access Management v0.18 adds a no CAPTCHA reCAPTCHA verification step in our sign up process.
Version 0.16.0
Access Management v0.16 allows Organization administrators and Audit Log Viewers to view entitlement changes to their organization from the Audit Logs UI.
Additionally, Access Management now supports Ping Federate v8.2.1.1 for External Identity.
Version 0.15.0
Access Management v0.15 improves the user invitation experience and allows users to accept organization invitations with an existing Anypoint username.
If a user has different usernames associated with an email address and receives an invitation to a new organization, the user is now given the option to accept the invitation with any one of her existing accounts, thereby, associating the selected username with this new organization.
If the selected username is already associated with another Anypoint organization, the user is then given the option to detach this username from the existing organization. If she is the only user in that org, she is also given the ability to delete that organization as usernames must remain unique across all Anypoint organizations. At any stage in the invite process, she can always chose to create a new username.
Version 0.14.0
The Access Management V0.14.0 release makes minor improvements to Anypoint Platform’s notifications about your Trial subscription period.
If you are in your 30 day trial period, you can see the expiration date under the Subscription section in the Access Management UI. After your trial period expires your account will be converted to a “Free” subscription tier where you will lose the ability to deploy apps and APIs along with other Enterprise functionality within Anypoint Platform.
You will still be able to login to your account.
Version 0.12.0
The Access Management V0.12.0, is a minor release that makes the Audit Logs UI a GA functionality. Using this UI users can query and filter Audit logs.
Audit Logs UI for Anypoint Platform: Changes made by users within an Anypoint Platform organization are logged through an audit logging service. You can now access the data logs through the Audit Logs UI under Access Management or by leveraging the Audit Logging Query API. See Audit Logs.