WHY GARTNER’S “CONTEXT MESH” CHANGES EVERYTHING AI CONNECTIVITY: THE ROAD AHEAD DON’T MISS API + AI SUMMIT 2026 SEPT 30 – OCT 1
  • Why Kong
    • Explore the unified API Platform
        • BUILD APIs
        • Kong Insomnia
        • API Design
        • API Mocking
        • API Testing and Debugging
        • MCP Client
        • RUN APIs
        • API Gateway
        • Context Mesh
        • AI Gateway
        • Event Gateway
        • Kubernetes Operator
        • Service Mesh
        • Ingress Controller
        • Runtime Management
        • DISCOVER APIs
        • Developer Portal
        • Service Catalog
        • MCP Registry
        • GOVERN APIs
        • Metering and Billing
        • APIOps and Automation
        • API Observability
        • Why Kong?
      • CLOUD
      • Cloud API Gateways
      • Need a self-hosted or hybrid option?
      • COMPARE
      • Considering AI Gateway alternatives?
      • Kong vs. Postman
      • Kong vs. MuleSoft
      • Kong vs. Apigee
      • Kong vs. IBM
      • GET STARTED
      • Sign Up for Kong Konnect
      • Documentation
      • FOR PLATFORM TEAMS
      • Developer Platform
      • Kubernetes and Microservices
      • Observability
      • Service Mesh Connectivity
      • Kafka Event Streaming
      • FOR EXECUTIVES
      • AI Connectivity
      • Open Banking
      • Legacy Migration
      • Platform Cost Reduction
      • Kafka Cost Optimization
      • API Monetization
      • AI Monetization
      • AI FinOps
      • FOR AI TEAMS
      • AI Governance
      • AI Security
      • AI Cost Control
      • Agentic Infrastructure
      • MCP Production
      • MCP Traffic Gateway
      • FOR DEVELOPERS
      • Mobile App API Development
      • GenAI App Development
      • API Gateway for Istio
      • Decentralized Load Balancing
      • BY INDUSTRY
      • Financial Services
      • Healthcare
      • Higher Education
      • Insurance
      • Manufacturing
      • Retail
      • Software & Technology
      • Transportation
      • See all Solutions
  • Pricing
      • DOCUMENTATION
      • Kong Konnect
      • Kong Gateway
      • Kong Mesh
      • Kong AI Gateway
      • Kong Event Gateway
      • Kong Insomnia
      • Plugin Hub
      • EXPLORE
      • Blog
      • Learning Center
      • eBooks
      • Reports
      • Demos
      • Customer Stories
      • Videos
      • EVENTS
      • API + AI Summit
      • Webinars
      • User Calls
      • Workshops
      • Meetups
      • See All Events
      • FOR DEVELOPERS
      • Get Started
      • Community
      • Certification
      • Training
      • COMPANY
      • About Us
      • We're Hiring!
      • Press Room
      • Contact Us
      • Kong Partner Program
      • Enterprise Support Portal
      • Documentation
  • Login
  • Book Demo
  • Get Started
Blog
  • AI Gateway
  • AI Security
  • AIOps
  • API Security
  • API Gateway
|
    • API Management
    • API Development
    • API Design
    • Automation
    • Service Mesh
    • Insomnia
    • View All Blogs
  1. Home
  2. Blog
  3. Product Releases
  4. Bringing Identity-Aware Security & Policy Enforcement to Event Streaming
Product Releases
March 25, 2026
4 min read

Bringing Identity-Aware Security & Policy Enforcement to Event Streaming

Hugo Guerrero
Principal Tech PMM, Kong

Event-driven architectures (EDAs) have pretty quickly transformed from a niche engineering pattern to the all-pervasive central nervous system of the modern enterprise. With Apache Kafka at the helm, enterprises are rapidly shifting gears from synchronous REST APIs to asynchronous event streams to relentlessly support real-time analytics, generative AI, and responsive microservices.

But as the appetite for real-time data grows, so does the challenge of securing it.

Today, we’re thrilled to announce Kong Event Gateway v1.1. This release addresses one of the most pressing hurdles in modern event streaming: closing the security gap between modern web identity standards and native event stream protocols. With the introduction of OAuth Token Claim Mapping for Policies and native mTLS Authentication, Kong Event Gateway v1.1 makes it easier and safer than ever to expose and consume event streams at scale.

Events are first-class, but still second-class citizens in security

The widespread adoption of Kafka and event streaming platforms is evident across several enterprises, where they serve as the backbone of critical operations, ranging from financial transactions to AI inference pipelines.

