February 7, 2022 Enterprise | < 1 MIN READ Simplifying Authentication for Microservices Security In this episode of Kongcast, Jeff Taylor, senior product manager at Okta, tells and shows us how to speed up microservices security and take the burden off developers by managing… Continue reading
June 24, 2021 Engineering | 4 MIN READ Setting Access Control Policies With Kong and Okta In our last Kong and Okta tutorial, we will implement a basic access control policy based on Okta’s groups and planes. This series will show you how to implement service… Continue reading
June 10, 2021 Engineering | 4 MIN READ Implementing Introspection Flow With Kong and Okta In our third Kong and Okta tutorial, we’ll go through the introspection flow implementation. This series will show you how to implement service authentication and authorization for Kong Konnect and… Continue reading
May 27, 2021 Engineering | 4 MIN READ Applying Authorization Code Flow With Kong and Okta In our second Kong and Okta tutorial, we’ll go through the authorization code flow applied to user authentication processes. This series will show you how to implement service authentication and… Continue reading
May 13, 2021 Engineering | 5 MIN READ Implementing Client Credentials With Kong and Okta Using Kong’s OpenID Connect (OIDC) plugin, Kong and Okta work together to solve three significant application development challenges: Connectivity Authentication Authorization The OIDC plugin enables Kong, as the API gateway,… Continue reading
February 25, 2021 Engineering | 6 MIN READ Getting Started With Kong’s OpenID Connect Plugin The concept of zero-trust security is relatively simple. In essence, no entity or system should have trust by default. You should assume that any system you are talking to is… Continue reading