Blog
  • AI Gateway
  • AI Security
  • AIOps
  • API Security
  • API Gateway
|
    • API Management
    • API Development
    • API Design
    • Automation
    • Service Mesh
    • Insomnia
    • View All Blogs
  1. Home
  2. Blog
  3. Product Releases
  4. Your Secrets and Tokens are Secure with Kong Gateway Enterprise 3.5
Product Releases
November 13, 2023
5 min read

Your Secrets and Tokens are Secure with Kong Gateway Enterprise 3.5

Tom Brightbill
Group Product Manager

Kong Gateway Enterprise 3.5 is packed with security features to support the use cases demanded by our enterprise customers through major improvements in Secrets Management integrations and our Open-ID Connect (OIDC) plugin. Additionally, we’ve added key security updates for a few of our AWS integrations.

Cloud-neutral secrets management with Kong Gateway Enterprise: Azure Key Vault support

In Kong Gateway Enterprise 3.5, we’ve expanded our secrets management integrations to include Azure Key Vault! 

This further extends our already robust integrations, which span across AWS Secrets Manager, GCP Secrets Manager, and HashiCorp Vault. From day one, we’ve supported native Azure authentication methods.

This establishes Kong Gateway Enterprise as the industry's first cloud-neutral API gateway with regard to support for secrets management from all three public cloud providers and Hashicorp. No other gateway vendor has this breadth of integrations. Additionally, many other vendors can never achieve cloud neutrality given they’re owned by cloud providers. Kong Gateway Enterprise stands alone in this regard, and we’re happy to be leading the industry — no matter which cloud (or clouds!) you deploy Kong Gateway on.

We’re thrilled to be leading the industry and are excited to add Azure Key Vault to the list of integrations! 

Figure 1: Secrets Management 

OpenID Connect: Token security with sender-constrained access tokens

In token-based systems, access tokens grant access to resources. In this process, the legitimacy of the token bearer is assumed and access is granted based on token validity. A major security challenge with this approach is the lack of checks to ensure the legitimacy of the token bearer as unauthorized access can be easily obtained with stolen or leaked tokens. This is a major concern for any API provider, especially for those environments with heightened security needs. The solution to this problem is to restrict the tokens to clients (sender-constrained access tokens) so only the entity to whom a token was issued can use it to access the requested resources. This is achieved by the authorization servers binding the tokens to cryptographic keys and resource servers requiring the clients to prove the possession of those keys to grant or deny access accordingly. 

Kong Gateway Enterprise 3.5 offers sender-constrained tokens via mTLS. The tokens issued by the authorization server are bound to the client certificates used to establish the connection. The resource servers validate the certificate thumbprint in the tokens to the underlying mTLS connection and grant access to the resources. This feature is enabled using OIDC and mutual TLS plugins and is available for bearer token and introspection authentication methods in the OIDC plugin. 

With sender-constrained access tokens using mTLS, we’ve provided an additional layer of security for access tokens and enable you to mitigate the risk of misuse of tokens. 

Stronger native AWS feature support: AWS Secrets + DP Resiliency

As part of the 3.5 release, we’ve expanded our native AWS support for two key features, the AWS Secrets Manager integration and the Data Plane Resiliency feature, which can work with AWS S3.

On the Secrets Manager front, we’ve added `assumeRole` capability for this integration. This means that Kong can temporarily assume a different AWS IAM role in order to fetch secrets from AWS Secrets Manager. This is commonly used in scenarios where the Secrets Manager is in a different VPC/deployment where Kong is running. AssumeRole behavior is used for cross-account communication. And because the behavior is short-lived, it’s considered very secure. This gives teams the ability to adhere to secure best practices offered within the AWS ecosystem.

Our Data Plane Resiliency feature works by backing up the Kong Control plane configuration into S3. A special type of Data Plane, called a `backup_node` will receive configuration from a Control Plane and push that configuration to an S3 compatible bucket. If the Control Pne ever goes down, the other Data Planes can be configured to reach out to this bucket to grab the last available configuration if needed.

By default, AWS S3 will encrypt any object before storing it on disk, with a default AWS key if none is specified. For many organizations, that isn’t sufficient, as they may have policies with regard to how long a key is valid for, which certificate authority (CA) it’s signed by, and which encryption algorithms are being used.

To that end, in 3.5, we’ll allow the users to specify which Amazon Key Management System (AWS KMS) key to use when encrypting the configuration prior to storage into S3. This gives users the flexibility to adhere to an organization’s internal security policies and not rely on any default behavior.

Kong’s native integrations with AWS will continue to reduce friction in AWS environments and empower teams to conform to AWS best practices with ease.

Kong Manager gets a brand new makeover

As a part of the 3.5 release, we applied a new redesign to the Kong Manager UI. 

Previously, the UI/UX of Kong Manager, Kong Konnect, and Kong Manager OSS were all distinct from each other. As a part of the 3.5 Gateway Release, we’ve unified the UI components to give each of them a similar look and feel for a smoother user experience. To make navigation simpler, we’ve unified the menus into one sidebar and removed an additional layer that required users to click extensively to navigate through the UI. 

