Contact Us 1-800-596-4880

Anypoint Platform Gateways Overview

An API gateway is an intermediary between a client application and a set of microservices or backend APIs. Responsibilities include request routing, rate limiting, caching, authentication, authorization, security, monitoring, and logging.

A gateway enables you to add a dedicated orchestration layer on top of your backend APIs and services to help you separate orchestration from implementation.

Anypoint Platform offers two gateway products for managing and securing your APIs:

Anypoint Flex Gateway

Anypoint Flex Gateway is an Envoy-based, ultrafast lightweight API gateway designed to manage and secure APIs running anywhere. Built to seamlessly integrate with DevOps and CI/CD workflows, Anypoint Flex Gateway delivers the performance required for the most demanding applications and microservices while providing enterprise security and manageability across any environment.

For more information, see Flex Gateway Overview.

Anypoint Mule Gateway

Mule runtime engine includes an embedded Mule Gateway. You can leverage the governance capabilities of API Manager to apply, among other capabilities, throttling, security, caching, and logging to your APIs.

Using Mule Gateway, you can, for example:

  • Apply a basic authentication policy on top of a Mule application.

  • Enrich an incoming or outgoing message.

  • Add any other complex capability to an API without having to write any code.

For more information, see Mule Gateway Overview.

Flex Gateway vs. Mule Gateway

Flex Gateway can manage and secure APIs, both Mule and non-Mule, running anywhere.

In contrast, Mule Gateway protects a single Mule API. The key advantage is that it’s easy for Mule app developers to provide basic endpoint protection. You can configure Mule in Anypoint Runtime Manager as a CloudHub proxy application, protecting multiple backends.

Building custom policies on Mule Gateway is similar to building an application with Java using the Mule DSL. Building a custom policy in Flex Gateway is based on Envoy-provided Rust WASM SDKs. A Mule Gateway policy cannot be reused in Flex Gateway and vice versa, because the underlying architectures are fundamentally different.

MuleSoft recommends you choose Flex Gateway for high-availability and high-performance Mule and non-Mule applications.

To protect Mule applications that do not require the management and maintenance of underlying infrastructure, choose Mule Gateway for CloudHub.

Flex Gateway Mule Gateway

Summary

Envoy-based API gateway to secure all APIs, Mule and non-Mule, running anywhere

Java-based API gateway embedded into Mule, to secure only Mule APIs

Tech Stack

  • Underlying engine built upon Envoy

  • Leverages Fluent Bit for logging

Java Spring Application embedded into Mule

Use Case

  • High performant and high availability

  • Secure any API anywhere.

  • Secure a Mule API basic endpoint, or enable a dedicated proxy as an embedded library in a Mule instance.

  • Also available as a Mule proxy application in CloudHub

Key Capabilities

  • Small footprint

  • Multiple deployment patterns and modes, including as a native Kubernetes Ingress controller

  • Connected Mode as well as Local Mode available

  • Same technology as Mule integration applications

  • API Autodiscovery for Mule applications

  • Connected Mode only

Custom Policy Development

Rust WASM SDKs

Java and Mule DSL

Policy Availability by Gateway

Policy Summary Managed Flex Gateway Flex Gateway Connected Mode Flex Gateway Local Mode Mule Gateway

A2A Agent Card

Rewrites the Agent card URL to match the server instance public URL

Yes

Yes

No

No

A2A PII Detector

Detects personally identifiable information (PII) in requests sent to the agent

Yes

Yes

No

No

A2A Prompt Decorator

Decorates prompts with context information

Yes

Yes

No

No

A2A Schema Validation

Validates Agent requests to ensure they conform to the A2A specification

Yes

Yes

No

No

A2A Token Based Rate Limit

Limits API usage based on the number of GPT-4o-mini tokens consumed by the agents

Yes

Yes

No

No

LLM Token Based Rate Limit

Rate limits LLM Proxy usage based on token consumption

Yes

Yes

No

No

Agent Connection Telemetry

Tracks the number of requests made to agent or MCP server instances

Yes

Yes

No

No

AWS Lambda

Allows access based on the basic authorization mechanism, with user-password defined on LDAP

Yes

Yes

Yes

No

AWS Request Signature

Signs outgoing requests with AWS Signature Version 4 (SigV4) or Signature Version 4A (SigV4A)

Yes

Yes

Yes

No

Basic Authentication: LDAP

Allows access based on the basic authorization mechanism, with user-password defined on LDAP

Yes

Yes

Yes

Yes

Basic Authentication: Simple

Allows access based on the basic authorization mechanism, with a single user-password

Yes

Yes

Yes

Yes

Client ID Enforcement

Allows access only to authorized client applications

Yes

Yes

No

Yes

Circuit Breaker

Prevents an upstream from receiving too many requests or connections

Yes

Yes

Yes

No

Credential Injection Basic Authentication

Injects a basic authorization header into outgoing requests

Yes

Yes

Yes

No

Credential Injection API Key

Injects an API key or client credentials headers into outgoing requests

Yes

Yes

Yes

No

Credential Injection OAuth 2.0

Injects an OAuth 2.0 authorization header into outgoing requests

Yes

Yes

Yes

No

Credential Injection JWT Generation

Generates and injects a JWT token into outgoing requests

Yes

Yes

Yes

No

OAuth 2.0 OBO Credential Injection

Exchanges incoming bearer tokens using OAuth 2.0 Token Exchange (RFC 8693), Microsoft Entra ID On-Behalf-Of, or OAuth 2.0 Token Exchange with CIBA

Yes

Yes

No

No

Cross-Origin Resource Sharing (CORS)

