REGISTER NOW FOR THE KONG AGENTIC ERA WORLD TOUR GOVERN A2A TRAFFIC WITH KONG'S NEW AGENT GATEWAY WHY GARTNER’S “CONTEXT MESH” CHANGES EVERYTHING DON’T MISS API + AI SUMMIT 2026 SEPT 30 – OCT 1
    • Explore the unified API Platform
        • BUILD APIs
        • [
          Kong Insomnia](/en-gb/products/kong-insomnia)
          Kong Insomnia
        • [
          API Design](/en-gb/products/kong-insomnia/api-design)
          API Design
        • [
          API Testing and Debugging](/en-gb/products/kong-insomnia/api-testing-and-debugging)
          API Testing and Debugging
        • RUN APIs
        • [
          API Gateway](/en-gb/products/kong-gateway)
          API Gateway
        • [
          AI Gateway](/en-gb/products/kong-ai-gateway)
          AI Gateway
        • [
          Event Gateway](/en-gb/products/event-gateway)
          Event Gateway
        • [
          Kubernetes Operator](/products/kong-gateway-operator)
          Kubernetes Operator
        • [
          Service Mesh](/en-gb/products/kong-mesh)
          Service Mesh
        • [
          Ingress Controller](/en-gb/products/kong-ingress-controller)
          Ingress Controller
        • [
          Runtime Management](/products/kong-konnect/features/runtime-management)
          Runtime Management
        • DISCOVER APIs
        • [
          Developer Portal](/en-gb/products/kong-konnect/features/developer-portal)
          Developer Portal
        • [
          Service Catalog](/en-gb/products/kong-konnect/features/api-service-catalog)
          Service Catalog
        • GOVERN APIs
        • [
          Analytics](/products/kong-konnect/features/advanced-analytics)
          Analytics
        • [
          APIOps and Automation](/en-gb/products/apiops-automation)
          APIOps and Automation
        • [
          API Observability](/en-gb/products/kong-konnect/features/api-observability)
          API Observability
        • [Why Kong?](/en-gb/company/why-kong)Why Kong?
      • CLOUD
      • [Cloud API Gateways](/products/kong-konnect/features/dedicated-cloud-gateways)Cloud API Gateways
      • [Need a self-hosted or hybrid option?](/products/kong-enterprise)Need a self-hosted or hybrid option?
      • COMPARE
      • [Kong vs. Postman](/en-gb/performance-comparison/kong-vs-postman)Kong vs. Postman
      • [Kong vs. MuleSoft](/en-gb/performance-comparison/kong-vs-mulesoft)Kong vs. MuleSoft
      • [Kong vs. Apigee](/en-gb/performance-comparison/kong-vs-apigee)Kong vs. Apigee
      • [Kong vs. IBM](/performance-comparison/ibm-api-connect-vs-kong)Kong vs. IBM
      • GET STARTED
      • [Sign Up for Kong Konnect](/products/kong-konnect/register)Sign Up for Kong Konnect
      • [Documentation](https://developer.konghq.com/)Documentation
      • FOR PLATFORM TEAMS
      • [Developer Platform](/en-gb/solutions/building-developer-platform)Developer Platform
      • [Kubernetes and Microservices](/en-gb/solutions/build-on-kubernetes)Kubernetes and Microservices
      • [Observability](/en-gb/solutions/observability)Observability
      • [Service Mesh Connectivity ](/solutions/service-mesh-connectivity)Service Mesh Connectivity
      • [Kafka Event Streaming](/en-gb/solutions/kafka-stream-api-management)Kafka Event Streaming
      • FOR EXECUTIVES
      • [Open Banking](/en-gb/solutions/open-banking)Open Banking
      • [Legacy Migration](/en-gb/solutions/legacy-api-management-migration)Legacy Migration
      • [Platform Cost Reduction](/en-gb/solutions/api-platform-consolidation)Platform Cost Reduction
      • [Kafka Cost Optimization](/en-gb/solutions/reduce-kafka-cost)Kafka Cost Optimization
      • [Real-time Business](/solutions/real-time-business)Real-time Business
      • [API Productization](/solutions/api-productization)API Productization
      • FOR AI TEAMS
      • [AI Governance](/en-gb/solutions/ai-governance)AI Governance
      • [AI Security](/en-gb/solutions/ai-security)AI Security
      • [AI Cost Control](/en-gb/solutions/ai-cost-optimization-management)AI Cost Control
      • [Agentic AI](/solutions/agentic-ai-workflows)Agentic AI
      • [MCP Traffic Gateway](/en-gb/solutions/mcp-governance)MCP Traffic Gateway
      • FOR DEVELOPERS