All functionality from the previous UI is still intact, so you can enjoy the new UI without compromising any of your previous workflows.

Extended policy support for Consumer Groups

In Gateway 3.4, we released Consumer Groups for the first time, with the ability to configure Rate Limiting policies on top of them.

As a part of the 3.5 release, we’re happy to announce that the policies you can apply on Consumer Groups have been extended to include the Request Transformer plugin, Request Transformer Advanced plugin, Response Transformer plugin, Response Transformer Advanced plugin, and any custom plugins.

Feel free to unlock the power of consumer groups with these additional policies today.

Next steps

Begin your journey with Kong Gateway 3.5 by signing up for Kong Konnect, for free!

If you’re interested in Kong Gateway Enterprise 3.5 you can download it for free here. To explore the comprehensive list of features, fixes, and updates, please see the available CHANGELOG for Kong Gateway Enterprise here and Kong Gateway OSS here.

API SecurityAPI GatewayKong Gateway

More on this topic

Webinars

Quarterly Platform Updates & Roadmap Webinar

Videos

How Delta Fiber Scaled Transformation with Kong Gateway

See Kong in action

Accelerate deployments, reduce vulnerabilities, and gain real-time visibility. 

Get a Demo
Topics
API SecurityAPI GatewayKong Gateway
Share on Social
Tom Brightbill
Group Product Manager

Recommended posts

Kong Gateway 3.9: Extended AI Support and Enhanced Security

Kong Logo
Product ReleasesDecember 20, 2024

Today we're excited to announce Kong Gateway 3.9!  Since unveiling Kong Gateway 3.8 at API Summit 2024 just a few months ago, we’ve been busy making important updates and improvements to Kong Gateway. This release introduces new functionality arou

Alex Drag

Create an Internal API and Service Inventory with Konnect Service Catalog

Kong Logo
Product ReleasesJuly 1, 2025

When speaking with our customers, and particularly with platform teams, we repeatedly hear about how difficult it is to discover and govern all the services and APIs that actively run on their infrastructure. In ever-expanding and changing environm

Erin Choi

Kong Event Gateway: Unifying APIs and Events in a Single API Platform

Kong Logo
Product ReleasesMay 13, 2025

Kong customers include some of the most forward-thinking, tech-savvy organizations in the world. And while we’re proud to help them innovate through traditional APIs, the reality is that their ambitions don’t stop there. Increasingly, our customers a

Umair Waheed

Announcing Kong Gateway 3.8

Kong Logo
Product ReleasesSeptember 11, 2024

Kong Gateway 3.8 Hits Major Milestone for Enhanced Performance, Accelerated AI Adoption, Comprehensive Security, Extensibility, and Ease of Use We're excited to announce the release of Kong Gateway 3.8 , a significant update that marks a major mile

Silvano Luciani

What's New in Kong Gateway 3.7?

Kong Logo
Product ReleasesMay 29, 2024

We're thrilled to announce the general availability of Kong Gateway 3.7 and Kong Gateway Enterprise 3.7. Along with enhancements and new features for both OSS and enterprise users, this version comes with the general availability of our edge AI Gate

Veena Rajarathna

What’s New in Kong Gateway 3.6?

Kong Logo
Product ReleasesFebruary 15, 2024

We're thrilled to announce the general availability of Kong Gateway 3.6. This version features a high-performance compression algorithm, efficient route matching, and improved observability. Plus, Kong AI Gateway , which you can learn more about h

Veena Rajarathna

Kong Gateway Enterprise 3.1.x.x EOL

Kong Logo
Product ReleasesNovember 30, 2023

As of December 2023, Kong Gateway Enterprise 3.1.x.x will be going End Of Life and out of the Full Support cycle. Kong Gateway Enterprise 3.1.x.x will enter Sunset Support until December 2024. As a reminder, Kong Gateway Enterprise versions have 12

Tom Brightbill

Ready to see Kong in action?

Get a personalized walkthrough of Kong's platform tailored to your architecture, use cases, and scale requirements.

Get a Demo
Powering the API world

Increase developer productivity, security, and performance at scale with the unified platform for API management, AI gateways, service mesh, and ingress controller.

Sign up for Kong newsletter

    • Platform
    • Kong Konnect
    • Kong Gateway
    • Kong AI Gateway
    • Kong Insomnia
    • Developer Portal
    • Gateway Manager
    • Cloud Gateway
    • Get a Demo
    • Explore More
    • Open Banking API Solutions
    • API Governance Solutions
    • Istio API Gateway Integration
    • Kubernetes API Management
    • API Gateway: Build vs Buy
    • Kong vs Postman
    • Kong vs MuleSoft
    • Kong vs Apigee
    • Documentation
    • Kong Konnect Docs
    • Kong Gateway Docs
    • Kong Mesh Docs
    • Kong AI Gateway
    • Kong Insomnia Docs
    • Kong Plugin Hub
    • Open Source
    • Kong Gateway
    • Kuma
    • Insomnia
    • Kong Community
    • Company
    • About Kong
    • Customers
    • Careers
    • Press
    • Events
    • Contact
    • Pricing
  • Terms
  • Privacy
  • Trust and Compliance
  • © Kong Inc. 2026