6 Apr 2021
As organizations adopt an API-first approach, there are many connectivity patterns to consider, and the developer experience needs to be excellent to promote adoption. It can be challenging to enforce API governance while enabling developers to build applications. This session recording covers how an organization can empower developers to use Kong securely, enable access control to the Kong API and Manager, enforce authentication/authorization in applications, and implement a zero-trust security model.
Manny Khadilkar will demonstrate the following topics:
• Automate configuration of Kong and deployment of an API.
• Enforce Access Control to Kong API Management.
• Enforce Authentication and Authorization to your application.
• Adopt a zero-trust security model.
For more information, view the blog post: https://bit.ly/3ujZDCY
Manny Khadilkar will demonstrate the following topics:
• Automate configuration of Kong and deployment of an API.
• Enforce Access Control to Kong API Management.
• Enforce Authentication and Authorization to your application.
• Adopt a zero-trust security model.
For more information, view the blog post: https://bit.ly/3ujZDCY
- 1 participant
- 22 minutes
16 Mar 2021
CEO of Syra Tim Hinrichs demonstrates how OPA and Kuma can be used for microservices API authorization. For more information, view the blog post: https://bit.ly/38GZUaI
- 2 participants
- 23 minutes
24 Feb 2021
With Kong OpenID Connect, you don't have to rewrite or maintain the code over and over for API gateway security. And that makes it faster for the developers of the upstream services to get their work done. For more information, view the blog post: https://bit.ly/3pSE2Pv
Check out all the recordings from this event: https://konghq.com/resources/?video-category=destination-zero-trust
Check out all the recordings from this event: https://konghq.com/resources/?video-category=destination-zero-trust
- 1 participant
- 14 minutes
8 Feb 2021
Join Kong CTO and Co-Founder Marco Palladino as he explores what zero-trust security is and why we need it and shows it in action with Kong Mesh, which is built on top of CNCF’s Kuma and Envoy.
Read the blog post here: https://bit.ly/3qWAUmV
Check out all the recordings from this event: https://konghq.com/resources/?video-category=destination-zero-trust
Read the blog post here: https://bit.ly/3qWAUmV
Check out all the recordings from this event: https://konghq.com/resources/?video-category=destination-zero-trust
- 1 participant
- 28 minutes