REGISTER NOW FOR THE KONG AGENTIC ERA WORLD TOUR GOVERN A2A TRAFFIC WITH KONG'S NEW AGENT GATEWAY WHY GARTNER’S “CONTEXT MESH” CHANGES EVERYTHING DON’T MISS API + AI SUMMIT 2026 SEPT 30 – OCT 1
  • [Why Kong](/company/why-kong)Why Kong
    • Explore the unified API Platform
        • BUILD APIs
        • [
          Kong Insomnia](/products/kong-insomnia)
          Kong Insomnia
        • [
          API Design](/products/kong-insomnia/api-design)
          API Design
        • [
          API Mocking](/products/kong-insomnia/api-mocking)
          API Mocking
        • [
          API Testing and Debugging](/products/kong-insomnia/api-testing-and-debugging)
          API Testing and Debugging
        • [
          MCP Client](/products/kong-insomnia/mcp-client)
          MCP Client
        • RUN APIs
        • [
          API Gateway](/products/kong-gateway)
          API Gateway
        • [
          Context Mesh](/products/kong-konnect/features/context-mesh)
          Context Mesh
        • [
          AI Gateway](/products/kong-ai-gateway)
          AI Gateway
        • [
          Event Gateway](/products/event-gateway)
          Event Gateway
        • [
          Kubernetes Operator](/products/kong-gateway-operator)
          Kubernetes Operator
        • [
          Service Mesh](/products/kong-mesh)
          Service Mesh
        • [
          Ingress Controller](/products/kong-ingress-controller)
          Ingress Controller
        • [
          Runtime Management](/products/kong-konnect/features/runtime-management)
          Runtime Management
        • DISCOVER APIs
        • [
          Developer Portal](/products/kong-konnect/features/developer-portal)
          Developer Portal
        • [
          Service Catalog](/products/kong-konnect/features/api-service-catalog)
          Service Catalog
        • [
          MCP Registry](/products/mcp-registry)
          MCP Registry
        • GOVERN APIs
        • [
          Metering and Billing](/products/kong-konnect/features/usage-based-metering-and-billing)
          Metering and Billing
        • [
          APIOps and Automation](/products/apiops-automation)
          APIOps and Automation
        • [
          API Observability](/products/kong-konnect/features/api-observability)
          API Observability
        • [Why Kong?](/company/why-kong)Why Kong?
      • CLOUD
      • [Cloud API Gateways](/products/kong-konnect/features/dedicated-cloud-gateways)Cloud API Gateways
      • [Need a self-hosted or hybrid option?](/products/kong-enterprise)Need a self-hosted or hybrid option?
      • COMPARE
      • [Considering AI Gateway alternatives? ](/performance-comparison/ai-gateway-alternatives)Considering AI Gateway alternatives?
      • [Kong vs. Postman](/performance-comparison/kong-vs-postman)Kong vs. Postman
      • [Kong vs. MuleSoft](/performance-comparison/kong-vs-mulesoft)Kong vs. MuleSoft
      • [Kong vs. Apigee](/performance-comparison/kong-vs-apigee)Kong vs. Apigee
      • [Kong vs. IBM](/performance-comparison/ibm-api-connect-vs-kong)Kong vs. IBM
      • GET STARTED
      • [Sign Up for Kong Konnect](/products/kong-konnect/register)Sign Up for Kong Konnect
      • [Documentation](https://developer.konghq.com/)Documentation
      • FOR PLATFORM TEAMS
      • [Developer Platform](/solutions/building-developer-platform)Developer Platform
      • [Kubernetes and Microservices](/solutions/build-on-kubernetes)Kubernetes and Microservices
      • [Observability](/solutions/observability)Observability
      • [Service Mesh Connectivity ](/solutions/service-mesh-connectivity)Service Mesh Connectivity
      • [Kafka Event Streaming](/solutions/kafka-stream-api-management)Kafka Event Streaming
      • FOR EXECUTIVES
      • [AI Connectivity](/ai-connectivity)AI Connectivity
      • [Open Banking](/solutions/open-banking)Open Banking
      • [Legacy Migration](/solutions/legacy-api-management-migration)Legacy Migration
      • [Platform Cost Reduction](/solutions/api-platform-consolidation)Platform Cost Reduction
      • [Kafka Cost Optimization](/solutions/reduce-kafka-cost)Kafka Cost Optimization
      • [API Monetization](/solutions/api-monetization)API Monetization
      • [AI Monetization](/solutions/ai-monetization)AI Monetization
      • [AI FinOps](/solutions/ai-cost-governance-finops)AI FinOps
      • FOR AI TEAMS
      • [Agent Gateway](/agent-gateway)Agent Gateway
      • [AI Governance](/solutions/ai-governance)AI Governance
      • [AI Security](/solutions/ai-security)AI Security
      • [AI Cost Control](/solutions/ai-cost-optimization-management)AI Cost Control
      • [Agentic Infrastructure](/solutions/agentic-ai-workflows)Agentic Infrastructure
      • [MCP Production](/solutions/mcp-production-and-consumption)MCP Production
      • [MCP Traffic Gateway](/solutions/mcp-governance)MCP Traffic Gateway
      • FOR DEVELOPERS
