REGISTER NOW FOR THE KONG AGENTIC ERA WORLD TOUR GOVERN A2A TRAFFIC WITH KONG'S NEW AGENT GATEWAY WHY GARTNER’S “CONTEXT MESH” CHANGES EVERYTHING DON’T MISS API + AI SUMMIT 2026 SEPT 30 – OCT 1
  • [Why Kong](/company/why-kong)Why Kong
    • Explore the unified API Platform
        • BUILD APIs
        • [
          Kong Insomnia](/products/kong-insomnia)
          Kong Insomnia
        • [
          API Design](/products/kong-insomnia/api-design)
          API Design
        • [
          API Mocking](/products/kong-insomnia/api-mocking)
          API Mocking
        • [
          API Testing and Debugging](/products/kong-insomnia/api-testing-and-debugging)
          API Testing and Debugging
        • [
          MCP Client](/products/kong-insomnia/mcp-client)
          MCP Client
        • RUN APIs
        • [
          API Gateway](/products/kong-gateway)
          API Gateway
        • [
          Context Mesh](/products/kong-konnect/features/context-mesh)
          Context Mesh
        • [
          AI Gateway](/products/kong-ai-gateway)
          AI Gateway
        • [
          Event Gateway](/products/event-gateway)
          Event Gateway
        • [
          Kubernetes Operator](/products/kong-gateway-operator)
          Kubernetes Operator
        • [
          Service Mesh](/products/kong-mesh)
          Service Mesh
        • [
          Ingress Controller](/products/kong-ingress-controller)
          Ingress Controller
        • [
          Runtime Management](/products/kong-konnect/features/runtime-management)
          Runtime Management
        • DISCOVER APIs
        • [
          Developer Portal](/products/kong-konnect/features/developer-portal)
          Developer Portal
        • [
          Service Catalog](/products/kong-konnect/features/api-service-catalog)
          Service Catalog
        • [
          MCP Registry](/products/mcp-registry)
          MCP Registry
        • GOVERN APIs
        • [
          Metering and Billing](/products/kong-konnect/features/usage-based-metering-and-billing)
          Metering and Billing
        • [
          APIOps and Automation](/products/apiops-automation)
          APIOps and Automation
        • [
          API Observability](/products/kong-konnect/features/api-observability)
          API Observability
        • [Why Kong?](/company/why-kong)Why Kong?
      • CLOUD
      • [Cloud API Gateways](/products/kong-konnect/features/dedicated-cloud-gateways)Cloud API Gateways
      • [Need a self-hosted or hybrid option?](/products/kong-enterprise)Need a self-hosted or hybrid option?
      • COMPARE
      • [Considering AI Gateway alternatives? ](/performance-comparison/ai-gateway-alternatives)Considering AI Gateway alternatives?
      • [Kong vs. Postman](/performance-comparison/kong-vs-postman)Kong vs. Postman
      • [Kong vs. MuleSoft](/performance-comparison/kong-vs-mulesoft)Kong vs. MuleSoft
      • [Kong vs. Apigee](/performance-comparison/kong-vs-apigee)Kong vs. Apigee
      • [Kong vs. IBM](/performance-comparison/ibm-api-connect-vs-kong)Kong vs. IBM
      • GET STARTED
      • [Sign Up for Kong Konnect](/products/kong-konnect/register)Sign Up for Kong Konnect
      • [Documentation](https://developer.konghq.com/)Documentation
      • FOR PLATFORM TEAMS
