REGISTER NOW FOR THE KONG AGENTIC ERA WORLD TOUR GOVERN A2A TRAFFIC WITH KONG'S NEW AGENT GATEWAY WHY GARTNER’S “CONTEXT MESH” CHANGES EVERYTHING AI CONNECTIVITY: THE ROAD AHEAD DON’T MISS API + AI SUMMIT 2026 SEPT 30 – OCT 1
  • [Why Kong](/company/why-kong)Why Kong
    • Explore the unified API Platform
        • BUILD APIs
        • [
          Kong Insomnia](/products/kong-insomnia)
          Kong Insomnia
        • [
          API Design](/products/kong-insomnia/api-design)
          API Design
        • [
          API Mocking](/products/kong-insomnia/api-mocking)
          API Mocking
        • [
          API Testing and Debugging](/products/kong-insomnia/api-testing-and-debugging)
          API Testing and Debugging
        • [
          MCP Client](/products/kong-insomnia/mcp-client)
          MCP Client
        • RUN APIs
        • [
          API Gateway](/products/kong-gateway)
          API Gateway
        • [
          Context Mesh](/products/kong-konnect/features/context-mesh)
          Context Mesh
        • [
          AI Gateway](/products/kong-ai-gateway)
          AI Gateway
        • [
          Event Gateway](/products/event-gateway)
          Event Gateway
        • [
          Kubernetes Operator](/products/kong-gateway-operator)
          Kubernetes Operator
        • [
          Service Mesh](/products/kong-mesh)
          Service Mesh
        • [
          Ingress Controller](/products/kong-ingress-controller)
          Ingress Controller
        • [
          Runtime Management](/products/kong-konnect/features/runtime-management)
          Runtime Management
        • DISCOVER APIs
        • [
          Developer Portal](/products/kong-konnect/features/developer-portal)
          Developer Portal
        • [
          Service Catalog](/products/kong-konnect/features/api-service-catalog)
          Service Catalog
        • [
          MCP Registry](/products/mcp-registry)
          MCP Registry
        • GOVERN APIs
        • [
          Metering and Billing](/products/kong-konnect/features/usage-based-metering-and-billing)
          Metering and Billing
        • [
          APIOps and Automation](/products/apiops-automation)
          APIOps and Automation
        • [
          API Observability](/products/kong-konnect/features/api-observability)
          API Observability
        • [Why Kong?](/company/why-kong)Why Kong?
      • CLOUD
      • [Cloud API Gateways](/products/kong-konnect/features/dedicated-cloud-gateways)Cloud API Gateways
      • [Need a self-hosted or hybrid option?](/products/kong-enterprise)Need a self-hosted or hybrid option?
      • COMPARE
      • [Considering AI Gateway alternatives? ](/performance-comparison/ai-gateway-alternatives)Considering AI Gateway alternatives?
      • [Kong vs. Postman](/performance-comparison/kong-vs-postman)Kong vs. Postman
      • [Kong vs. MuleSoft](/performance-comparison/kong-vs-mulesoft)Kong vs. MuleSoft
      • [Kong vs. Apigee](/performance-comparison/kong-vs-apigee)Kong vs. Apigee
      • [Kong vs. IBM](/performance-comparison/ibm-api-connect-vs-kong)Kong vs. IBM
      • GET STARTED
      • [Sign Up for Kong Konnect](/products/kong-konnect/register)Sign Up for Kong Konnect
      • [Documentation](https://developer.konghq.com/)Documentation
      • FOR PLATFORM TEAMS
      • [Developer Platform](/solutions/building-developer-platform)Developer Platform
      • [Kubernetes and Microservices](/solutions/build-on-kubernetes)Kubernetes and Microservices
      • [Observability](/solutions/observability)Observability
      • [Service Mesh Connectivity ](/solutions/service-mesh-connectivity)Service Mesh Connectivity
      • [Kafka Event Streaming](/solutions/kafka-stream-api-management)Kafka Event Streaming
      • FOR EXECUTIVES
      • [AI Connectivity](/ai-connectivity)AI Connectivity
      • [Open Banking](/solutions/open-banking)Open Banking
      • [Legacy Migration](/solutions/legacy-api-management-migration)Legacy Migration
      • [Platform Cost Reduction](/solutions/api-platform-consolidation)Platform Cost Reduction
      • [Kafka Cost Optimization](/solutions/reduce-kafka-cost)Kafka Cost Optimization
      • [API Monetization](/solutions/api-monetization)API Monetization
      • [AI Monetization](/solutions/ai-monetization)AI Monetization
      • [AI FinOps](/solutions/ai-cost-governance-finops)AI FinOps
      • FOR AI TEAMS
      • [Agent Gateway](/agent-gateway)Agent Gateway
      • [AI Governance](/solutions/ai-governance)AI Governance
      • [AI Security](/solutions/ai-security)AI Security
      • [AI Cost Control](/solutions/ai-cost-optimization-management)AI Cost Control
      • [Agentic Infrastructure](/solutions/agentic-ai-workflows)Agentic Infrastructure
      • [MCP Production](/solutions/mcp-production-and-consumption)MCP Production
      • [MCP Traffic Gateway](/solutions/mcp-governance)MCP Traffic Gateway
      • FOR DEVELOPERS