      • [Mobile App API Development](/solutions/mobile-application-api-development)Mobile App API Development
      • [GenAI App Development](/solutions/power-openai-applications)GenAI App Development
      • [API Gateway for Istio](/solutions/istio-gateway)API Gateway for Istio
      • [Decentralized Load Balancing](/solutions/decentralized-load-balancing)Decentralized Load Balancing
      • BY INDUSTRY
      • [Financial Services](/solutions/financial-services-industry)Financial Services
      • [Healthcare](/solutions/healthcare)Healthcare
      • [Higher Education](/solutions/api-platform-for-education-services)Higher Education
      • [Insurance](/solutions/insurance)Insurance
      • [Manufacturing](/solutions/manufacturing)Manufacturing
      • [Retail](/solutions/retail)Retail
      • [Software & Technology](/solutions/software-and-technology)Software & Technology
      • [Transportation](/solutions/transportation-and-logistics)Transportation
      • [See all Solutions](/solutions)See all Solutions
  • [Pricing](/pricing)Pricing
      • DOCUMENTATION
      • [Kong Konnect](https://developer.konghq.com/konnect/)Kong Konnect
      • [Kong Gateway](https://developer.konghq.com/gateway/)Kong Gateway
      • [Kong Mesh](https://developer.konghq.com/mesh/)Kong Mesh
      • [Kong AI Gateway](https://developer.konghq.com/ai-gateway/)Kong AI Gateway
      • [Kong Event Gateway](https://developer.konghq.com/event-gateway/)Kong Event Gateway
      • [Kong Insomnia](https://developer.konghq.com/insomnia/)Kong Insomnia
      • [Plugin Hub](https://developer.konghq.com/plugins/)Plugin Hub
      • EXPLORE
      • [Blog](/blog)Blog
      • [Learning Center](/blog/learning-center)Learning Center
      • [eBooks](/resources/e-book)eBooks
      • [Reports](/resources/reports)Reports
      • [Demos](/resources/demos)Demos
      • [Customer Stories](/customer-stories)Customer Stories
      • [Videos](/resources/videos)Videos
      • EVENTS
      • [API + AI Summit](/events/conferences/api-ai-summit)API + AI Summit
      • [Agentic Era World Tour](/agentic-era-world-tour)Agentic Era World Tour
      • [Webinars](/events/webinars)Webinars
      • [User Calls](/events/user-calls)User Calls
      • [Workshops](/events/workshops)Workshops
      • [Meetups](/events/meetups)Meetups
      • [See All Events](/events)See All Events
      • FOR DEVELOPERS
      • [Get Started](https://developer.konghq.com/)Get Started
      • [Community](/community)Community
      • [Certification](/academy/certification)Certification
      • [Training](https://education.konghq.com)Training
      • COMPANY
      • [About Us](/company/about-us)About Us
      • [We're Hiring!](/company/careers)We're Hiring!
      • [Press Room](/company/press-room)Press Room
      • [Contact Us](/company/contact-us)Contact Us
      • [Kong Partner Program](/partners)Kong Partner Program
      • [Enterprise Support Portal](https://support.konghq.com/s/)Enterprise Support Portal
      • [Documentation](https://developer.konghq.com/?_gl=1*tphanb*_gcl_au*MTcxNTQ5NjQ0MC4xNzY5Nzg4MDY0LjIwMTI3NzEwOTEuMTc3MzMxODI2MS4xNzczMzE4MjYw*_ga*NDIwMDU4MTU3LjE3Njk3ODgwNjQ.*_ga_4JK9146J1H*czE3NzQwMjg1MjkkbzE4OSRnMCR0MTc3NDAyODUyOSRqNjAkbDAkaDA)Documentation
  • [](/search)
  • [Login](https://cloud.konghq.com/login)Login
  • [Book Demo](/contact-sales)Book Demo
  • [Get Started](/products/kong-konnect/register)Get Started
[Blog](/blog)Blog
  • [AI Gateway](/blog/tag/ai-gateway)AI Gateway
  • [AI Security](/blog/tag/ai-security)AI Security
  • [AIOps](/blog/tag/aiops)AIOps
  • [API Security](/blog/tag/api-security)API Security
  • [API Gateway](/blog/tag/api-gateway)API Gateway
|
    • [API Management](/blog/tag/api-management)API Management
    • [API Development](/blog/tag/api-development)API Development
    • [API Design](/blog/tag/api-design)API Design
    • [Automation](/blog/tag/automation)Automation
    • [Service Mesh](/blog/tag/service-mesh)Service Mesh
    • [Insomnia](/blog/tag/insomnia)Insomnia
    • [Event Gateway](/blog/tag/event-gateway)Event Gateway
    • [View All Blogs](/blog/page/1)View All Blogs
We're Entering the Age of AI Connectivity [Read more](/blog/news/the-age-of-ai-connectivity)Read moreProducts & Agents:
    • [Kong AI Gateway](/products/kong-ai-gateway)Kong AI Gateway
    • [Kong API Gateway](/products/kong-gateway)Kong API Gateway
    • [Kong Event Gateway](/products/event-gateway)Kong Event Gateway
    • [Kong Metering & Billing](/products/usage-based-metering-and-billing)Kong Metering & Billing
    • [Kong Insomnia](/products/kong-insomnia)Kong Insomnia
    • [Kong Konnect](/products/kong-konnect)Kong Konnect
  • [Documentation](https://developer.konghq.com)Documentation
  • [Book Demo](/contact-sales)Book Demo
  1. Home
  2. Blog
  3. Engineering
  4. How to Implement Secure Access Control with OPA and Kong
[Engineering](/blog/engineering)Engineering
January 8, 2025
6 min read