      • [Developer Platform](/solutions/building-developer-platform)Developer Platform
      • [Kubernetes and Microservices](/solutions/build-on-kubernetes)Kubernetes and Microservices
      • [Observability](/solutions/observability)Observability
      • [Service Mesh Connectivity ](/solutions/service-mesh-connectivity)Service Mesh Connectivity
      • [Kafka Event Streaming](/solutions/kafka-stream-api-management)Kafka Event Streaming
      • FOR EXECUTIVES
      • [AI Connectivity](/ai-connectivity)AI Connectivity
      • [Open Banking](/solutions/open-banking)Open Banking
      • [Legacy Migration](/solutions/legacy-api-management-migration)Legacy Migration
      • [Platform Cost Reduction](/solutions/api-platform-consolidation)Platform Cost Reduction
      • [Kafka Cost Optimization](/solutions/reduce-kafka-cost)Kafka Cost Optimization
      • [API Monetization](/solutions/api-monetization)API Monetization
      • [AI Monetization](/solutions/ai-monetization)AI Monetization
      • [AI FinOps](/solutions/ai-cost-governance-finops)AI FinOps
      • FOR AI TEAMS
      • [Agent Gateway](/agent-gateway)Agent Gateway
      • [AI Governance](/solutions/ai-governance)AI Governance
      • [AI Security](/solutions/ai-security)AI Security
      • [AI Cost Control](/solutions/ai-cost-optimization-management)AI Cost Control
      • [Agentic Infrastructure](/solutions/agentic-ai-workflows)Agentic Infrastructure
      • [MCP Production](/solutions/mcp-production-and-consumption)MCP Production
      • [MCP Traffic Gateway](/solutions/mcp-governance)MCP Traffic Gateway
      • FOR DEVELOPERS
      • [Mobile App API Development](/solutions/mobile-application-api-development)Mobile App API Development
      • [GenAI App Development](/solutions/power-openai-applications)GenAI App Development
      • [API Gateway for Istio](/solutions/istio-gateway)API Gateway for Istio
      • [Decentralized Load Balancing](/solutions/decentralized-load-balancing)Decentralized Load Balancing
      • BY INDUSTRY
      • [Financial Services](/solutions/financial-services-industry)Financial Services
      • [Healthcare](/solutions/healthcare)Healthcare
      • [Higher Education](/solutions/api-platform-for-education-services)Higher Education
      • [Insurance](/solutions/insurance)Insurance
      • [Manufacturing](/solutions/manufacturing)Manufacturing
      • [Retail](/solutions/retail)Retail
      • [Software & Technology](/solutions/software-and-technology)Software & Technology
      • [Transportation](/solutions/transportation-and-logistics)Transportation
      • [See all Solutions](/solutions)See all Solutions
  • [Pricing](/pricing)Pricing
      • DOCUMENTATION
      • [Kong Konnect](https://developer.konghq.com/konnect/)Kong Konnect
      • [Kong Gateway](https://developer.konghq.com/gateway/)Kong Gateway
      • [Kong Mesh](https://developer.konghq.com/mesh/)Kong Mesh
      • [Kong AI Gateway](https://developer.konghq.com/ai-gateway/)Kong AI Gateway
      • [Kong Event Gateway](https://developer.konghq.com/event-gateway/)Kong Event Gateway
      • [Kong Insomnia](https://developer.konghq.com/insomnia/)Kong Insomnia
      • [Plugin Hub](https://developer.konghq.com/plugins/)Plugin Hub
      • EXPLORE
      • [Blog](/blog)Blog
