Systems | Development | Analytics | API | Testing

How to Use Kong Gateway JWT Plugin

Authentication can be difficult, but with the Kong Gateway JWT Plugin, you can save time and resources without risking your API gateway security. In this video, we'll walk through how to secure a service (in this case, an API server) with Kong Gateway and its JWT plugin. We’ll cover all the steps to set up, configure and test the service — giving you the foundational knowledge needed to implement these tools independently.

How to Use Kong Gateway's JWT Plugin for Service Authentication

As you build and maintain more applications, your authentication strategy becomes increasingly important. It may also be top of mind for your boss since technology leaders cited “improve application security” as one of their top priorities in this year’s Digital Innovation Benchmark. The Kong Gateway JWT plugin is one strategy for API gateway authentication. JWT simplifies authentication setup, allowing you to focus more on coding and less on security.

15 Tips for Better Python Performance

Introduced in 1991, Python has grown to become a versatile and reliable programming language for modern computing requirements. Python is a powerful language used in web development, data science, software prototype creation, and much more. One of the best qualities of this language is it’s easy to learn and uniform across many use-cases.

New Leader to a Team? 3 Metrics for Delivering Value.

The President of the USA has a 100 days to prove himself. You only have 90 if you have taken over a new leadership position. If you can’t build a suitable positive new momentum during this time, there might be hard work ahead of you or your leadership might even be doomed to failure. — The First 90 Days: Proven Strategies for Getting Up to Speed Faster and Smarter

Insights from CollabraLink: Defining Culture-Driven Enterprise Risk Management

As young children, our parents do their best to protect us from harm. We’re taught not to play in the road or speak with strangers. As we grow and our environment changes, these foundational lessons guide us even when we are old enough to know better than to touch a hot stove.

Stitch vs. MuleSoft vs. Xplenty: Which ETL is the Winner?

Five differences between Stitch vs. MuleSoft vs. Xplenty: Organizations of all types need to pull data from disparate locations for data analysis. But the average company draws data from over 400 sources, making data integration difficult. Imagine if a technology could compile data from locations such as in-house databases, cloud-based apps, and SaaS and move it all into a centralized location. Extract, Transform, Load (ETL) makes this possible.

Optimizing your Software Development Life Cycle (SDLC) with APIs

Executing on your API strategy requires agile, iterative software development life cycles (SDLC) that are both responsive and provide a degree of structure and predictability to the way in which technology is deployed. Mature organizations that have mastered digital transformation have done so by leveraging the power of Application Programming Interfaces (APIs) within SDLC concepts to connect back-end data sources with front-end applications.

Kong vs. Dell Boomi: Find an API Management Platform That Works for You

As companies adopt more apps and microservices they need reliable ways for them to interact with each other and legacy systems. API management platforms offer the best way to open communication between diverse digital assets. As you explore API management platforms, you will probably learn about Kong and Dell Boomi.