Systems | Development | Analytics | API | Testing

Dynamic Routing Based on JWT Token's Claim with Kong Konnect

A common use case that is frequently requested is how to dynamically route requests based on authentication attributes. An example of this technique is routing requests to relevant upstream services based on claims contained in a JWT token. Admins would like all their clients to go to the same URI as it makes the implementation easier. But behind the scenes they might need to tailor specific configuration/applications for them, hence routing their request based on their identity.

Brad x Ahmed: Elements for Building Cloud Native Applications

From time to time, Kong’s Brad Drysdale and Ahmed Koshok exchange emails about the latest trends in tech. In this exchange, Brad and Ahmed discuss the continued quest for more innovation faster, the role of automation in API strategy, and more. from: Brad to: Ahmed date: Oct. 29, 2022, 6:58 PM subject: Elements for Building Cloud Native Applications Greetings from Australia, Ahmed!

What's Happening To Middleware In The Cloud-Native Era?

Spending two decades in the middleware field has given me deep insight into the evolution of this technology domain. I began my career as a software engineer in a platform group, building reusable components using technologies like object linking and embedding (OLE), the distributed component object model (DCOM) and common object request broker architecture (CORBA).

Managing Kuma Tokens with HashiCorp Vault

Managing tokens in Kuma can be a challenging and manual process. Both the user and dataplane token lifetimes need to be manually tracked and managed. This ultimately becomes a burden for DevOps, and long life tokens end up being used. In this session, you will learn how to: Kong Builders is a livestream series that takes our developer-focused toolsets and puts them on display in the best venue possible – building applications and connecting workloads.

4 Ways to Leverage User Metrics in Moesif

Without users, products mean nothing. So why is it that so many organizations analyze API and user behavior metrics as an afterthought? My theory would be that they just don’t have the right tools in place to actually collect, analyze, and use these usage metrics. With so many products aiming to improve their user experience and customer satisfaction, tools like Moesif are exactly what is needed.

New WSO2 Research Reveals Where Organisations Are Floundering to Successfully Digitise Services

While APIs are at the heart of digital transformation, 74% of survey respondents do not have a fully rolled out API strategy. 87% of respondents value open-source platforms combined with hybrid environments that deliver flexibility and enable deployment choices. 95% of respondents are experiencing challenges with their CIAM platform.

Kong Konnect Updates: Increased Security and Streamlined API Management

We’re excited to announce new features in Kong Konnect, including the ability to take advantage of identity management APIs, streamlined certificate management, and latency metrics as part of Analytics. Read on to learn about these features and how kong helps future-proof API security.

How PIM Integrations Benefits From ERP

Every system has different functions, some of them can be integrated to bring bigger solutions to businesses, specially for those that manage a big amount of data. In case of eCommerce businesses, information has to be integrated within many systems, such as ERP, so it will be accessible with in the company’s logistic processes.

Not All MFA is Created Equal, Especially in CIAM

Since October is cybersecurity awareness month, it’s a great time to revisit the question of what are the best ways to secure user authentication in CIAM. In many industries (finance and healthcare, to name a few), regulations require the use of multifactor authentication (MFA) to protect access to sensitive data and transactions.

The Power of Unlocking and Unifying Data

Every day, humans produce 2.5 quintillion bytes of data. Just to put that number into perspective, there are 18 zeros in a quintillion. Unifying data can allow you to take advantage of it and benefit your business. The vast majority of organizations have collected nearly endless amounts of data. Yet, these same organizations are starving for information that can be used to make more informed decisions. Information may be stored in databases that don’t talk to each other.