Systems | Development | Analytics | API | Testing

API Platform and Data Mesh: Why Bring Them Together

Enterprises are investing in data mesh initiatives to accelerate how decisions are made and to create novel experiences based on machine learning models. Similarly, enterprises are investing in API platform initiatives to productize business domains (or bounded contexts in domain-driven design parlance) as self-service digital assets that accelerate innovation and improve business agility. Both initiatives are typically run as separate work streams.

In the Driver's Seat with Konnect - Uplevel Your API Management Strategy

Join Manjiri Tapaswi (Senior Software Engineer, Konnect at Kong) for a ride around your Konnect organization’s administrative management! Learn how to secure and govern your environment by setting up Teams and Roles, or enable SSO through an external authenticator. We’ll go over how to leverage System Accounts for hardening your automation and integrations. Tune up your security risks monitoring, compliance maintenance, and responding to potential security incidents when they occur, by setting up and tracking Audit Logs.

Zero Trust Security: The What, Why and How

If you’ve been researching API security, you’ve likely seen the term “Zero Trust.” And you may already know that organizations can use Zero Trust to help protect their APIs from attacks. What you may not know is that Zero Trust is one of the best models for API security. According to Microsoft, “96 percent of security decision-makers state that Zero Trust is critical to their organization’s success.” But what is Zero Trust exactly?

Understand the Differences: API Authentication vs API Authorization

If you landed on this blog post, chances are that you care about keeping your API secure. It’s an important topic to discuss: API exploits are on the rise, and you don’t want unauthorized users accessing your data. A big part of that security is implementing API authentication and API authorization. These API access control measures are a foundational aspect of API security.

Kong Konnect: A Developer's Guide

In this guide, Viktor Gamov (Principle Developer Advocate at Kong) will dive into the power of Kong Konnect, the SaaS managed control plane for Kong Gateway designed for seamless API management. We’ll explore how to use Kong Konnect to configure external services, enable application registration, configure Dev Portal, use credentials to manage services access, and replicate configurations across different environments with just a few clicks. Let’s get started!

GraphQL Authorization with Konnect, OPA and OIDC

🚀 Join us live to learn about how to implement authentication and authorization for GraphQL APIs using OIDC and OPA with Konnect! 🤝 This tutorial focuses on the solution that can solve for the Authentication and Authorization concerns at the gateway layer. We'll first authenticate users, and if authenticated, then the user’s fine-grain permissions will be evaluated to determine if the user has permission to run the incoming GraphQL request (whether the request is nested or using query variables).

Reworked Plugin Queues in Kong Gateway 3.3

Starting with the 3.3 release, Kong Gateway includes a new implementation of the internal queues that are used by several plugins to decouple the production of data in the proxy path and its submission to a receiving server, such as a log server. We’ll walk you through why queues are needed, why a new implementation was required, how the new implementation works and how queues are configured.

New Horizons with Kong Gateway 3.3 for Open Source

As API usage and dependence continue to grow, the need for a reliable, performant, and secure API gateway has become even more essential. Kong Gateway Open Source continues to be the world’s most adopted API gateway, setting the benchmark for performance, reliability, and observability. Today, we’re excited to unveil Kong Gateway 3.3 for Open Source, a release that once again elevates the API gateway experience to new heights.