      • [Mobile App API Development](/solutions/mobile-application-api-development)Mobile App API Development
      • [GenAI App Development](/solutions/power-openai-applications)GenAI App Development
      • [API Gateway for Istio](/solutions/istio-gateway)API Gateway for Istio
      • [Decentralized Load Balancing](/solutions/decentralized-load-balancing)Decentralized Load Balancing
      • BY INDUSTRY
      • [Financial Services](/solutions/financial-services-industry)Financial Services
      • [Healthcare](/solutions/healthcare)Healthcare
      • [Higher Education](/solutions/api-platform-for-education-services)Higher Education
      • [Insurance](/solutions/insurance)Insurance
      • [Manufacturing](/solutions/manufacturing)Manufacturing
      • [Retail](/solutions/retail)Retail
      • [Software & Technology](/solutions/software-and-technology)Software & Technology
      • [Transportation](/solutions/transportation-and-logistics)Transportation
      • [See all Solutions](/solutions)See all Solutions
  • [Pricing](/pricing)Pricing
      • DOCUMENTATION
      • [Kong Konnect](https://developer.konghq.com/konnect/)Kong Konnect
      • [Kong Gateway](https://developer.konghq.com/gateway/)Kong Gateway
      • [Kong Mesh](https://developer.konghq.com/mesh/)Kong Mesh
      • [Kong AI Gateway](https://developer.konghq.com/ai-gateway/)Kong AI Gateway
      • [Kong Event Gateway](https://developer.konghq.com/event-gateway/)Kong Event Gateway
      • [Kong Insomnia](https://developer.konghq.com/insomnia/)Kong Insomnia
      • [Plugin Hub](https://developer.konghq.com/plugins/)Plugin Hub
      • EXPLORE
      • [Blog](/blog)Blog
      • [Learning Center](/blog/learning-center)Learning Center
      • [eBooks](/resources/e-book)eBooks
      • [Reports](/resources/reports)Reports
      • [Demos](/resources/demos)Demos
      • [Customer Stories](/customer-stories)Customer Stories
      • [Videos](/resources/videos)Videos
      • EVENTS
      • [API + AI Summit](/events/conferences/api-ai-summit)API + AI Summit
      • [Agentic Era World Tour](/agentic-era-world-tour)Agentic Era World Tour
      • [Webinars](/events/webinars)Webinars
      • [User Calls](/events/user-calls)User Calls
      • [Workshops](/events/workshops)Workshops
      • [Meetups](/events/meetups)Meetups
      • [See All Events](/events)See All Events
      • FOR DEVELOPERS
      • [Get Started](https://developer.konghq.com/)Get Started
      • [Community](/community)Community
      • [Certification](/academy/certification)Certification
      • [Training](https://education.konghq.com)Training
      • COMPANY
      • [About Us](/company/about-us)About Us
      • [We're Hiring!](/company/careers)We're Hiring!
      • [Press Room](/company/press-room)Press Room
      • [Contact Us](/company/contact-us)Contact Us
      • [Kong Partner Program](/partners)Kong Partner Program
      • [Enterprise Support Portal](https://support.konghq.com/s/)Enterprise Support Portal
      • [Documentation](https://developer.konghq.com/?_gl=1*tphanb*_gcl_au*MTcxNTQ5NjQ0MC4xNzY5Nzg4MDY0LjIwMTI3NzEwOTEuMTc3MzMxODI2MS4xNzczMzE4MjYw*_ga*NDIwMDU4MTU3LjE3Njk3ODgwNjQ.*_ga_4JK9146J1H*czE3NzQwMjg1MjkkbzE4OSRnMCR0MTc3NDAyODUyOSRqNjAkbDAkaDA)Documentation
  • [](/search)
  • [Login](https://cloud.konghq.com/login)Login
  • [Book Demo](/contact-sales)Book Demo
  • [Get Started](/products/kong-konnect/register)Get Started
[Blog](/blog)Blog
  • [AI Gateway](/blog/tag/ai-gateway)AI Gateway
  • [AI Security](/blog/tag/ai-security)AI Security
  • [AIOps](/blog/tag/aiops)AIOps
  • [API Security](/blog/tag/api-security)API Security
  • [API Gateway](/blog/tag/api-gateway)API Gateway
|
    • [API Management](/blog/tag/api-management)API Management
    • [API Development](/blog/tag/api-development)API Development
    • [API Design](/blog/tag/api-design)API Design
    • [Automation](/blog/tag/automation)Automation
    • [Service Mesh](/blog/tag/service-mesh)Service Mesh
    • [Insomnia](/blog/tag/insomnia)Insomnia
    • [Event Gateway](/blog/tag/event-gateway)Event Gateway
    • [View All Blogs](/blog/page/1)View All Blogs
We're Entering the Age of AI Connectivity [Read more](/blog/news/the-age-of-ai-connectivity)Read moreProducts & Agents:
    • [Kong AI Gateway](/products/kong-ai-gateway)Kong AI Gateway
    • [Kong API Gateway](/products/kong-gateway)Kong API Gateway
    • [Kong Event Gateway](/products/event-gateway)Kong Event Gateway
    • [Kong Metering & Billing](/products/usage-based-metering-and-billing)Kong Metering & Billing
    • [Kong Insomnia](/products/kong-insomnia)Kong Insomnia
    • [Kong Konnect](/products/kong-konnect)Kong Konnect
  • [Documentation](https://developer.konghq.com)Documentation
  • [Book Demo](/contact-sales)Book Demo
  1. Home
  2. Blog
  3. Product Releases
  4. Bringing Identity-Aware Security & Policy Enforcement to Event Streaming
[Product Releases](/blog/product-releases)Product Releases
March 25, 2026
4 min read