      • [Mobile App API Development](/en-gb/solutions/mobile-application-api-development)Mobile App API Development
      • [GenAI App Development](/solutions/power-openai-applications)GenAI App Development
      • [API Gateway for Istio](/solutions/istio-gateway)API Gateway for Istio
      • [Decentralized Load Balancing](/solutions/decentralized-load-balancing)Decentralized Load Balancing
      • BY INDUSTRY
      • [Financial Services](/en-gb/solutions/financial-services-industry)Financial Services
      • [Healthcare](/en-gb/solutions/healthcare)Healthcare
      • [Higher Education](/solutions/api-platform-for-education-services)Higher Education
      • [Insurance](/en-gb/solutions/insurance)Insurance
      • [Manufacturing](/en-gb/solutions/manufacturing)Manufacturing
      • [Retail](/en-gb/solutions/retail)Retail
      • [Software & Technology](/en-gb/solutions/software-and-technology)Software & Technology
      • [Transportation](/en-gb/solutions/transportation-and-logistics)Transportation
      • [See all Solutions](/en-gb/solutions)See all Solutions
  • [Customers](/customers)Customers
      • Documentation
      • [Kong Konnect](https://developer.konghq.com/konnect/)Kong Konnect
      • [Kong Gateway](https://developer.konghq.com/gateway/)Kong Gateway
      • [Kong Mesh](https://developer.konghq.com/mesh/)Kong Mesh
      • [Kong AI Gateway](https://developer.konghq.com/ai-gateway/)Kong AI Gateway
      • [Kong Insomnia](https://developer.konghq.com/insomnia/)Kong Insomnia
      • [Plugin Hub](https://developer.konghq.com/plugins/)Plugin Hub
      • Explore
      • [Blog](/en-gb/blog)Blog
      • [Learning Center](/en-gb/blog/learning-center)Learning Center
      • [eBooks](/resources/e-book)eBooks
      • [Reports](/resources/reports)Reports
      • [Demos](/resources/demos)Demos
      • [Case Studies](/resources/case-study)Case Studies
      • [Videos](/resources/videos)Videos
      • Events
      • [API Summit](/events/conferences/api-summit)API Summit
      • [Webinars](/events/webinars)Webinars
      • [User Calls](/events/user-calls)User Calls
      • [Workshops](/events/workshops)Workshops
      • [Meetups](/events/meetups)Meetups
      • [See All Events](/events)See All Events
      • For Developers
      • [Get Started](https://developer.konghq.com/)Get Started
      • [Community](/community)Community
      • [Certification](/academy/certification)Certification
      • [Training](https://education.konghq.com)Training
  • [Pricing](/pricing)Pricing
  • [](/search)
  • [Login](https://cloud.konghq.com/login)Login
  • [Get a Demo](/contact-sales)Get a Demo
  • [Start for Free](/products/kong-konnect/register)Start for Free
[Blog](/blog)Blog
  • [AI Gateway](/blog/tag/ai-gateway)AI Gateway
  • [AI Security](/blog/tag/ai-security)AI Security
  • [AIOps](/blog/tag/aiops)AIOps
  • [API Security](/blog/tag/api-security)API Security
  • [API Gateway](/blog/tag/api-gateway)API Gateway
|
    • [API Management](/blog/tag/api-management)API Management
    • [API Development](/blog/tag/api-development)API Development
    • [API Design](/blog/tag/api-design)API Design
    • [Automation](/blog/tag/automation)Automation
    • [Service Mesh](/blog/tag/service-mesh)Service Mesh
    • [Insomnia](/blog/tag/insomnia)Insomnia
    • [Event Gateway](/blog/tag/event-gateway)Event Gateway
    • [View All Blogs](/blog/page/1)View All Blogs
We're Entering the Age of AI Connectivity [Read more](/blog/news/the-age-of-ai-connectivity)Read moreProducts & Agents:
    • [Kong AI Gateway](/products/kong-ai-gateway)Kong AI Gateway
    • [Kong API Gateway](/products/kong-gateway)Kong API Gateway
    • [Kong Event Gateway](/products/event-gateway)Kong Event Gateway
    • [Kong Metering & Billing](/products/usage-based-metering-and-billing)Kong Metering & Billing
    • [Kong Insomnia](/products/kong-insomnia)Kong Insomnia
    • [Kong Konnect](/products/kong-konnect)Kong Konnect
  • [Documentation](https://developer.konghq.com)Documentation
  • [Book Demo](/contact-sales)Book Demo
  1. Home
  2. Blog
  3. Learning Center
  4. What are API Keys? Overview and Use Cases
[Learning Center](/blog/learning-center)Learning Center
May 22, 2023
7 min read

