Kong Gateway

Kong Gateway

Resources describing how to use Kong to supply access tokens to APIs

How-tos

Introspection and Phantom Tokens

Introspection and Phantom Tokens

A step-by-step tutorial describing how to configure the Curity Identity Server for Phantom Tokens

Read more
Integrating with Kong Enterprise

Integrating with Kong Enterprise

How to configure and leverage the Kong Enterprise OpenID Connect plugin with the Curity Identity Server

Read more
Integrating with Kong Open Source

Integrating with Kong Open Source

Using Kong Open Source and LUA scripting to implement a phantom token plugin

Read more

Learn

The Phantom Token Approach

The Phantom Token Approach

Securing APIs and Microservices using tokens.

Read more