      • [Learning Center](/blog/learning-center)Learning Center
      • [eBooks](/resources/e-book)eBooks
      • [Reports](/resources/reports)Reports
      • [Demos](/resources/demos)Demos
      • [Customer Stories](/customer-stories)Customer Stories
      • [Videos](/resources/videos)Videos
      • EVENTS
      • [API + AI Summit](/events/conferences/api-ai-summit)API + AI Summit
      • [Agentic Era World Tour](/agentic-era-world-tour)Agentic Era World Tour
      • [Webinars](/events/webinars)Webinars
      • [User Calls](/events/user-calls)User Calls
      • [Workshops](/events/workshops)Workshops
      • [Meetups](/events/meetups)Meetups
      • [See All Events](/events)See All Events
      • FOR DEVELOPERS
      • [Get Started](https://developer.konghq.com/)Get Started
      • [Community](/community)Community
      • [Certification](/academy/certification)Certification
      • [Training](https://education.konghq.com)Training
      • COMPANY
      • [About Us](/company/about-us)About Us
      • [We're Hiring!](/company/careers)We're Hiring!
      • [Press Room](/company/press-room)Press Room
      • [Contact Us](/company/contact-us)Contact Us
      • [Kong Partner Program](/partners)Kong Partner Program
      • [Enterprise Support Portal](https://support.konghq.com/s/)Enterprise Support Portal
      • [Documentation](https://developer.konghq.com/?_gl=1*tphanb*_gcl_au*MTcxNTQ5NjQ0MC4xNzY5Nzg4MDY0LjIwMTI3NzEwOTEuMTc3MzMxODI2MS4xNzczMzE4MjYw*_ga*NDIwMDU4MTU3LjE3Njk3ODgwNjQ.*_ga_4JK9146J1H*czE3NzQwMjg1MjkkbzE4OSRnMCR0MTc3NDAyODUyOSRqNjAkbDAkaDA)Documentation
  • [](/search)
  • [Login](https://cloud.konghq.com/login)Login
  • [Book Demo](/contact-sales)Book Demo
  • [Get Started](/products/kong-konnect/register)Get Started
[Blog](/blog)Blog
  • [AI Gateway](/blog/tag/ai-gateway)AI Gateway
  • [AI Security](/blog/tag/ai-security)AI Security
  • [AIOps](/blog/tag/aiops)AIOps
  • [API Security](/blog/tag/api-security)API Security
  • [API Gateway](/blog/tag/api-gateway)API Gateway
|
    • [API Management](/blog/tag/api-management)API Management
    • [API Development](/blog/tag/api-development)API Development
    • [API Design](/blog/tag/api-design)API Design
    • [Automation](/blog/tag/automation)Automation
    • [Service Mesh](/blog/tag/service-mesh)Service Mesh
    • [Insomnia](/blog/tag/insomnia)Insomnia
    • [Event Gateway](/blog/tag/event-gateway)Event Gateway
    • [View All Blogs](/blog/page/1)View All Blogs
We're Entering the Age of AI Connectivity [Read more](/blog/news/the-age-of-ai-connectivity)Read moreProducts & Agents:
    • [Kong AI Gateway](/products/kong-ai-gateway)Kong AI Gateway
    • [Kong API Gateway](/products/kong-gateway)Kong API Gateway
    • [Kong Event Gateway](/products/event-gateway)Kong Event Gateway
    • [Kong Metering & Billing](/products/usage-based-metering-and-billing)Kong Metering & Billing
    • [Kong Insomnia](/products/kong-insomnia)Kong Insomnia
    • [Kong Konnect](/products/kong-konnect)Kong Konnect
  • [Documentation](https://developer.konghq.com)Documentation
  • [Book Demo](/contact-sales)Book Demo
  1. Home
  2. Blog
  3. Engineering
  4. Token-Based Access Control With Kong, OPA and Curity
[Engineering](/blog/engineering)Engineering
October 6, 2021
5 min read