# What are API Keys? Overview and Use Cases

Eric Pulsifer
Content @ Kong

Application programming interfaces (APIs) allow software to communicate and share data. But how can those APIs confirm the identity of the clients theyre communicating with? API keys are one solution.

API keys are unique codes for authenticating and authorizing access to the features, data, or resources offered up by an API. These keys allow builders and businesses to maintain control and monitor access over services and ensure security.

In this post, well further explain what API keys are, what they're used for, the types of API keys, and how to generate an API key.

## What is an API key?

API keys are one of those great tech terms that are pretty well defined by the term itself. An API key can be thought of as an ID (or, dare we say, a key) for accessing an API. It can prevent unauthorized access to the potentially sensitive info applications might want to share with other applications.

The API key is usually a string of letters and numbers transmitted with the API call. Unlike a real ID, these keys can identify requests but not the users themselves.

## What are API keys used for?

[APIs](https://konghq.com/blog/learning-center/what-is-api)APIs may use API keys for security purposes as well as for [monitoring or limiting usage](https://konghq.com/blog/learning-center/what-is-api-monitoring)monitoring or limiting usage.

The API key authenticates the client making a request. It also provides authorization letting the API know if the requesting application is allowed to use the API and what it can access.

Some common use cases for API keys include:

  • -

    Security API keys can offer an extra layer of security for an API, better locking down data shared between API and client.

  • -

    Access control With API keys, developers can make sure only authorized users have access to data or resources provided by an API.

  • -

    Tracking and billing API keys can be useful in tracking and monitoring API usage. This information may be used for billing purposes or to keep tabs on (or enforce) rate limits.

  • -

    Integration API keys can be used to integrate services or software so they can more freely communicate.

Overall, API keys play a part in software development by helping to ensure APIs are secure and used efficiently and responsibly.

## Advantages of using API Keys

API keys offer a simple, effective solution for controlling, monitoring and securing access to applications and their data or resources. They also are enablers for creating new, innovative applications. The advantages of using API keys include security, access control, monitoring, usage tracking, and integration.

Let's take a bit of a deeper dive into a few of the big advantages.

### Improved Security

API keys can offer an extra layer of security that gives developers and businesses control and visibility into the access of services, data, or resources.

  • -

    Authentication API keys can authenticate access to an API. When used this way, they can make sure that only properly authorized parties or applications have access to APIs and they can revoke access as needed. With this approach, sensitive data is better protected from unauthorized access.

