
# API Authentication
Secure your APIs with confidence. Explore methods, protocols, and best practices for implementing robust authentication—from OAuth and JWT to zero-trust architectures—across modern API ecosystem

## All API Authentication Videos

[__
Okta and Kong: Integrate Identity into your APIs
__](/resources/videos/okta-and-kong-integrate-identity-into-your-apis)__Okta and Kong: Integrate Identity into your APIs
__[](/resources/videos/okta-and-kong-integrate-identity-into-your-apis)
[Videos](/resources/videos)Videos[API Authentication](/resources/videos/api-authentication)API Authentication
[__Zero Trust for APIs: Securing Userless APIs with Multi-Factor Authentication
__](/resources/videos/zero-trust-for-apis-securing-userless-apis-with-multi-factor-authentication)__Zero Trust for APIs: Securing Userless APIs with Multi-Factor Authentication
__[](/resources/videos/zero-trust-for-apis-securing-userless-apis-with-multi-factor-authentication)
[Videos](/resources/videos)Videos[API Authentication](/resources/videos/api-authentication)API Authentication
[__How to Use the Kong Gateway Key Authentication Plugin
__](/resources/videos/kong-gateway-key-authentication)__How to Use the Kong Gateway Key Authentication Plugin
__[](/resources/videos/kong-gateway-key-authentication)
[__
Okta and Kong Konnect Part 4: Access Control Policies
__](/resources/videos/okta-kong-konnect-part-4)__Okta and Kong Konnect Part 4: Access Control Policies
__[](/resources/videos/okta-kong-konnect-part-4)
[__
Okta and Kong Konnect Part 3: Introspection Flow
__](/resources/videos/okta-kong-konnect-part-3)__Okta and Kong Konnect Part 3: Introspection Flow
__[](/resources/videos/okta-kong-konnect-part-3)
[__
Okta and Kong Konnect Part 1: Implementing Client Credentials
__](/resources/videos/okta-kong-konnect-part-1)__Okta and Kong Konnect Part 1: Implementing Client Credentials
__[](/resources/videos/okta-kong-konnect-part-1)
[Videos](/resources/videos)Videos[API Authentication](/resources/videos/api-authentication)API Authentication
[__Use Kong Gateway to Centralize Authentication with Okta
__](/resources/videos/use-kong-gateway-to-centralize-authentication-with-okta)__Use Kong Gateway to Centralize Authentication with Okta
__[](/resources/videos/use-kong-gateway-to-centralize-authentication-with-okta)
[__
Embracing Change: Policy-As-Code for Kubernetes With OPA and Gatekeeper
__](/resources/videos/embracing-change-policy-as-code-for-kubernetes-with-opa-and-gatekeeper)__Embracing Change: Policy-As-Code for Kubernetes With OPA and Gatekeeper
__[](/resources/videos/embracing-change-policy-as-code-for-kubernetes-with-opa-and-gatekeeper)
[Videos](/resources/videos)Videos[API Authentication](/resources/videos/api-authentication)API Authentication
[__Demo: API Authentication and Authorization
__](/resources/videos/demo-api-authentication-and-authorization)__Demo: API Authentication and Authorization
__[](/resources/videos/demo-api-authentication-and-authorization)
[__
Learnings from CNCF’s Envoy and OPA Creators Matt Klein and Tim Hinrichs
__](/resources/videos/learnings-from-cncfs-envoy-and-opa-creators-matt-klein-and-tim-hinrichs)__Learnings from CNCF’s Envoy and OPA Creators Matt Klein and Tim Hinrichs
__[](/resources/videos/learnings-from-cncfs-envoy-and-opa-creators-matt-klein-and-tim-hinrichs)
[Videos](/resources/videos)Videos[API Authentication](/resources/videos/api-authentication)API Authentication
[__