Authentication

Protect your services with an authentication layer:

Basic Authentication

Basic Authentication

Add Basic Authentication to your APIs

Key Authentication

Key Authentication

Add a key authentication to your APIs

OAuth 2.0 Authentication

OAuth 2.0 Authentication

Add an OAuth 2.0 authentication to your APIs

HMAC Authentication

HMAC Authentication

Add HMAC Authentication to your APIs

JWT

JWT

Verify and authenticate JSON Web Tokens

LDAP Authentication

LDAP Authentication

Integrate Kong with a LDAP server

Security

Protect your services with additional security layers:

ACL

ACL

Control which consumers can access APIs

CORS

CORS

Allow developers to make requests from the browser

Dynamic SSL

Dynamic SSL

Add an SSL certificate for an underlying service

IP Restriction

IP Restriction

Whitelist or blacklist IPs that can make requests

Bot Detection

Bot Detection

Detects and blocks bots or custom clients

Traffic Control

Manage, throttle and restrict inbound and outbound API traffic:

Rate Limiting

Rate Limiting

Rate-limit how many HTTP requests a developer can make

Response Rate Limiting

Response Rate Limiting

Rate-Limiting based on a custom response header value

Request Size Limiting

Request Size Limiting

Block requests with bodies greater than a specific size

Analytics & Monitoring

Visualize, inspect and monitor APIs and microservices traffic:

Galileo

Galileo

Business Intelligence Platform for APIs

Datadog

Datadog

Visualize API metrics on Datadog

Runscope

Runscope

API Performance Testing and Monitoring

Transformations

Transform request and responses on the fly on Kong:

Request Transformer

Request Transformer

Modify the request before hitting the upstream server

Response Transformer

Response Transformer

Modify the upstream response before returning it to the client

Correlation ID

Correlation ID

Correlate requests and responses using a unique ID

Logging

Log requests and response data using the best transport for your infrastructure:

TCP

TCP

Send request and response logs to a TCP server

UDP

UDP

Send request and response logs to an UDP server

HTTP

HTTP

Send request and response logs to an HTTP server

File

File

Append request and response data to a log file on disk

Syslog

Syslog

Send request and response logs to Syslog

StatsD

StatsD

Send request and response logs to StatsD

Loggly

Loggly

Send request and response logs to Loggly