Role-based Access Control
Secure your services with Role-based Access Control (RBAC)
“With Kong, we knew that we would get something that would work perfectly with our technology today and set us up for where we want to go with microservices.”
Senior Manager of Computing Platform, Yahoo! Japan
“As we evaluated API platforms, it was critical that the vendor we chose could simultaneously support our existing services in the public cloud with what we are building in Kubernetes. Kong offered us the ability to unify services across clouds, which gave us the flexibility to build new services iteratively and how we wanted without fear of cloud lock-in.”
VP of Engineering at SoulCycle
“We put Agile, DevOps and CI/CD at the heart of everything we do, and we realized that we needed new tooling to match the new ways we wanted to build products and services”
Sr Enterprise Architect, Cargill
Better comply with local, state and federal regulations by restricting how Kong can be accessed and used. Reduce the likelihood of violations for regulations such as HIPAA, the GDRP, and more by limiting access to sensitive services and data.
Reduce Onboarding Friction
Grant appropriate access privileges automatically by assigning a role during the onboarding process. Implement RBAC across entire workspaces to limit what teams, partners, and other stakeholders can see or access.
Implement RBAC to reduce risk of disruption or breaches. Empower team leaders to manage their entire development pipeline and proactively address production issues. Improve development efficiency by mandating workflow standards.
Running Mission-Critical Microservices & APIs on Kong Enterprise
Microservices: The Journey and 3 Challenges You Will Uncover Along the Way
Blowing Up the Monolith
Full Lifecycle Service Management with Kong Enterprise 2020
Want to learn more?
Request a demo, free trial or talk to our experts to answer your questions and explore your needs.