# Bringing Identity-Aware Security & Policy Enforcement to Event Streaming

Hugo Guerrero
Principal Tech PMM, Kong

Event-driven architectures (EDAs) have pretty quickly transformed from a niche engineering pattern to the all-pervasive central nervous system of the modern enterprise. With Apache Kafka at the helm, enterprises are rapidly shifting gears from synchronous REST APIs to asynchronous event streams to relentlessly support real-time analytics, generative AI, and responsive microservices.

But as the appetite for real-time data grows, so does the challenge of securing it.

Today, we’re thrilled to announce Kong Event Gateway v1.1. This release addresses one of the most pressing hurdles in modern event streaming: closing the security gap between modern web identity standards and native event stream protocols. With the introduction of OAuth Token Claim Mapping for Policies and native mTLS Authentication, Kong Event Gateway v1.1 makes it easier and safer than ever to expose and consume event streams at scale.

## Events are first-class, but still second-class citizens in security

The widespread adoption of Kafka and event streaming platforms is evident across several enterprises, where they serve as the backbone of critical operations, ranging from financial transactions to AI inference pipelines.

However, in the domains of security and identity, most teams continue to face several pressing challenges, including:

  • - Coarse-grained access control limited to the topic level
  • - Fragmented identity models spanning disparate systems
  • - Complex and inconsistent mutual TLS (mTLS) configurations
  • - Limited integration with modern OAuth-based security architectures

In the traditional synchronous world, API security has largely standardized on OAuth 2.0 and OpenID Connect (OIDC). However, Kafka’s native security model operates differently, relying heavily on mutual TLS (mTLS) for authentication and Access Control Lists (ACLs) for authorization. Consequently, while APIs have matured into identity-aware and policy-driven interfaces, event systems often maintain an infrastructure-centric security posture.