# Token-Based Access Control With Kong, OPA and Curity

Jonas Iggbom

As APIs and [microservices](https://konghq.com/blog/learning-center/what-are-microservices)microservices evolve, the architecture used to secure these resources must also mature. Utilizing a token-based architecture to protect APIs is a robust, secure and scalable approach, and it is also much safer than API keys or basic authentication. However, token-based architecture comes in varying maturity levels, as outlined by [the API Security Maturity Model](https://curity.io/resources/learn/the-api-security-maturity-model)the API Security Maturity Model.

In this article, we'll implement [the Phantom Token Approach](https://curity.io/resources/learn/phantom-token-pattern)the Phantom Token Approach to achieve Level 3 of the API Security Maturity Model; Centralized Trust Using Claims. This approach externally uses opaque (reference) access tokens, exchanging them for a signed JSON Web Token (JWT) with scopes and claims in [Kong Gateway](https://konghq.com/kong)Kong Gateway. The system then passes that information onward to the upstream API.

## Token Introspection

[Introspection](https://datatracker.ietf.org/doc/html/rfc7662)Introspection is a way for a service to determine the state of a token and retrieve additional metadata about an active token.

When Kong Gateway is involved in the architecture, it typically performs the introspection. Kong Gateway receives an access token from a client requesting access to an API.

In an ideal scenario, we would use an opaque token if it's coming from a public client. An opaque token is not required, but we strongly recommend not using JWTs as public tokens, as they are much more likely to contain Personal Identifiable Information (PII).

Even if JWTs don't contain PII, developers will likely come to rely on the information within JWTs, and their applications will be at risk of breakage if the information issued in the JWT changes. Thus, it's a much better practice to issue opaque tokens to public clients.

## The Phantom Token Approach

When implementing the Phantom Token Approach, Kong Gateway will receive an opaque token and perform introspection. In the [introspection process](https://curity.io/resources/learn/introspect-with-phantom-token)introspection process, Kong Gateway can send the application/JWT accept header. This header will make the introspection response from the Curity Identity Server be in the format of a JWT instead of the token data. This setting will allow Kong Gateway to perform a coarse-grained authorization by checking the JWT for scopes based on the configuration. If the required scopes are available, Kong Gateway will add the JWT to the Authorization header and forward the call to the upstream API. Then, the upstream API can consume the JWT as needed.

This approach allows for a more secure approach where an opaque token that does not contain any PII information to be issued to the client. When the client requests information from an API that potentially needs additional data, Kong Gateway can use the opaque token received and in turn, obtain a JWT that it can forward to the upstream API. The API will very likely need that additional information within the JWT to determine what data to return.

Curity has developed a specific plugin to handle introspection, especially related to the Phantom Token Approach. The Kong plugin is publicly available in the [kong-phantom-token-plugin](https://github.com/curityio/kong-phantom-token-plugin)kong-phantom-token-plugin GitHub repository. This article describes how to set up an [Integration with Kong Open Source](https://curity.io/resources/learn/integration-kong-open-source)Integration with Kong Open Source and the configurations needed.

As mentioned earlier, this approach can also handle coarse-grained authorization using the JWT scope claim. This will allow Kong Gateway to quickly reject the call to the API if the correct scopes are not present in the token and prevent the call to the API.

## Additional Authorization

Coarse-grained access control would probably be sufficient in many scenarios. Still, there will certainly be use cases where we need to consider additional parameters for authorizing access to data. These are scenarios where we can leverage Open Policy Agent ([OPA](https://www.openpolicyagent.org)OPA) to implement a fine-grained access control policy.

Instead of calling the API, we can chain the Phantom Token Plugin to pass the JWT to the [OPA Plugin](https://github.com/open-policy-agent/contrib/tree/main/kong_api_authz)OPA Plugin. The OPA Plugin is responsible for making a callout to an instance of OPA that holds an access policy.

One example could be checking that the requesting user is the owner of the record requested. Or a separation of duty scenario where a user cannot approve a transaction that they also created. OPA with the [Rego](https://www.openpolicyagent.org/docs/latest/#rego)Rego policy language is extremely powerful and can handle very complex policy expressions.

If the evaluation of the policy is successful, the flow will continue. Just like before, we added the JWT to the authorization header, which called the API.

This flow and its configuration are outlined in our [API Authorization using Open Policy Agent and Kong](https://curity.io/resources/learn/curity-opa-kong-api)API Authorization using Open Policy Agent and Kong article. It includes a dockerized example environment using open source or community edition software.

## Architecture Overview

curity kong opa architecture

  1. - Obtain an access token from the Curity Identity Server.
  2. - The access token passes to the API endpoint exposed by Kong Gateway.
  3. - Kong Gateway receives the access token.
    • - It calls the introspection endpoint.
    • - The Curity Identity Server issues a JWT.
  4. - The Phantom Token Plugin performs a coarse-grained authorization check using the scopes received in the JWT.
    • - If the coarse-grained check is approved, the OPA plugin calls an instance of OPA.
    • - The decision is returned to Kong Gateway.
  5. - If authorization is allowed, Kong Gateway calls the upstream API.

## Try It Out

Kong Gateway and OPA are both open source software and readily available. Curity provides a [Community Edition](https://curity.io/product/community)Community Edition of the Curity Identity Server that is free for anyone to use.

