
# API Authorization
The latest news and announcements about Kong, our products, and our ecosystem, as well as voices from across our community.

## All API Authorization Videos

[Videos](/resources/videos)Videos[API Authorization](/resources/videos/api-authorization)API Authorization
[__Federated Data Authorization using Semantic Policies
__](/resources/videos/semantic-authorization-for-consistent-data-access)__Federated Data Authorization using Semantic Policies
__[](/resources/videos/semantic-authorization-for-consistent-data-access)
[__
Authorization for Cloud Native Apps | Tim Hinrichs | Styra
__](/resources/videos/authorization-cloud-native)__Authorization for Cloud Native Apps | Tim Hinrichs | Styra
__[](/resources/videos/authorization-cloud-native)
[__
Okta and Kong: Integrate Identity into your APIs
__](/resources/videos/okta-and-kong-integrate-identity-into-your-apis)__Okta and Kong: Integrate Identity into your APIs
__[](/resources/videos/okta-and-kong-integrate-identity-into-your-apis)
[__
Fireside Chat: Implementing Authorization for Cloud Native Applications
__](/resources/videos/fireside-chat-implementing-authorization-for-cloud-native-applications)__Fireside Chat: Implementing Authorization for Cloud Native Applications
__[](/resources/videos/fireside-chat-implementing-authorization-for-cloud-native-applications)
[__
Okta and Kong Konnect Part 4: Access Control Policies
__](/resources/videos/okta-kong-konnect-part-4)__Okta and Kong Konnect Part 4: Access Control Policies
__[](/resources/videos/okta-kong-konnect-part-4)
[__
Okta and Kong Konnect Part 3: Introspection Flow
__](/resources/videos/okta-kong-konnect-part-3)__Okta and Kong Konnect Part 3: Introspection Flow
__[](/resources/videos/okta-kong-konnect-part-3)
[Videos](/resources/videos)Videos[API Authorization](/resources/videos/api-authorization)API Authorization
[__Okta and Kong Konnect Part 2: Applying Authorization Code Flow
__](/resources/videos/okta-kong-konnect-part-2)__Okta and Kong Konnect Part 2: Applying Authorization Code Flow
__[](/resources/videos/okta-kong-konnect-part-2)
[__
Okta and Kong Konnect Part 1: Implementing Client Credentials
__](/resources/videos/okta-kong-konnect-part-1)__Okta and Kong Konnect Part 1: Implementing Client Credentials
__[](/resources/videos/okta-kong-konnect-part-1)
[__
Microservice Authorization with Open Policy Agent and Kuma
__](/resources/videos/microservice-authorization-with-open-policy-agent-and-kuma-2)__Microservice Authorization with Open Policy Agent and Kuma
__[](/resources/videos/microservice-authorization-with-open-policy-agent-and-kuma-2)
[__
Embracing Change: Policy-As-Code for Kubernetes With OPA and Gatekeeper
__](/resources/videos/embracing-change-policy-as-code-for-kubernetes-with-opa-and-gatekeeper)__Embracing Change: Policy-As-Code for Kubernetes With OPA and Gatekeeper
__[](/resources/videos/embracing-change-policy-as-code-for-kubernetes-with-opa-and-gatekeeper)
[Videos](/resources/videos)Videos[API Authentication](/resources/videos/api-authentication)API Authentication
[__