# How to Implement Secure Access Control with OPA and Kong

Raja Ravi Varman
Kong Champion

Ensuring secure access to applications and APIs is critical. As organizations increasingly adopt microservices architectures and cloud native solutions, the need for robust, fine-grained access control mechanisms becomes paramount. This is where the combination of Open Policy Agent (OPA) and Kong Gateway shines.

Open Policy Agent allows organizations to define and enforce policies across their systems in a declarative manner. By utilizing OPA, teams can create context-aware access control policies that adapt to various factors, such as user attributes, roles, and even the time of day. On the other hand, Kong Gateway serves as a versatile API gateway that not only manages traffic but also enhances security through its extensive plugin ecosystem.

By integrating OPA with Kong Gateway, organizations can achieve a centralized and scalable approach to access management. This integration empowers teams to implement dynamic policies that govern who can access specific resources, ensuring that only authorized users gain entry based on defined criteria.

In this post, we'll explore how to effectively implement secure access control using OPA and Kong, providing you with the knowledge to enhance your application security posture.

## Understanding OPA and Kong Gateway

### Overview of Open Policy Agent (OPA)

Open Policy Agent (OPA) is an open-source, general-purpose policy engine that allows organizations to define and enforce policies across a range of environments, including microservices, Kubernetes, and cloud native applications. OPA decouples policy decision-making from application logic, enabling teams to manage policies independently from the services they govern. This separation enhances flexibility and maintainability, making it easier to implement complex access control mechanisms without embedding policy logic directly into application code.

At the heart of OPA is *Rego*, a purpose-built declarative language designed for policy definition. Rego allows users to write policies that can evaluate structured data formats like JSON and YAML. By using Rego, organizations can create context-aware access control policies that adapt based on various attributes such as user roles or request parameters.

**Key features of OPA**

  • - **Decoupling policy from code**: This allows for independent updates and management of policies, improving collaboration between development and operations teams.
  • - **Centralized policy management**: OPA serves as a single source of truth for policies, ensuring consistency across different services and environments.
  • - **Flexibility and scalability**: OPA can be deployed in diverse environments, supporting scalable architectures.

#### Overview of Kong Gateway

Kong Gateway helps organizations manage traffic to their APIs while enhancing security through various plugins. It acts as an intermediary between clients and services, providing features such as load balancing, rate limiting, authentication, and more. One of Kong’s standout capabilities is its extensibility through plugins that can be easily integrated into API workflows.