Check out the articles mentioned above to get an environment running. Obtain an access token from the Curity Identity Server and use a tool like [Insomnia](https://insomnia.rest)Insomnia or [OAuth Tools](https://oauth.tools)OAuth Tools to make a request to the service exposed by Kong Gateway ([httpbin.org](http://httpbin.org)httpbin.org in the below example).

GET /httpbin/get HTTP/1.1

Host: localhost:8000

Accept: application/json

Authorization: Bearer 12033b19-23bf-4e8c-8257-324358872f82

Suppose the Phantom Token Plugin authorizes the call after checking that the JWT received contains the configured scopes. In that case, the system adds JWT to the authorization header and forwards the call to the API.

[httpbin.org](http://httpbin.org)httpbin.org is an HTTP request and response test service that can simply echo back what it received in the request. The below sample response shows that the authorization header received is a JWT and not the opaque token that was sent in the original request to Kong Gateway.

{
    "args": {},
    "headers": {
        "Accept": "application/json",
        "Authorization": "Bearer eyJraWQiOiIxMjM0NDI1OTgxIiwieDV0IjoiT3JWU3ZmWmVZTmVVV3dXUEViWWNWSjY1WFgwIiwiYWxnIjoiUlMyNTYifQ.eyJqdGkiOiJmZWU4OTk2MC01Y2JjLTRhMDgtYjUzMC00ZDVmNTczOTNiZDIiLCJkZWxlZ2F0aW9uSWQiOiI1ZWM4Njg1ZC1iZGRmLTQyMjEtYjIwYi00MWZkMGVlYzRiYTQiLCJleHAiOjE2MjcwNzI2OTcsIm5iZiI6MTYyNzA3MjM5Nywic2NvcGUiOiJvcGVuaWQiLCJpc3MiOiJodHRwczovL2U4MGNjMmNhZjEyYjo4NDQzL29hdXRoL3YyL29hdXRoLWFub255bW91cyIsInN1YiI6ImFsaWNlIiwiYXVkIjoid3d3IiwiaWF0IjoxNjI3MDcyMzk3LCJwdXJwb3NlIjoiYWNjZXNzX3Rva2VuIn0.iC-Ze_OHPRFsmB0zydTVydQ0tVa3MIVaCnjYtuATxBepgqrbUEQGBLpGG1FLomO_MsOQLHa605CMYw-43ZoI7LM6iloyzZbYiCqzzjTmW_KWXN4IDpgDOW6F-i2-JR4lxWXNCCwYqY3pYQDu5VpyqjWDGH2GDeffavfYn_SS95RSafUVE6binZPI7_01722duM4Nzu0HOSKADWkjgdEXH-hT5dBx9HaHQjmUyJpbE50lXEzWOxWLdrvqqwXhCNNy5xIUUtFcbqH-9VzZC760iL_zgX_wVuHs1f5ZcJ6OZzQvHAoxMWeXTtOHr_4KZ257UFnT6bfUs0QnISYLWi64Qg",
        "Host": "httpbin.org",
        "User-Agent": "axios/0.21.1",
        "X-Amzn-Trace-Id": "Root=1-60fb286e-39eb482b02ba4cf518f37b95",
        "X-Forwarded-Host": "localhost",
        "X-Forwarded-Path": "/httpbin/get",
        "X-Forwarded-Prefix": "/httpbin"
    },
    "origin": "122.20.0.1, 72.212.109.32",
    "url": "https://konghq.com/get"
}

## Conclusion

Issuing JWTs for public clients is a bad practice, and doing so could leak PII or cause instability if the structure of the JWT changes. It is better to issue opaque (by reference) tokens and have Kong Gateway introspect the opaque token and exchange it for a JWT that you can use internally (i.e., passed to the upstream API).

Or, for a more fine-grained access control approach, include OPA to evaluate an access control policy to determine if access should be allowed or not.

