Home Blog API Authorization RBAC Explained: The Basics of Role-Based Access Control
How to Implement Secure Access Control with OPA and Kong Gateway
Extensions to Improve Security and Get the Most Out of Kong
Managing Application Auth for Different Audiences
Adopt a Zero Trust Approach with OAuth 2.0 Mutual TLS Client Authentication
Understanding Microsegmentation in Zero Trust Security
Top GraphQL Security Vulnerabilities: Lessons Learned Analyzing 1,500+ Endpoints
What are API Keys? Overview and Use Cases
GraphQL Authorization at the API Gateway with Kong Konnect and OPA
What is OAuth?
API Gateway Authentication
Understanding Microservices Authentication Services
Generating Dynamic Signatures for API Authentication With Insomnia
Kong and Okta Deliver Best-in-Class Identity for API Management
Token-Based Access Control With Kong, OPA and Curity