  • -

    Authorization If you want to authorize access to certain resources or data, API keys can help by controlling access.

  • -

    Monitoring Looking to detect (and prevent) malicious activity? API keys can help by allowing you to monitor API usage. When done properly, this can help organizations respond more quickly to potential security breaches.

Rate limiting With API keys, you can enforce rate limits to ensure APIs are used properly and efficiently and avoid denial-of-service (DoS) attacks.

### Improved Performance

API keys can help with application performance by optimizing API usage, which can help with ensuring applications are responsive, scalable, and efficient.

  • -

    Caching You can enable caching of the data from an API with API keys. Doing this allows developers to minimize the number of API requests and boost application performance by accessing cached data rather than making unnecessary new API requests.

  • -

    Load balancing API keys can be used to balance API requests across servers or instances. This can reduce server load and enable greater scalability.

  • -

    Monitoring Performance monitoring can help developers identify bottlenecks and drive optimization.

Rate limiting Beyond the security benefits of rate limiting touched on above, rate limiting with API keys also allows you to avoid overloading APIs, which can improve application performance.

### Increased Flexibility

Developer flexibility can also be improved thanks to API keys in a few different ways.

  • -

    Customization Developers can create API keys that offer unique access per each key. This customization helps control API access for users or applications.

  • -

    Integration API keys can be used by developers to connect other APIs, allowing for integrated cross-application exchange of data and functionality.

  • -

    Testing API keys can test API performance and functionality before theyre deployed to production.

  • -

    Versioning By creating unique API keys for different versions of an API, developers can modify APIs without impacting existing applications.

## What are the types of API keys?

There are many types of API keys. The type used will vary depending on the use case and security requirements. Selecting the right type of API key helps protect sensitive data and minimizes unauthorized access.

  • -

    Public API keys These are most often used for read-only access to public data. These may be embedded in client-side applications.

  • -

    Secret API keys These are used for access to sensitive data (and may include write access). As the name implies, these are secret and shouldn't be shared publicly. These are often found in server-side applications.

  • -

    JWT-based API keys These use JSON Web Tokens (JTWs) for API-access authentication and authorization (most typically in modern web applications).

  • -

    Session-based API keys These are temporary keys used to grant access for a short session before expiring.

  • -

    Scoped API keys These are used to limit the features or resources offered by an API to control access.

### Client-side API keys vs server-side API keys

Client-side API keys and server-side API keys are used in different places and secured in different ways.

Client-side keys are used in client-side applications (as the name implies) to access public data or handle read-only operations. These API keys are exposed to users and applications and aren't intended to be kept secret. They're regularly used for rate limiting or caching.

Server-side API keys are used in you guessed it server-side applications or command-line tools. These keys can be used to perform write operations or access sensitive data. These keys are considered more secure as they are kept secret, not exposed to end-users, and are often used for authentication and authorization.

Choosing between server-side and client-side API keys depends on your use case and your APIs security requirements. For public data or read-only operations, client-side API keys can be great, but for sensitive data or write operations, server-side API keys are the way to go.

## How to generate an API key

When it comes to generating an API, the process depends on the API platform or service you're using. Typically this will involve logging into the service and the appropriate section or setting, selecting the type of key you want to generate, naming or offering a descriptor for the key, and then copying and storing the key in a password manager or encrypted file.

As with physical keys, it's important to keep API keys secure. That means you probably don't want to be sharing them publicly and ideally will store them in a safe location and rotate them from time to time to help minimize the risk of any unauthorized access.

## FAQs About API Keys

**What are API keys?**

An API key is a unique code used for authenticating and authorizing access to API features, data, or resources. It acts like an ID for accessing an API and helps prevent unauthorized access to sensitive information that applications might share.

**What are API key use cases?**

API keys serve multiple purposes including security, access control, usage tracking and billing, and service integration. They authenticate clients making requests and provide authorization for accessing specific API features.