Here are some additional articles that cover these topics and other integration approaches for the Curity Identity Server, Kong Gateway and OPA:

  • - [Kong Gateway | Guides | Curity](https://curity.io/resources/guides/apigateway/kong)Kong Gateway | Guides | Curity
  • - [The API Security Maturity Model | Curity](https://curity.io/resources/learn/the-api-security-maturity-model)The API Security Maturity Model | Curity
  • - [The Phantom Token Approach | Curity](https://curity.io/resources/learn/phantom-token-pattern)The Phantom Token Approach | Curity
  • - [Integrating with Kong Open Source | Curity](https://curity.io/resources/learn/integration-kong-open-source)Integrating with Kong Open Source | Curity
  • - [Integrating with Kong Enterprise | Curity](https://curity.io/resources/learn/integration-kong)Integrating with Kong Enterprise | Curity
  • - [API Authorization using Open Policy Agent and Kong | Curity](https://curity.io/resources/learn/curity-opa-kong-api)API Authorization using Open Policy Agent and Kong | Curity
  • - [Setting up OpenID Connect Authentication in the Kong Developer Portal | Curity](https://curity.io/resources/learn/kong-dev-portal)Setting up OpenID Connect Authentication in the Kong Developer Portal | Curity
  • - [Kong OpenID Connect Plugin](https://docs.konghq.com/hub/kong-inc/openid-connect)Kong OpenID Connect Plugin
  • - [OAuth 2.0 Token Introspection – rfc7662](https://datatracker.ietf.org/doc/html/rfc7662)OAuth 2.0 Token Introspection – rfc7662

- [API Security](/blog/tag/api-security)API Security- [API Authentication](/blog/tag/api-authentication)API Authentication- [API Authorization](/blog/tag/api-authorization)API Authorization

## More on this topic

_Videos_

## Federated Data Authorization using Semantic Policies

_Videos_

## Okta and Kong: Integrate Identity into your APIs

## See Kong in action

Accelerate deployments, reduce vulnerabilities, and gain real-time visibility. 

[Get a Demo](/contact-sales)Get a Demo
**Topics**
- [API Security](/blog/tag/api-security)API Security- [API Authentication](/blog/tag/api-authentication)API Authentication- [API Authorization](/blog/tag/api-authorization)API Authorization
Jonas Iggbom

Recommended posts

# How to Implement Secure Access Control with OPA and Kong Gateway

[Engineering](/blog)EngineeringJanuary 8, 2025

Ensuring secure access to applications and APIs is critical. As organizations increasingly adopt microservices architectures and cloud native solutions, the need for robust, fine-grained access control mechanisms becomes paramount. This is where the

Raja Ravi Varman
[](https://konghq.com/blog/engineering/secure-access-control-with-opa-and-kong)

# Adopt a Zero Trust Approach with OAuth 2.0 Mutual TLS Client Authentication

[Engineering](/blog)EngineeringFebruary 19, 2024

In the modern IT stack, API gateways act as the first line of defense against attacks on backend services by enforcing authentication/authorization policies and validating and transforming requests. When backend services are protected with a token-b

Samuele Illuminati
[](https://konghq.com/blog/engineering/zero-trust-oauth-2-0-mtls-client-authentication)

# Understanding Microsegmentation in Zero Trust Security

[Engineering](/blog)EngineeringFebruary 6, 2024

With digital transformation shifting networks into the cloud — from remote workforces to online banking — cyberattacks are growing more prevalent and sophisticated. Legacy security models like VPNs and perimeter-based firewalls are proving inadequat

Kong
[](https://konghq.com/blog/engineering/microsegmentation-and-zero-trust-security)

# Top GraphQL Security Vulnerabilities: Lessons Learned Analyzing 1,500+ Endpoints

[Engineering](/blog)EngineeringJanuary 29, 2024

With its flexible querying capabilities,  GraphQL  makes it easy to combine data from multiple sources into a single endpoint.  GraphQL and API management  go hand in hand to build next-generation API platforms.  However, GraphQL's features can als

Kong
[](https://konghq.com/blog/engineering/graphql-security-vulnerabilities)

