Blog
  • AI Gateway
  • AI Security
  • AIOps
  • API Security
  • API Gateway
|
    • API Management
    • API Development
    • API Design
    • Automation
    • Service Mesh
    • Insomnia
    • View All Blogs
  1. Home
  2. Blog
  3. API Authentication

API Authentication

Secure your APIs with confidence. Explore methods, protocols, and best practices for implementing robust authentication—from OAuth and JWT to zero-trust architectures—across modern API ecosystem

‹Prev123Next›

Dynamic Routing Based on JWT Token’s Claim with Kong Konnect

Kong KonnectNovember 3, 2022

A common use case that is frequently requested is how to dynamically route requests based on authentication attributes. An example of this technique is routing requests to relevant upstream services based on claims contained in a JWT token. Admins would like all their clients to go to the same URI…

Shlomi Tubul

Kong Konnect Adds Support for Federated Authentication

API AuthenticationSeptember 1, 2022

Our latest release of Kong Konnect augments the security and compliance of the offering through enhanced authentication capabilities. Through the rest of this post, we’ll walk you through each of these features and explore what’s new in this Kong Konnect release. Figure 1: Kong Konnect Personal…

Hayden Lam

API Gateway Authentication

Kong Logo
API GatewayApril 19, 2022

What is an API Gateway? In essence, it authenticates that a particular consumer has permission to access the API, using a predefined set of credentials. There are special cases — for example, the option to allow anonymous authentication — but generally speaking, the aim of API authentication is to…

Kong

Understanding Microservices Authentication Services

Kong Logo
MicroservicesMarch 10, 2022

Authentication is the process of determining who a user is by, for example, asking them to provide a username and password or using multi-factor authentication. Once you know who the user is, you can check their account details to determine what they are authorized to access. Creating a session for…

Kong

Simplifying Authentication for Microservices Security

kongcast banner
API AuthenticationFebruary 7, 2022

In this episode of Kongcast , Jeff Taylor , senior product manager at Okta, tells and shows us how to speed up microservices security and take the burden off developers by managing auth with an API gateway . Still using monolithic architectures? Check out our Guide to Microservices Adoption Check…

Kaitlyn Barnard

New in Kong Konnect: Support for Okta + More Portal Customization

What’s New in Kong Konnect: Support for Okta and More Portal Customization Capabilities
Developer PortalJanuary 28, 2022

In February 2021, we announced the GA of Kong Konnect , the first cloud native service connectivity platform that gives organizations the flexibility of protecting their API and service traffic while simultaneously taking advantage of 10x ops improvements via the cloud control plane. Since our Kong…

Christian Heidenreich

Generating Dynamic Signatures for API Authentication With Insomnia

Generating Dynamic Signatures for API Authentication With Insomnia
API AuthenticationNovember 23, 2021

Earlier this year, we hosted our inaugural Kong Summit Hackathon . This virtual competition engaged our open source community and offered recognition and prizes for hacks in various categories. The community delivered with ingenious plugins, hacks and documentation. In this blog post, we highlight…

Scott Harwell

Kong and Okta Deliver Best-in-Class Identity for API Management

Kong and Okta Deliver Best-in-Class Identity for API Management
API ManagementNovember 18, 2021

As organizations look to accelerate their digital transformation initiatives, a couple of key trends are prevalent. First, there is a movement from monolithic to smaller cloud native microservices. Second, there is more pressure to innovate, resulting in an explosion of APIs and connections to…

Eric Gandhi

Token-Based Access Control With Kong, OPA and Curity

Token Based Access Control with Kong
API SecurityOctober 6, 2021

As APIs and microservices evolve, the architecture used to secure these resources must also mature. Utilizing a token-based architecture to protect APIs is a robust, secure and scalable approach, and it is also much safer than API keys or basic authentication. However, token-based architecture…

Jonas Iggbom

Solving API Authorization Challenges in Multi-Cloud Environments

B1-Solving API Authorization Challenges in Multi-Cloud Environments Cover@2x
API SecuritySeptember 9, 2021

As more and more companies move to a multi-cloud strategy and increase usage of a cloud native infrastructure , API providers are under a lot of pressure to deliver APIs at scale in multi-cloud environments. At the same time, APIs should follow each company's security requirements and best…

Nima Moghadam

Setting Access Control Policies With Kong and Okta

Kong and Okta Access Control Policies with OpenID Connect
API SecurityJune 24, 2021

In our last Kong and Okta tutorial, we will implement a basic access control policy based on Okta’s groups and planes. This series will show you how to implement service authentication and authorization for Kong Konnect and Okta using the OpenID Connect ( OIDC ) plugin. Parts 1, 2 and 3…

Claudio Acquaviva

Implementing Introspection Flow With Kong and Okta

Kong and Okta Introspection Flow
API SecurityJune 10, 2021

In our third Kong and Okta tutorial, we'll go through the introspection flow implementation. This series will show you how to implement service authentication and authorization for Kong Konnect and Okta using the OpenID Connect ( OIDC ) plugin. Parts 1, 2 and 4 cover: [iframe loading="lazy"…

Claudio Acquaviva

Protect Your Services With Kong Gateway Key Authentication

Kong Gateway Key Authentication
API AuthenticationMay 25, 2021

This tutorial will walk through a common use case for the Kong Gateway Key Authentication plugin : using API key authentication to protect a route to an API server endpoint. It’s a simple use case, but it will give you the foundation to deploy and configure the plugin for your own unique project…

Aapo Talvensaari

Implementing Client Credentials With Kong and Okta

Kong Konnect and Okta Post #1
API AuthenticationMay 13, 2021

Using Kong's OpenID Connect (OIDC) plugin, Kong and Okta work together to solve three significant application development challenges: The OIDC plugin enables Kong, as the API gateway , to communicate with Okta via the OAuth/OIDC flows. That way, your app teams don't have to configure and diagnose…

Claudio Acquaviva

Authorizing Microservice APIs With OPA and Kuma

Authorizing Microservices with OPA and Kuma
KumaMarch 16, 2021

Many companies are leveraging DevOps, microservices , automation, self-service, cloud and CI/CD pipelines. These megatrends are changing how companies are building and running software. One thing that often slips through the cracks is security. With microservices, there's an increase in the number…

Tim Hinrichs
‹Prev123Next›

See AI Gateway in Action

Secure your AI infrastructure with prompt guards, PII sanitization, and centralized governance. Control LLM costs with token-based rate limiting and semantic routing across providers.

Get a Demo
Powering the API world

Increase developer productivity, security, and performance at scale with the unified platform for API management, AI gateways, service mesh, and ingress controller.

Sign up for Kong newsletter

    • Platform
    • Kong Konnect
    • Kong Gateway
    • Kong AI Gateway
    • Kong Insomnia
    • Developer Portal
    • Gateway Manager
    • Cloud Gateway
    • Get a Demo
    • Explore More
    • Open Banking API Solutions
    • API Governance Solutions
    • Istio API Gateway Integration
    • Kubernetes API Management
    • API Gateway: Build vs Buy
    • Kong vs Postman
    • Kong vs MuleSoft
    • Kong vs Apigee
    • Documentation
    • Kong Konnect Docs
    • Kong Gateway Docs
    • Kong Mesh Docs
    • Kong AI Gateway
    • Kong Insomnia Docs
    • Kong Plugin Hub
    • Open Source
    • Kong Gateway
    • Kuma
    • Insomnia
    • Kong Community
    • Company
    • About Kong
    • Customers
    • Careers
    • Press
    • Events
    • Contact
    • Pricing
  • Terms
  • Privacy
  • Trust and Compliance
  • © Kong Inc. 2026