Enables access to resources residing in external domains

Yes

Yes

Yes

Yes

DataWeave Body Transformation

Transforms request or response body content with a DataWeave script

Yes

Yes

Yes

No

DataWeave Headers Transformation

Transforms request or response headers with a DataWeave script

Yes

Yes

Yes

No

DataWeave Request Filter

Filters requests by using a DataWeave script

Yes

Yes

Yes

No

Detokenization

Returns a tokenized value to its original value

No

No

No

Yes

External Authorization

Authenticates requests by using an external gRPC or HTTP authorization service

Yes

Yes

Yes

No

External Processing

Sends the incoming HTTP requests or outgoing HTTP responses to an external gRPC service for additional processing

Yes

Yes

Yes

No

Header Injection

Adds headers to a request or a response

Yes

Yes

Yes

Yes

Header Removal

Removes headers from a request or a response

Yes

Yes

Yes

Yes

Health Check

Monitors API upstream health at specific intervals

Yes

Yes

No

No

HTTP Caching

Caches HTTP responses from an API implementation

Yes

Yes

Yes

Yes

Injection Protection

Scans request headers, path, query, and body to protect against SQL, XSS, and custom injection attacks in incoming requests

Yes

Yes

Yes

No

IP Allowlist

Allows a list or range of specified IP addresses to request access

Yes

Yes

Yes

Yes

IP Blocklist

Blocks a single IP address or a range of IP addresses from accessing an API endpoint

Yes

Yes

Yes

Yes

A2A In-Task Authorization Code

Ensures secondary credentials are present for in-task authentication using OAuth 2.0 Authorization Code flow

Yes

Yes

No

No

JSON Threat Protection

Protects against malicious JSON in API requests

Yes

Yes

Yes

Yes

JWT Validation

Validates a JWT

Yes

Yes

Yes

Yes

MCP Attribute-Based Access Control

Controls access to tools, resources, and prompts based on user information such as Tiers, IP, Headers, or Claims

Yes

Yes

No

No

MCP Global Access

Restricts which MCP tools are exposed by defining Allow and Block rules

Yes

Yes

No

No

MCP PII Detector

Blocks elicitation responses containing personally identifiable information (PII) from reaching MCP servers

Yes

Yes

No

No

MCP Schema Validation

Validates MCP requests to ensure they conform to the MCP specification

Yes

Yes

No

No

MCP Support

Adds MCP support to a Flex Gateway MCP server instance. This policy is required for your MCP server instance to function properly.

Yes

Yes

No

No

MCP Tool Mapping

Renames MCP tool names in requests and responses to provide flexible tool naming

Yes

Yes

No

No

Message Logging

Logs custom messages using information from incoming requests, responses from the backend, or information from other policies applied to the same API endpoint

Yes

Yes

Yes

Yes

Outbound Message Logging

Logs custom messages from outbound requests sent to upstream services, responses from upstream services, or information from other outbound policies applied to the same upstream service

Yes

Yes

Yes

No

OAuth 2.0 Access Token Enforcement Using Mule OAuth Provider

Allows access only to authorized client applications

No

No

No

Yes

OAuth 2.0 Token Introspection

Allows access only to authorized client applications

Yes

Yes

Yes

No

OpenAM OAuth 2.0 Token Enforcement

Allows access only to authorized client applications

No

No

No

Yes

OpenID Connect OAuth 2.0 Access Token Enforcement

Allows access only to authorized client applications

Yes

Yes

No

Yes

PingFederate OAuth 2.0 Token Enforcement

Allows access only to authorized client applications

No

No

No

Yes

Rate Limiting

Monitors access to an API by defining the maximum number of requests processed within a period of time

Yes

Yes

Yes

Yes

Rate Limiting: SLA-based

Monitors access to an API by defining the maximum number of requests processed within a timespan, based on SLAs

Yes

Yes

No

Yes

Regex Prompt Guard

Blocks LLM requests that match deny-list regex patterns

Yes

Yes

No

No

Response Timeout

Sets the maximum duration Flex Gateway waits for a response from an upstream service

Yes

Yes

Yes

No

Schema Validation

Validates incoming traffic against a supplied OAS3 schema

Yes

Yes

Yes

No

SOAP Schema Validation

Validates incoming traffic against a specified WSDL schema

Yes

Yes

Yes

No

SSE Logging

Logs every SSE event while streaming

Yes

Yes

No

No

Stream Idle Timeout

Sets the maximum duration a stream can remain idle without receiving a request or response

Yes

Yes

Yes

No

Spike Control

Regulates API traffic

Yes

Yes

Yes

Yes

Traffic Management for Multiple Upstream Services

Manages API instance traffic to multiple upstream services from a single consumer endpoint

Yes

Yes

Yes

No

Traffic Management for Multiple Upstream Services (Weighted)

Manages API instance traffic to multiple upstream services from a single consumer endpoint, using weighted percentages

Yes

Yes

Yes

No

Transport Layer Security (TLS) - Inbound

Enables authentication between a client and the API proxy

Yes

Yes

Yes

No

Transport Layer Security (TLS) - Outbound

Enables two-way authentication between the API proxy and an upstream service

Yes

Yes

Yes

No

Tokenization

Transforms sensitive data into a nonsensitive equivalent, named token

No

No

No

Yes

Upstream Idle Timeout

Sets the maximum duration a stream between Flex Gateway and an upstream service can remain idle

Yes

Yes

Yes

No

XML Threat Protection

Protects against malicious XML in API requests

Yes

Yes

Yes

Yes