Camel offers several forms & levels of security capabilities that can be utilized on Camel routes. These various forms of security may be used in conjunction with each other or separately.
The broad categories offered are:
Route Security - Authentication and Authorization services to proceed on a route or route segment
Payload Security - Data Formats that offer encryption/decryption services at the payload level
Endpoint Security - Security offered by components that can be utilized by endpointUri associated with the component
Configuration Security - Security offered by encrypting sensitive information from configuration files
Camel offers the JSSE Utility for configuring SSL/TLS related aspects of a number of Camel components.
Authentication and Authorization Services
Camel offers Route Policy driven security capabilities that may be wired into routes or route segments. A route policy in Camel utilizes a strategy pattern for applying interceptors on Camel Processors. It’s offering the ability to apply cross-cutting concerns (for example. security, transactions etc) of a Camel route.
The components offering authentication and authorization services utilizing Route Policy are:
Camel offers encryption/decryption services to secure payloads or selectively apply encryption/decryption capabilities on portions/sections of a payload.
These capabilities are offered by the following components:
Some components in Camel offer an ability to secure their endpoints (using interceptors etc) and therefore ensure that they offer the ability to secure payloads as well as provide authentication/authorization capabilities at endpoints created using the components.