This yields a massive disconnect when teams try to expose Kafka topics to external partners, edge devices, or cross-domain internal teams. Developers are usually forced to choose between bad options, such as:

  • - **Compromise on security** by granting overly broad access to data streams.
  • - **Slow down development** by building and maintaining clunky, custom middleware to translate web identities into Kafka identities.
  • - **Isolate the data**, keeping valuable real-time events locked away from the teams that need them most.

Kong Event Gateway v1.1 bridges this gap, allowing you to secure your event streams using the modern identity standards you already use for your APIs, without breaking Kafka’s native security posture.

## What’s new in Kong Event Gateway v1.1

Kong Event Gateway 1.1 focuses on bridging this gap by bringing identity and security to the forefront of event streaming.

**OAuth Token Claim Mapping for Policies**

Modern systems rely heavily on OAuth and JWT tokens to represent identity and context. Until now, that context was largely lost when interacting with event systems.

With OAuth token claim mapping, Kong Event Gateway can do the following.

  • - Validate incoming tokens
  • - Extract standard and custom claims, such as roles, scopes, or tenant identifiers
  • - Map those claims directly into policy enforcement decisions

This enables fine-grained, identity-aware authorization at the event layer. Instead of asking “can this client access this topic?”, you can now ask the following questions.

  • - Can this *user role *publish to this stream?
  • - Can this *tenant* consume only their own events?
  • - Can this *AI agent* access only scoped data?

This is a fundamental shift from infrastructure-level control to context-aware security.

**How it works in practice**

Imagine you have a multi-tenant application where external consumers need to read order events. A consumer authenticates and presents an OAuth token containing the claim "tenant_id": "eu-region-4".

Instead of writing custom code to validate this, Kong Event Gateway intercepts the connection, reads the token, extracts the claim, and dynamically restricts that user's read access to the orders-eu-region-4 Kafka topic. If they attempt to subscribe to a different topic, the gateway drops the connection before it ever reaches the Kafka broker.

**This content contains a video which can not be displayed in Agent mode**

**mTLS authentication aligned with Kafka practices**

Security shouldn’t come at the cost of friction. Kafka relies on mTLS for Zero Trust security between clients and brokers. Previously, bridging external consumers to this internal standard required complex certificate management or breaking the mTLS chain at the edge, neither of which aligned with Kafka's architectural assumptions.

That is why Kong Event Gateway 1.1 introduces mTLS authentication that fully aligns with common Kafka practices. Rather than forcing teams into a new model, this approach:

  • - **Works with existing Kafka security patterns:** Leverages familiar certificate-based mutual authentication
  • - **Simplifies certificate management:** The list of trusted certificate bundles is maintained centrally in Kong Konnect. You can easily manage your trust stores as first-class resources, whether you prefer to click through the UI or deploy via declarative configuration.
  • - **Integrates cleanly into the current platform setups:** Creates a secure-by-default communication layer that feels native to Kafka teams.

The result is a secure-by-default communication layer that feels familiar to Kafka teams while still benefiting from Kong’s policy enforcement capabilities.

**How it works in practice**

The gateway seamlessly handles the mTLS handshake with the consuming client and verifies the certificate against your configured trust store.

Crucially, the gateway doesn't just authenticate the connection; it can also dynamically extract the principal from the client's certificate. You can then use this extracted identity to drive advanced gateway logic, such as applying custom encryption based on the specific client, enforcing strict access policies, or logging the exact identity for downstream auditing.

By handling all of this at the edge, the gateway ensures end-to-end encryption and strict identity verification before a single byte is forwarded, drastically reducing the attack surface of your Kafka clusters while maintaining the architectural purity your infrastructure teams expect.

## Identity + transport: A Zero Trust Foundation for events

These two features are powerful individually, but together they unlock something even more significant and powerful.

  • - OAuth claim mapping defines who you are and what you can do
  • - mTLS authentication ensures secure and trusted communication

Together, they form the foundation for a zero-trust model in event streaming. This is where event infrastructure starts to look and behave like modern API platforms.