**What are the main types of API keys?**

There are several types of API keys:

  • - Public API keys - Used for read-only access to public data
  • - Secret API keys - Used for accessing sensitive data
  • - JWT-based API keys - Use JSON Web Tokens for authentication
  • - Session-based API keys - Temporary keys that expire after a session
  • - Scoped API keys - Limited to specific features or resources

**What are the advantages of using API keys?**

API keys offer several benefits:

  • - Improved security through authentication and authorization
  • - Better performance through caching and load balancing
  • - Increased flexibility with customization and integration options
  • - Monitoring and usage tracking capabilities
  • - Rate limiting to prevent abuse

**What's the difference between client-side and server-side API keys?**

Client-side API keys are used in client-side applications for public data or read-only operations and are exposed to users. Server-side API keys are used in server-side applications, are kept secret, and are used for accessing sensitive data or performing write operations.

**How do I generate an API key?**

The process varies by platform but typically involves logging into the service, navigating to the appropriate settings section, selecting the key type, naming the key, and storing it securely in a password manager or encrypted file.

#### Conclusion

In this post, we talked about what API keys are, how they are used, and the types of API keys you may come across.

These unique codes for authenticating and authorizing access to an APIs features, data, or resources. Using API keys (and using the right keys for the right use cases) is just one part of larger efforts to monitor access, maintain control, and ensure security.

- [API Management](/blog/tag/api-management)API Management- [API Authentication](/blog/tag/api-authentication)API Authentication- [API Authorization](/blog/tag/api-authorization)API Authorization

## More on this topic

_eBooks_

## Securing Web and Mobile Applications and APIs with Centralized Authorization and Authentication Policies

_Videos_

## Okta and Kong: Integrate Identity into your APIs

## See Kong in action

Accelerate deployments, reduce vulnerabilities, and gain real-time visibility. 

[Get a Demo](/contact-sales)Get a Demo
**Topics**
- [API Management](/blog/tag/api-management)API Management- [API Authentication](/blog/tag/api-authentication)API Authentication- [API Authorization](/blog/tag/api-authorization)API Authorization
Eric Pulsifer
Content @ Kong

Recommended posts

# Kong and Okta Deliver Best-in-Class Identity for API Management

[News](/blog)NewsNovember 18, 2021

As organizations look to accelerate their digital transformation initiatives, a couple of key trends are prevalent. First, there is a movement from monolithic to smaller cloud native microservices. Second, there is more pressure to innovate, resulti

Eric Gandhi
[](https://konghq.com/blog/news/kong-okta-identity-api-management)

# RBAC Explained: The Basics of Role-Based Access Control

[Learning Center](/blog)Learning CenterApril 14, 2025

As cybersecurity takes the main stage, organizations face a significant challenge: how do you strike a balance between maintaining a high level of security and ensuring employees have enough data access to perform their jobs properly?  Role-based ac

Kong
[](https://konghq.com/blog/learning-center/what-is-rbac)

# What is OAuth?

Kong Logo
[Learning Center](/blog)Learning CenterJanuary 26, 2023

OAuth (short for Open Authorization) is a popular, standardized API protocol that provides a secure way for services to quickly share resources for a seamless user experience. Examples of OAuth in action include giving a greeting card service acce

Kong
[](https://konghq.com/blog/learning-center/what-is-oauth)

# API Gateway Authentication

Kong Logo
[Learning Center](/blog)Learning CenterApril 19, 2022

API gateway authentication is an important way to control the data that is allowed to be transmitted using your APIs. What is an API Gateway? In essence, it authenticates that a particular consumer has permission to access the API, using a predefin

Kong
[](https://konghq.com/blog/learning-center/api-gateway-authentication)

# Understanding Microservices Authentication Services

Kong Logo
[Learning Center](/blog)Learning CenterMarch 10, 2022

The distributed setup of a microservice application not only increases the potential attack surface of your application but also adds a new layer of complexity to authentication, authorization and session management. Here, we explore the options ava

