
Role-based Access Control
Secure your services with Role-based Access Control (RBAC)
Overview
Role-based Access Controls make it easy to grant and restrict access to Kong users and developers. By defining specific roles, Kong customers can define how a given individual or group of individuals can interact with Kong and the services exposed through the Kong platform. RBAC can restrict what users can change or view within Kong Manager and the Kong Developer Portal.

“With Kong, we knew that we would get something that would work perfectly with our technology today and set us up for where we want to go with microservices.”
Kanaderu Fukuda,
Senior Manager of Computing Platform, Yahoo! Japan

“As we evaluated API platforms, it was critical that the vendor we chose could simultaneously support our existing services in the public cloud with what we are building in Kubernetes. Kong offered us the ability to unify services across clouds, which gave us the flexibility to build new services iteratively and how we wanted without fear of cloud lock-in.”
Jason Rodriguez,
VP of Engineering at SoulCycle

“We put Agile, DevOps and CI/CD at the heart of everything we do, and we realized that we needed new tooling to match the new ways we wanted to build products and services”
Jason Walker,
Sr Enterprise Architect, Cargill
Benefits
Increase Compliance
Better comply with local, state and federal regulations by restricting how Kong can be accessed and used. Reduce the likelihood of violations for regulations such as HIPAA, the GDRP, and more by limiting access to sensitive services and data.
Reduce Onboarding Friction
Grant appropriate access privileges automatically by assigning a role during the onboarding process. Implement RBAC across entire workspaces to limit what teams, partners, and other stakeholders can see or access.
Enforce Standards
Implement RBAC to reduce risk of disruption or breaches. Empower team leaders to manage their entire development pipeline and proactively address production issues. Improve development efficiency by mandating workflow standards.
Related Resources
Webinar
Microservices: The Journey and 3 Challenges You Will Uncover Along the Way
Webinar
Full Lifecycle Service Management with Kong Enterprise 2020

Want to learn more?
Request a demo, free trial or talk to our experts to answer your questions and explore your needs.