When combined with OPA, Kong can offload policy decisions from backend services. This integration allows organizations to implement consistent and fine-grained access control policies across their APIs. By delegating authorization decisions to OPA, Kong ensures that access is granted or denied based on the rules defined in Rego, thereby enhancing security while simplifying policy management.

**Key Features of Kong**

  • - **API management**: Kong provides tools for monitoring API performance, managing traffic, and securing endpoints.
  • - **Plugin ecosystem**: With a wide array of plugins available, Kong can be customized to meet specific security and operational needs.
  • - **Seamless integration with OPA**: This integration allows for dynamic policy enforcement that adapts to various user attributes and contextual factors.

### Benefits of integrating OPA with Kong

Integrating Open Policy Agent (OPA) with Kong Gateway provides a multitude of benefits that enhance API management and security. This combination allows organizations to implement fine-grained access control policies that are both flexible and scalable, addressing the complexities of modern application architectures.

#### Fine-grained access control

One of the primary advantages of using OPA with Kong Gateway is the ability to enforce fine-grained access control. OPA enables organizations to define policies that consider various attributes, such as user roles, request parameters, and contextual information. This level of detail ensures that access decisions are made based on specific criteria, allowing for more precise control over who can access particular resources. For example, a policy can be crafted to allow only users with a specific role to access sensitive endpoints, significantly reducing the risk of unauthorized access.

#### Scalability for distributed systems

As applications evolve into microservices architectures, scalability becomes a critical concern. The integration of OPA with Kong supports this scalability by offloading policy decisions from individual services to the API gateway level. This approach minimizes the need for each service to implement its own access control logic, streamlining policy management across a distributed system. By centralizing these decisions in Kong, organizations can efficiently manage policies without sacrificing performance or reliability.

#### Declarative policy language (Rego)

OPA uses declarative policy language Rego, which simplifies the process of defining and managing policies. With Rego, policy developers can express complex rules in a clear and concise manner. This language allows for easy updates and modifications to policies as business requirements change, enabling organizations to adapt quickly to new security needs or compliance regulations. The declarative nature of Rego also enhances readability and maintainability, making it easier for teams to collaborate on policy development.

#### Consistency across various layers

Integrating OPA with Kong ensures consistency across different layers of an application, including APIs, Kubernetes clusters, and databases. By centralizing policy enforcement at the gateway level, organizations can maintain a single source of truth for authorization policies. This consistency reduces the risk of misconfigurations and ensures that all services adhere to the same security standards, simplifying compliance efforts and audits.

#### Enhanced security posture

The combination of OPA and Kong significantly enhances an organization’s security posture. By leveraging OPA’s capabilities for dynamic policy evaluation alongside Kong’s robust API management features, organizations can implement comprehensive security measures that protect against unauthorized access while ensuring compliance with regulatory standards such as GDPR or HIPAA. This layered approach to security not only safeguards sensitive data but also fosters trust among users and stakeholders.

#### Streamlined development processes

Integrating OPA with Kong allows for a separation of concerns between policy development and service implementation. Policy developers can focus on crafting and refining access control rules without needing deep knowledge of the underlying services. This separation streamlines development processes, enabling faster iterations and updates to policies as requirements evolve. Moreover, utilizing CI/CD pipelines for policy deployment automates testing and validation processes, ensuring that changes are implemented smoothly and efficiently.

By harnessing the power of OPA in conjunction with Kong Gateway, organizations can achieve a robust framework for managing access control that meets the demands of modern application environments while enhancing overall security and operational efficiency.

### Implementation steps for integrating OPA with Kong

Integrating Open Policy Agent (OPA) with Kong Gateway involves a few key steps to ensure that access control policies are effectively enforced. Below is a guide to help you set up this integration.