However, in the domains of security and identity, most teams continue to face several pressing challenges, including:

  • Coarse-grained access control limited to the topic level
  • Fragmented identity models spanning disparate systems
  • Complex and inconsistent mutual TLS (mTLS) configurations
  • Limited integration with modern OAuth-based security architectures

In the traditional synchronous world, API security has largely standardized on OAuth 2.0 and OpenID Connect (OIDC). However, Kafka’s native security model operates differently, relying heavily on mutual TLS (mTLS) for authentication and Access Control Lists (ACLs) for authorization. Consequently, while APIs have matured into identity-aware and policy-driven interfaces, event systems often maintain an infrastructure-centric security posture.

This yields a massive disconnect when teams try to expose Kafka topics to external partners, edge devices, or cross-domain internal teams. Developers are usually forced to choose between bad options, such as:

  • Compromise on security by granting overly broad access to data streams.
  • Slow down development by building and maintaining clunky, custom middleware to translate web identities into Kafka identities.
  • Isolate the data, keeping valuable real-time events locked away from the teams that need them most.

Kong Event Gateway v1.1 bridges this gap, allowing you to secure your event streams using the modern identity standards you already use for your APIs, without breaking Kafka’s native security posture.

What’s new in Kong Event Gateway v1.1

Kong Event Gateway 1.1 focuses on bridging this gap by bringing identity and security to the forefront of event streaming.

OAuth Token Claim Mapping for Policies

Modern systems rely heavily on OAuth and JWT tokens to represent identity and context. Until now, that context was largely lost when interacting with event systems.

With OAuth token claim mapping, Kong Event Gateway can do the following.

  • Validate incoming tokens
  • Extract standard and custom claims, such as roles, scopes, or tenant identifiers
  • Map those claims directly into policy enforcement decisions

This enables fine-grained, identity-aware authorization at the event layer. Instead of asking “can this client access this topic?”, you can now ask the following questions.

  • Can this user role publish to this stream?
  • Can this tenant consume only their own events?
  • Can this AI agent access only scoped data?

This is a fundamental shift from infrastructure-level control to context-aware security.

How it works in practice

Imagine you have a multi-tenant application where external consumers need to read order events. A consumer authenticates and presents an OAuth token containing the claim "tenant_id": "eu-region-4".

Instead of writing custom code to validate this, Kong Event Gateway intercepts the connection, reads the token, extracts the claim, and dynamically restricts that user's read access to the orders-eu-region-4 Kafka topic. If they attempt to subscribe to a different topic, the gateway drops the connection before it ever reaches the Kafka broker.

mTLS authentication aligned with Kafka practices

Security shouldn’t come at the cost of friction. Kafka relies on mTLS for Zero Trust security between clients and brokers. Previously, bridging external consumers to this internal standard required complex certificate management or breaking the mTLS chain at the edge, neither of which aligned with Kafka's architectural assumptions.

That is why Kong Event Gateway 1.1 introduces mTLS authentication that fully aligns with common Kafka practices. Rather than forcing teams into a new model, this approach:

  • Works with existing Kafka security patterns: Leverages familiar certificate-based mutual authentication
  • Simplifies certificate management: The list of trusted certificate bundles is maintained centrally in Kong Konnect. You can easily manage your trust stores as first-class resources, whether you prefer to click through the UI or deploy via declarative configuration.
  • Integrates cleanly into the current platform setups: Creates a secure-by-default communication layer that feels native to Kafka teams.

The result is a secure-by-default communication layer that feels familiar to Kafka teams while still benefiting from Kong’s policy enforcement capabilities.

How it works in practice

The gateway seamlessly handles the mTLS handshake with the consuming client and verifies the certificate against your configured trust store.

Crucially, the gateway doesn't just authenticate the connection; it can also dynamically extract the principal from the client's certificate. You can then use this extracted identity to drive advanced gateway logic, such as applying custom encryption based on the specific client, enforcing strict access policies, or logging the exact identity for downstream auditing.

By handling all of this at the edge, the gateway ensures end-to-end encryption and strict identity verification before a single byte is forwarded, drastically reducing the attack surface of your Kafka clusters while maintaining the architectural purity your infrastructure teams expect.

Identity + transport: A Zero Trust Foundation for events

These two features are powerful individually, but together they unlock something even more significant and powerful.

  • OAuth claim mapping defines who you are and what you can do
  • mTLS authentication ensures secure and trusted communication

Together, they form the foundation for a zero-trust model in event streaming. This is where event infrastructure starts to look and behave like modern API platforms.

With Kong Event Gateway 1.1, organizations can:

  • Build secure multi-tenant event platforms
  • Enforce fine-grained access control across event streams
  • Support AI and agent-based architectures with scoped data access
  • Reduce operational complexity by aligning with existing Kafka practices
  • Move toward a unified connectivity layer across APIs and events

This is not only about adding features. It’s about redefining how event systems participate in modern architectures.

Secure your event streams today

Kong Event Gateway 1.1 enables organizations to scale event-driven architectures securely, so you no longer have to choose between modern identity standards and native Kafka security.

