Role-based Access Control
Secure your services with Role-based Access Control (RBAC).
“With Kong, we knew that we would get something that would work perfectly with our technology today and set us up for where we want to go with microservices.”
Senior Manager of Computing Platform, Yahoo! Japan
“As we evaluated API platforms, it was critical that the vendor we chose could simultaneously support our existing services in the public cloud with what we are building in Kubernetes. Kong offered us the ability to unify services across clouds, which gave us the flexibility to build new services iteratively and how we wanted without fear of cloud lock-in.”
VP of Engineering at SoulCycle
“We put Agile, DevOps and CI/CD at the heart of everything we do, and we realized that we needed new tooling to match the new ways we wanted to build products and services”
Sr Enterprise Architect, Cargill
Better comply with local, state and federal regulations by restricting how Kong can be accessed and used. Reduce the likelihood of violations for regulations such as HIPAA, the GDRP, and more by limiting access to sensitive services and data.
Reduce Onboarding Friction
Grant appropriate access privileges automatically by assigning a role during the onboarding process. Implement RBAC across entire workspaces to limit what teams, partners, and other stakeholders can see or access.
Implement RBAC to reduce risk of disruption or breaches. Empower team leaders to manage their entire development pipeline and proactively address production issues. Improve development efficiency by mandating workflow standards.
Running Mission-Critical Microservices & APIs on Kong Enterprise
Want to learn more?
Take a test drive today.