#### Step 1: Set up your environment

Before you begin, ensure that you have both Kong and OPA installed and running in your environment. You can deploy OPA as a standalone service or as a sidecar container alongside your services. If using Docker, you can start OPA with the following command:

docker run -d --name opa \
 -p 8181:8181 \
 openpolicyagent/opa run --server

#### Step 2: Configure Kong Gateway

**Create a Service and Route in Kong:** First, you need to define a service and route in Kong that will handle incoming requests. You can do this through the Kong Admin API.

curl -i -X POST http://localhost:8001/services \
--data "name=my-service" \
--data "url=http://my-backend-service"

curl -i -X POST http://localhost:8001/routes \
--data "paths[]=/" \
--data "service.id=<service_id>"

**Add the OPA Plugin to Your Route: **Once your service and route are set up, you need to enable the OPA plugin on the desired route. This will allow Kong to delegate authorization decisions to OPA.

curl -X POST http://localhost:8001/routes/<route_id>/plugins \
--data "name=opa" \
--data "config.opa_path=/v1/data/example/allowBoolean" \
--data "config.opa_host=localhost" \
--data "config.opa_port=8181"

#### Step 3: Define your policies in Rego

Now that OPA is integrated with Kong, you need to define your access control policies using Rego. Create a policy file (e.g., `auth.rego`) that specifies the rules for access control.

package example

default allow = false

allow {
   input.method == "GET"
   input.path = ["demo"]
   input.user.role == "Moderator"
}

Upload this policy to OPA using the following command:

curl -X PUT http://localhost:8181/v1/policies/auth \
-H "Content-Type: application/json" \
--data-binary @auth.rego

#### Step 4: Test your configuration

With everything set up, it’s time to test whether your integration works as expected.

**Make an Authorized Request**: Send a request that should be allowed based on your policy:

curl -X GET http://localhost:8000/demo \
-H 'Authorization: Bearer <your_token>' \
-H 'X-User-Role: Moderator'

**Make an Unauthorized Request:** Now test an unauthorized request.

curl -X GET http://localhost:8000/demo \
-H 'Authorization: Bearer <your_token>' \
-H 'X-User-Role: User'

In the first case, you should receive a successful response from your backend service, while in the second case, you should receive a `403 Forbidden` response from Kong, indicating that access was denied by OPA.

#### Step 5: Monitor and adjust policies

As your application evolves, you may need to adjust your policies based on new requirements or changes in user roles. You can update the Rego policies directly in OPA and test them as needed. Additionally, monitor logs from both Kong and OPA to ensure that requests are being processed correctly and that policies are being enforced as expected.

### Conclusion

By following these steps, you can successfully integrate Open Policy Agent with Kong Gateway, enabling fine-grained access control for your APIs while maintaining a scalable and manageable architecture.

- [API Security](/blog/tag/api-security)API Security- [Open Source](/blog/tag/open-source)Open Source- [API Authorization](/blog/tag/api-authorization)API Authorization- [API Authentication](/blog/tag/api-authentication)API Authentication

## More on this topic

_Videos_

## Federated Data Authorization using Semantic Policies

_Videos_

## Okta and Kong: Integrate Identity into your APIs

## See Kong in action

Accelerate deployments, reduce vulnerabilities, and gain real-time visibility. 

[Get a Demo](/contact-sales)Get a Demo
**Topics**
- [API Security](/blog/tag/api-security)API Security- [Open Source](/blog/tag/open-source)Open Source- [API Authorization](/blog/tag/api-authorization)API Authorization- [API Authentication](/blog/tag/api-authentication)API Authentication
Raja Ravi Varman
Kong Champion

Recommended posts

# Adopt a Zero Trust Approach with OAuth 2.0 Mutual TLS Client Authentication

[Engineering](/blog)EngineeringFebruary 19, 2024

In the modern IT stack, API gateways act as the first line of defense against attacks on backend services by enforcing authentication/authorization policies and validating and transforming requests. When backend services are protected with a token-b

Samuele Illuminati
[](https://konghq.com/blog/engineering/zero-trust-oauth-2-0-mtls-client-authentication)

# Understanding Microsegmentation in Zero Trust Security

[Engineering](/blog)EngineeringFebruary 6, 2024

With digital transformation shifting networks into the cloud — from remote workforces to online banking — cyberattacks are growing more prevalent and sophisticated. Legacy security models like VPNs and perimeter-based firewalls are proving inadequat

Kong
[](https://konghq.com/blog/engineering/microsegmentation-and-zero-trust-security)

# Top GraphQL Security Vulnerabilities: Lessons Learned Analyzing 1,500+ Endpoints

[Engineering](/blog)EngineeringJanuary 29, 2024

With its flexible querying capabilities,  GraphQL  makes it easy to combine data from multiple sources into a single endpoint.  GraphQL and API management  go hand in hand to build next-generation API platforms.  However, GraphQL's features can als

Kong
[](https://konghq.com/blog/engineering/graphql-security-vulnerabilities)