With Kong Event Gateway 1.1, organizations can:

  • - Build secure multi-tenant event platforms
  • - Enforce fine-grained access control across event streams
  • - Support AI and agent-based architectures with scoped data access
  • - Reduce operational complexity by aligning with existing Kafka practices
  • - Move toward a unified connectivity layer across APIs and events

This is not only about adding features. It’s about redefining how event systems participate in modern architectures.

## Secure your event streams today

Kong Event Gateway 1.1 enables organizations to scale event-driven architectures securely, so you no longer have to choose between modern identity standards and native Kafka security.

You can get started by:

  • - Exploring the updated documentation
  • - Deploying in your existing Kubernetes or hybrid environments
  • - Testing OAuth-based policies and mTLS configurations in your current Kafka setup

Event streaming is becoming the crucial nervous system of modern applications. As that happens, security and identity can no longer be an afterthought. Kong Event Gateway is evolving to meet this reality, bringing policy-driven, identity-aware connectivity to the world of events.

Kong Event Gateway v1.1 is a step forward in that direction. And this is only the beginning.

- [Event Gateway](/blog/tag/event-gateway)Event Gateway- [API Security](/blog/tag/api-security)API Security- [Microservices](/blog/tag/microservices)Microservices- [OAuth](/blog/tag/oauth)OAuth- [Zero-Trust](/blog/tag/zero-trust)Zero-Trust- [Kafka](/blog/tag/kafka)Kafka

Table of Contents

  • Events are first-class, but still second-class citizens in security
  • What’s new in Kong Event Gateway v1.1
  • Identity + transport: A Zero Trust Foundation for events
  • Secure your event streams today

## More on this topic

_Videos_

## Zero Trust Security with Service Mesh

_Videos_

## Zero-Downtime Deployment on Kubernetes

## See Kong in action

Accelerate deployments, reduce vulnerabilities, and gain real-time visibility. 

[Get a Demo](/contact-sales)Get a Demo
**Topics**
- [Event Gateway](/blog/tag/event-gateway)Event Gateway- [API Security](/blog/tag/api-security)API Security- [Microservices](/blog/tag/microservices)Microservices- [OAuth](/blog/tag/oauth)OAuth- [Zero-Trust](/blog/tag/zero-trust)Zero-Trust- [Kafka](/blog/tag/kafka)Kafka
Hugo Guerrero
Principal Tech PMM, Kong

Recommended posts

# Connecting Kong and Solace: Building Smarter Event-Driven APIs

[Engineering](/blog)EngineeringMarch 20, 2026

Running Kong in front of your Solace Broker adds real benefits: Authentication & Access Control – protect your broker from unauthorized publishers. Validation & Transformation – enforce schemas, sanitize data, and map REST calls into event topics.

Hugo Guerrero
[](https://konghq.com/blog/engineering/smarter-event-driven-apis-kong-solace)

# Exposing Kafka to the Internet: Solving External Access

[Enterprise](/blog)EnterpriseFebruary 20, 2026

Your Kafka Doesn't Have to Live Behind a Wall When teams resort to VPC peering or PrivateLink to expose Kafka, they're not solving the problem — they're managing it, one network topology decision at a time. Every new external consumer adds compl

Anthony Gatti
[](https://konghq.com/blog/enterprise/kafka-external-access)

# Kong Event Gateway: Unifying APIs and Events in a Single API Platform

[Product Releases](/blog)Product ReleasesMay 13, 2025

Kong customers include some of the most forward-thinking, tech-savvy organizations in the world. And while we’re proud to help them innovate through traditional APIs, the reality is that their ambitions don’t stop there. Increasingly, our customers a

Umair Waheed
[](https://konghq.com/blog/product-releases/kong-event-gateway)

# Adopt a Zero Trust Approach with OAuth 2.0 Mutual TLS Client Authentication

[Engineering](/blog)EngineeringFebruary 19, 2024

In the modern IT stack, API gateways act as the first line of defense against attacks on backend services by enforcing authentication/authorization policies and validating and transforming requests. When backend services are protected with a token-b

Samuele Illuminati
[](https://konghq.com/blog/engineering/zero-trust-oauth-2-0-mtls-client-authentication)