You can get started by:

  • Exploring the updated documentation
  • Deploying in your existing Kubernetes or hybrid environments
  • Testing OAuth-based policies and mTLS configurations in your current Kafka setup

Event streaming is becoming the crucial nervous system of modern applications. As that happens, security and identity can no longer be an afterthought. Kong Event Gateway is evolving to meet this reality, bringing policy-driven, identity-aware connectivity to the world of events.

Kong Event Gateway v1.1 is a step forward in that direction. And this is only the beginning.

Event GatewayAPI SecurityMicroservicesOAuthZero-TrustKafka

Table of Contents

  • Events are first-class, but still second-class citizens in security
  • What’s new in Kong Event Gateway v1.1
  • Identity + transport: A Zero Trust Foundation for events
  • Secure your event streams today

More on this topic

Videos

Zero Trust Security with Service Mesh

Videos

Zero-Downtime Deployment on Kubernetes

See Kong in action

Accelerate deployments, reduce vulnerabilities, and gain real-time visibility. 

Get a Demo
Topics
Event GatewayAPI SecurityMicroservicesOAuthZero-TrustKafka
Hugo Guerrero
Principal Tech PMM, Kong

Recommended posts

Exposing Kafka to the Internet: Solving External Access

EnterpriseFebruary 20, 2026

Your Kafka Doesn't Have to Live Behind a Wall When teams resort to VPC peering or PrivateLink to expose Kafka, they're not solving the problem — they're managing it, one network topology decision at a time. Every new external consumer adds compl

Anthony Gatti

Adopt a Zero Trust Approach with OAuth 2.0 Mutual TLS Client Authentication

EngineeringFebruary 19, 2024

In the modern IT stack, API gateways act as the first line of defense against attacks on backend services by enforcing authentication/authorization policies and validating and transforming requests. When backend services are protected with a token-b

Samuele Illuminati

The Importance of Zero-Trust Security When Making the Microservices Move

EnterpriseJanuary 14, 2021

Transitioning to microservices has many advantages for teams building large applications that must accelerate the pace of innovation, deployments and time to market. It also provides them the opportunity to secure their applications and services bet

Marco Palladino

Connecting Kong and Solace: Building Smarter Event-Driven APIs

EngineeringMarch 20, 2026

Running Kong in front of your Solace Broker adds real benefits: Authentication & Access Control – protect your broker from unauthorized publishers. Validation & Transformation – enforce schemas, sanitize data, and map REST calls into event topics.

Hugo Guerrero

Kong Event Gateway: Unifying APIs and Events in a Single API Platform

Product ReleasesMay 13, 2025

Kong customers include some of the most forward-thinking, tech-savvy organizations in the world. And while we’re proud to help them innovate through traditional APIs, the reality is that their ambitions don’t stop there. Increasingly, our customers a

Umair Waheed

From APIs to Agentic Integration: Introducing Kong Context Mesh

Product ReleasesFebruary 10, 2026

Agents are ultimately decision makers. They make those decisions by combining intelligence with context, ultimately meaning they are only ever as useful as the context they can access. An agent that can't check inventory levels, look up customer his

Alex Drag

Kong Mesh 2.13: Mesh Identity Support for Universal Mode & LTS

Product ReleasesJanuary 22, 2026

Kong Mesh 2.13 delivers full support for Mesh Identity for Kubernetes and Universal mode. Plus, it's been designated as a Long Term Support release, with support for a total of 2 years. But first, what's Kong Mesh for the uninitiated? Built on top

Justin Davies

Ready to see Kong in action?

Get a personalized walkthrough of Kong's platform tailored to your architecture, use cases, and scale requirements.

Get a Demo
Ask AI for a summary of Kong
Stay connected
    • Company
    • About Kong
    • Customers
    • Careers
    • Press
    • Events
    • Contact
    • Pricing
    • Legal
    • Terms
    • Privacy
    • Trust and Compliance
    • Platform
    • Kong AI Gateway
    • Kong Konnect
    • Kong Gateway
    • Kong Event Gateway
    • Kong Insomnia
    • Documentation
    • Book Demo
    • Compare
    • AI Gateway Alternatives
    • Kong vs Apigee
    • Kong vs IBM
    • Kong vs Postman
    • Kong vs Mulesoft
    • Explore More
    • Open Banking API Solutions
    • API Governance Solutions
    • Istio API Gateway Integration
    • Kubernetes API Management
    • API Gateway: Build vs Buy
    • Kong vs Apigee
    • Open Source
    • Kong Gateway
    • Kuma
    • Insomnia
    • Kong Community

Increase developer productivity, security, and performance at scale with the unified platform for API management and AI.

  • Japanese
  • Frenchcoming soon
  • Spanishcoming soon
  • Germancoming soon
© Kong Inc. 2026