# Token-Based Access Control With Kong, OPA and Curity

[Engineering](/blog)EngineeringOctober 6, 2021

As APIs and microservices evolve, the architecture used to secure these resources must also mature. Utilizing a token-based architecture to protect APIs is a robust, secure and scalable approach, and it is also much safer than API keys or basic au

Jonas Iggbom
[](https://konghq.com/blog/engineering/token-based-access-control)

# Solving API Authorization Challenges in Multi-Cloud Environments

[Engineering](/blog)EngineeringSeptember 9, 2021

As more and more companies move to a multi-cloud strategy and increase usage of a cloud native infrastructure , API providers are under a lot of pressure to deliver APIs at scale in multi-cloud environments. At the same time, APIs should follow eac

Nima Moghadam
[](https://konghq.com/blog/engineering/api-authorization)

# Setting Access Control Policies With Kong and Okta

[Engineering](/blog)EngineeringJune 24, 2021

In our last Kong and Okta tutorial, we will implement a basic access control policy based on Okta’s groups and planes. This series will show you how to implement service authentication and authorization for Kong Konnect and Okta using the OpenI

Claudio Acquaviva
[](https://konghq.com/blog/engineering/access-control-policies)

# Protect Your Services With Kong Gateway Key Authentication

[Engineering](/blog)EngineeringMay 25, 2021

This tutorial will walk through a common use case for the Kong Gateway Key Authentication plugin : using API key authentication to protect a route to an API server endpoint. It’s a simple use case, but it will give you the foundation to deploy and

Aapo Talvensaari
[](https://konghq.com/blog/engineering/kong-gateway-key-authentication)

## Ready to see Kong in action?

Get a personalized walkthrough of Kong's platform tailored to your architecture, use cases, and scale requirements.

[Get a Demo](/contact-sales)Get a Demo

## step-0

  • ## Company

    • [About Kong](/company/about-us)About Kong
    • [Customers](/customer-stories)Customers
    • [Careers](/company/careers)Careers
    • [Press](/company/press-room)Press
    • [Events](/events)Events
    • [Contact](/company/contact-us)Contact
    • [Pricing](/pricing)Pricing
      • Terms
      • Privacy
      • Trust and Compliance
  • ## Platform

    • [Kong AI Gateway](/products/kong-ai-gateway)Kong AI Gateway
    • [Kong Konnect](/products/kong-konnect)Kong Konnect
    • [Kong Gateway](/products/kong-gateway)Kong Gateway
    • [Kong Event Gateway](/products/event-gateway)Kong Event Gateway
    • [Kong Insomnia](/products/kong-insomnia)Kong Insomnia
    • [Documentation](https://developer.konghq.com)Documentation
    • [Book Demo](/contact-sales)Book Demo
  • ## Compare

    • [AI Gateway Alternatives](/performance-comparison/ai-gateway-alternatives)AI Gateway Alternatives
    • [Kong vs Apigee](/performance-comparison/kong-vs-apigee)Kong vs Apigee
    • [Kong vs IBM](/performance-comparison/ibm-api-connect-vs-kong)Kong vs IBM
    • [Kong vs Postman](/performance-comparison/kong-vs-postman)Kong vs Postman
    • [Kong vs Mulesoft](/performance-comparison/kong-vs-mulesoft)Kong vs Mulesoft
  • ## Explore More

    • [Open Banking API Solutions](/solutions/open-banking)Open Banking API Solutions
    • [API Governance Solutions](/solutions/api-governance)API Governance Solutions
    • [Istio API Gateway Integration](/solutions/istio-gateway)Istio API Gateway Integration
    • [Kubernetes API Management](/solutions/build-on-kubernetes)Kubernetes API Management
    • [API Gateway: Build vs Buy](/campaign/secure-api-scalability)API Gateway: Build vs Buy
    • [Kong vs Apigee](/performance-comparison/kong-vs-apigee)Kong vs Apigee
  • ## Open Source

    • [Kong Gateway](https://developer.konghq.com/gateway/install/)Kong Gateway
    • [Kuma](https://kuma.io/)Kuma
    • [Insomnia](https://insomnia.rest/)Insomnia
    • [Kong Community](/community)Kong Community

Kong enables the connectivity layer for the agentic era – securely connecting, governing, and monetizing APIs and AI tokens across any model or cloud.

  • English
  • Japanese
  • Frenchcoming soon
  • Spanishcoming soon
  • Germancoming soon
© Kong Inc. 2026
Interaction mode