Introduction Pre-requisites Implementing Basic Authentication and JSON Threat Protection in MuleSoft Steps: 2. Next, we’ll publish the API specification to exchange. 3. Then we will create a new Mule project and scaffold it. 4. Next, we will add 2 loggers which determines the start and end of flow. 5. Then we’ll create a new mule […]