Systems | Development | Analytics | API | Testing

Kong

Demonstrating Proof-of-Possession (DPoP): Preventing Illegal Access of APIs

In a previous blog post, we discussed the prevalence of bearer tokens (or access tokens) to restrict access to protected resources, the challenges the sheer nature of bearer tokens present, and available mitigations. To recap, presenting a bearer token is proof enough of an authorization grant to avail the service and access resources protected by the token. This poses many security risks such as using stolen or leaked tokens to gain unauthorized access.

Kong Konnect Demo: Revolutionize Your API Management with a Unified Cloud-Native Platform

Kong Konnect Demo: Revolutionize Your API Management with a Unified Cloud-Native Platform In this video, Vice President Product Management, Ross Kukulinski showcases how Kong Konnect addresses the challenges of API security, multi-cloud deployments, and AI workload governance. Kong Konnect is one platform to manage them all in one unified control plane: API gateways, AI gateways, ingress, and service meshes.

How to Quickly Deploy Kong Gateways in Konnect Docker, Serverless, and Kubernetes

How to Quickly Deploy Kong Gateways in Konnect Docker, Serverless, and Kubernetes In this video, Senior Director, Developer Relations, Michael Heap, walks through three efficient ways to deploy Kong Gateway with Konnect. Learn how to get started with Kong Gateway using Docker on your local machine, how to make your gateway publicly accessible using a Serverless Gateway, and how to set up a production deployment on Kubernetes (Amazon EKS).

Enhancing Resilience: Introducing Fallback Configurations in Kong Ingress Controller 3.2

As Kong Ingress Controller is used widely in the field, ensuring its reliable and resilient error handling is crucial to us. Kong Ingress Controller 3.2 introduces a Fallback Configuration feature, designed to make sure a single mistake made in your manifests doesn't halt the whole configuration update pipeline. In this User Call, we'll cover: The Need for the Feature: Understand the critical scenarios that highlighted the necessity for improved error-handling mechanisms.

Lessons We Learned Implementing a Design System at Kong

In this article, we'll talk about our experience implementing a design system at Kong. We'll go over the reasons why we decided we needed one in the first place, where we started, and how we got to where we are today. We'll also cover the technology we used and how it has transformed software development at Kong. Whether you have plenty of experience with design systems or are looking to get started with one, we hope you will find this article helpful and informative.

3 Strategies to Supercharge Developer Operational Efficiency

Developer operational efficiency is crucial for streamlining API management processes and empowering development teams to work more effectively. In this blog post, we'll explore three key tips to unlock developer operational efficiency — leveraging API documentation and self-service credential management, automating API lifecycle management, and optimizing resources and performance — using Kong Konnect and Kong Kubernetes Ingress Controller (KIC).

3 Powerful Extensions to Improve Security and Get the Most Out of Kong

OAuth 2.0 is the current gold standard for secure delegated authorization. The reason is simple: OAuth puts control back in the hands of the users. It enables users to securely grant access to their resources without having to share passwords with third-party applications. Hence, it's one of the most widely adopted standards in the industry.

Meet Kong Konnect, Your API Command Center

Build new products faster, improve security, and reduce costs with Kong Konnect. Kong Konnect is one platform to manage them all in one unified control plane: API gateways, AI gateways, ingress, and service meshes. So you can move fast without losing control. That means scaling up to meet demand — and exceeding customer expectations with superior digital experiences. Deployed as a hybrid or a fully managed service, Kong Konnect automates security, federates governance, and lets you adopt AI faster with multi-LLM support.