# Solving API Authorization Challenges in Multi-Cloud Environments

[Engineering](/blog)EngineeringSeptember 9, 2021

As more and more companies move to a multi-cloud strategy and increase usage of a cloud native infrastructure , API providers are under a lot of pressure to deliver APIs at scale in multi-cloud environments. At the same time, APIs should follow eac

Nima Moghadam
[](https://konghq.com/blog/engineering/api-authorization)

# Setting Access Control Policies With Kong and Okta

[Engineering](/blog)EngineeringJune 24, 2021

In our last Kong and Okta tutorial, we will implement a basic access control policy based on Okta’s groups and planes. This series will show you how to implement service authentication and authorization for Kong Konnect and Okta using the OpenI

Claudio Acquaviva
[](https://konghq.com/blog/engineering/access-control-policies)

# Protect Your Services With Kong Gateway Key Authentication

[Engineering](/blog)EngineeringMay 25, 2021

This tutorial will walk through a common use case for the Kong Gateway Key Authentication plugin : using API key authentication to protect a route to an API server endpoint. It’s a simple use case, but it will give you the foundation to deploy and

Aapo Talvensaari
[](https://konghq.com/blog/engineering/kong-gateway-key-authentication)

## Ready to see Kong in action?

Get a personalized walkthrough of Kong's platform tailored to your architecture, use cases, and scale requirements.

[Get a Demo](/contact-sales)Get a Demo

## step-0

  • ## Company

    • [About Kong](/company/about-us)About Kong
    • [Customers](/customer-stories)Customers
    • [Careers](/company/careers)Careers
    • [Press](/company/press-room)Press
    • [Events](/events)Events
    • [Contact](/company/contact-us)Contact
    • [Pricing](/pricing)Pricing
      • Terms
      • Privacy
      • Trust and Compliance
  • ## Platform

    • [Kong AI Gateway](/products/kong-ai-gateway)Kong AI Gateway
    • [Kong Konnect](/products/kong-konnect)Kong Konnect
    • [Kong Gateway](/products/kong-gateway)Kong Gateway
    • [Kong Event Gateway](/products/event-gateway)Kong Event Gateway
    • [Kong Insomnia](/products/kong-insomnia)Kong Insomnia
    • [Documentation](https://developer.konghq.com)Documentation
    • [Book Demo](/contact-sales)Book Demo
  • ## Compare

    • [AI Gateway Alternatives](/performance-comparison/ai-gateway-alternatives)AI Gateway Alternatives
    • [Kong vs Apigee](/performance-comparison/kong-vs-apigee)Kong vs Apigee
    • [Kong vs IBM](/performance-comparison/ibm-api-connect-vs-kong)Kong vs IBM
    • [Kong vs Postman](/performance-comparison/kong-vs-postman)Kong vs Postman
    • [Kong vs Mulesoft](/performance-comparison/kong-vs-mulesoft)Kong vs Mulesoft
  • ## Explore More

    • [Open Banking API Solutions](/solutions/open-banking)Open Banking API Solutions
    • [API Governance Solutions](/solutions/api-governance)API Governance Solutions
    • [Istio API Gateway Integration](/solutions/istio-gateway)Istio API Gateway Integration
    • [Kubernetes API Management](/solutions/build-on-kubernetes)Kubernetes API Management
    • [API Gateway: Build vs Buy](/campaign/secure-api-scalability)API Gateway: Build vs Buy
    • [Kong vs Apigee](/performance-comparison/kong-vs-apigee)Kong vs Apigee
  • ## Open Source

    • [Kong Gateway](https://developer.konghq.com/gateway/install/)Kong Gateway
    • [Kuma](https://kuma.io/)Kuma
    • [Insomnia](https://insomnia.rest/)Insomnia
    • [Kong Community](/community)Kong Community

Kong enables the connectivity layer for the agentic era – securely connecting, governing, and monetizing APIs and AI tokens across any model or cloud.

  • English
  • Japanese
  • Frenchcoming soon
  • Spanishcoming soon
  • Germancoming soon
© Kong Inc. 2026
Interaction mode