# The Importance of Zero-Trust Security When Making the Microservices Move

[Enterprise](/blog)EnterpriseJanuary 14, 2021

Transitioning to microservices has many advantages for teams building large applications that must accelerate the pace of innovation, deployments and time to market. It also provides them the opportunity to secure their applications and services bet

Marco Palladino
[](https://konghq.com/blog/enterprise/the-importance-of-zero-trust-security-when-making-the-microservices-move)

# From APIs to Agentic Integration: Introducing Kong Context Mesh

[Product Releases](/blog)Product ReleasesFebruary 10, 2026

Agents are ultimately decision makers. They make those decisions by combining intelligence with context, ultimately meaning they are only ever as useful as the context they can access. An agent that can't check inventory levels, look up customer his

Alex Drag
[](https://konghq.com/blog/product-releases/introducing-kong-context-mesh)

# Kong Mesh 2.13: Mesh Identity Support for Universal Mode & LTS

[Product Releases](/blog)Product ReleasesJanuary 22, 2026

Kong Mesh 2.13 delivers full support for Mesh Identity for Kubernetes and Universal mode. Plus, it's been designated as a Long Term Support release, with support for a total of 2 years. But first, what's Kong Mesh for the uninitiated? Built on top

Justin Davies
[](https://konghq.com/blog/product-releases/kong-mesh-2-13)

## Ready to see Kong in action?

Get a personalized walkthrough of Kong's platform tailored to your architecture, use cases, and scale requirements.

[Get a Demo](/contact-sales)Get a Demo

## step-0

  • ## Company

    • [About Kong](/company/about-us)About Kong
    • [Customers](/customer-stories)Customers
    • [Careers](/company/careers)Careers
    • [Press](/company/press-room)Press
    • [Events](/events)Events
    • [Contact](/company/contact-us)Contact
    • [Pricing](/pricing)Pricing
      • Terms
      • Privacy
      • Trust and Compliance
  • ## Platform

    • [Kong AI Gateway](/products/kong-ai-gateway)Kong AI Gateway
    • [Kong Konnect](/products/kong-konnect)Kong Konnect
    • [Kong Gateway](/products/kong-gateway)Kong Gateway
    • [Kong Event Gateway](/products/event-gateway)Kong Event Gateway
    • [Kong Insomnia](/products/kong-insomnia)Kong Insomnia
    • [Documentation](https://developer.konghq.com)Documentation
    • [Book Demo](/contact-sales)Book Demo
  • ## Compare

    • [AI Gateway Alternatives](/performance-comparison/ai-gateway-alternatives)AI Gateway Alternatives
    • [Kong vs Apigee](/performance-comparison/kong-vs-apigee)Kong vs Apigee
    • [Kong vs IBM](/performance-comparison/ibm-api-connect-vs-kong)Kong vs IBM
    • [Kong vs Postman](/performance-comparison/kong-vs-postman)Kong vs Postman
    • [Kong vs Mulesoft](/performance-comparison/kong-vs-mulesoft)Kong vs Mulesoft
  • ## Explore More

    • [Open Banking API Solutions](/solutions/open-banking)Open Banking API Solutions
    • [API Governance Solutions](/solutions/api-governance)API Governance Solutions
    • [Istio API Gateway Integration](/solutions/istio-gateway)Istio API Gateway Integration
    • [Kubernetes API Management](/solutions/build-on-kubernetes)Kubernetes API Management
    • [API Gateway: Build vs Buy](/campaign/secure-api-scalability)API Gateway: Build vs Buy
    • [Kong vs Apigee](/performance-comparison/kong-vs-apigee)Kong vs Apigee
  • ## Open Source

    • [Kong Gateway](https://developer.konghq.com/gateway/install/)Kong Gateway
    • [Kuma](https://kuma.io/)Kuma
    • [Insomnia](https://insomnia.rest/)Insomnia
    • [Kong Community](/community)Kong Community

Increase developer productivity, security, and performance at scale with the unified platform for API management and AI.

  • English
  • Japanese
  • Frenchcoming soon
  • Spanishcoming soon
  • Germancoming soon
© Kong Inc. 2026
Interaction mode