Kong
[](https://konghq.com/blog/learning-center/microservices-security-and-session-management)

# How to Implement Secure Access Control with OPA and Kong Gateway

[Engineering](/blog)EngineeringJanuary 8, 2025

Ensuring secure access to applications and APIs is critical. As organizations increasingly adopt microservices architectures and cloud native solutions, the need for robust, fine-grained access control mechanisms becomes paramount. This is where the

Raja Ravi Varman
[](https://konghq.com/blog/engineering/secure-access-control-with-opa-and-kong)

# Adopt a Zero Trust Approach with OAuth 2.0 Mutual TLS Client Authentication

[Engineering](/blog)EngineeringFebruary 19, 2024

In the modern IT stack, API gateways act as the first line of defense against attacks on backend services by enforcing authentication/authorization policies and validating and transforming requests. When backend services are protected with a token-b

Samuele Illuminati
[](https://konghq.com/blog/engineering/zero-trust-oauth-2-0-mtls-client-authentication)

## Ready to see Kong in action?

Get a personalized walkthrough of Kong's platform tailored to your architecture, use cases, and scale requirements.

[Get a Demo](/contact-sales)Get a Demo

## step-0

  • ## Company

    • [About Kong](/company/about-us)About Kong
    • [Customers](/customer-stories)Customers
    • [Careers](/company/careers)Careers
    • [Press](/company/press-room)Press
    • [Events](/events)Events
    • [Contact](/company/contact-us)Contact
    • [Pricing](/pricing)Pricing
      • Terms
      • Privacy
      • Trust and Compliance
  • ## Platform

    • [Kong AI Gateway](/products/kong-ai-gateway)Kong AI Gateway
    • [Kong Konnect](/products/kong-konnect)Kong Konnect
    • [Kong Gateway](/products/kong-gateway)Kong Gateway
    • [Kong Event Gateway](/products/event-gateway)Kong Event Gateway
    • [Kong Insomnia](/products/kong-insomnia)Kong Insomnia
    • [Documentation](https://developer.konghq.com)Documentation
    • [Book Demo](/contact-sales)Book Demo
  • ## Compare

    • [AI Gateway Alternatives](/performance-comparison/ai-gateway-alternatives)AI Gateway Alternatives
    • [Kong vs Apigee](/performance-comparison/kong-vs-apigee)Kong vs Apigee
    • [Kong vs IBM](/performance-comparison/ibm-api-connect-vs-kong)Kong vs IBM
    • [Kong vs Postman](/performance-comparison/kong-vs-postman)Kong vs Postman
    • [Kong vs Mulesoft](/performance-comparison/kong-vs-mulesoft)Kong vs Mulesoft
  • ## Explore More

    • [Open Banking API Solutions](/solutions/open-banking)Open Banking API Solutions
    • [API Governance Solutions](/solutions/api-governance)API Governance Solutions
    • [Istio API Gateway Integration](/solutions/istio-gateway)Istio API Gateway Integration
    • [Kubernetes API Management](/solutions/build-on-kubernetes)Kubernetes API Management
    • [API Gateway: Build vs Buy](/campaign/secure-api-scalability)API Gateway: Build vs Buy
    • [Kong vs Apigee](/performance-comparison/kong-vs-apigee)Kong vs Apigee
  • ## Open Source

    • [Kong Gateway](https://developer.konghq.com/gateway/install/)Kong Gateway
    • [Kuma](https://kuma.io/)Kuma
    • [Insomnia](https://insomnia.rest/)Insomnia
    • [Kong Community](/community)Kong Community

Kong enables the connectivity layer for the agentic era – securely connecting, governing, and monetizing APIs and AI tokens across any model or cloud.

  • English
  • Japanese
  • Frenchcoming soon
  • Spanishcoming soon
  • Germancoming soon
© Kong Inc. 2026
Interaction mode