Systems | Development | Analytics | API | Testing

Kong Mesh 1.2 Is Here With Embedded OPA Support, FIPS 140-2 Compliance and Multi-Zone Authentication

We are truly excited to release Kong Mesh 1.2 today and introduce three new security capabilities that make it the most secure enterprise service mesh available today. Kong Mesh is built on open source Kuma which Kong created in 2019 and has since donated it to the CNCF. Kuma is a universal control plane for service mesh that is based on Envoy.

4 Excellent API Tools That Will Improve Your Integrations

Developers need excellent API tools that help them improve the quality of integrations and at the same time, reduce the time required to develop these integrations. Ideally, API tools should reduce the risk of integration and performance issues when developing new applications and should provide an effective means of accessing data that is often locked up in a variety of organisational databases.

How to Use Kong Gateway OAuth2 Plugin

Learn how to add OAuth 2.0 authorization and authentication to your service by integrating Kong Gateway and its OAuth 2.0 plugin. What Does the Kong Gateway OAuth2 Plugin Do? As Kong Gateway sits in front of a resource server, the OAuth 2.0 plugin adds authorization server functionality to that resource server — handling authorization requests, inspecting and refreshing tokens, and permitting or forbidding access to resources.

4 Steps to Authorizing Services With the Kong Gateway OAuth2 Plugin

In this tutorial, I’m going to walk through adding OAuth2 authorization and authentication to your service with the Kong Gateway OAuth2 plugin. First, I’ll cover the fundamentals. If you’re already familiar with how Kong Gateway and OAuth2 work, skip ahead to the tutorial. Interconnected. Shared. That’s the norm for today’s applications, networks and data.

Creating Read Only APIs with DreamFactory

As a best practice, you should take care to provide clients with the minimal API access privileges required to successfully complete their tasks. DreamFactory's role based access control manager ensures administrators never leave your data sources unnecessarily vulnerable, offering a point-and-click interface for quickly defining and reviewing privileges. In this video we'll walk through the configuration of a role-based access control, demonstrating how a client's API access privileges can be easily updated so as to allow only read access to a select set of API endpoints.

How to Monitor API Usage and Performance with Tyk API Gateway on EC2 with Moesif

This article provides an introduction to API Observability and how it fits within the overall APIOps Cycles. Then, we will walk through an example of how to successfully deploy and leverage Tyk Gateway and Moesif API Observability on Amazon EC2.

DreamFactory 4.5.2 - New Snowflake, Hadoop, and Hive Connectors

DreamFactory 4.5.2 has been released with improvements to our recently added Snowflake connector. In addition to Snowflake, version 4.5.0 introduced connectors for Apache Hive and Hadoop HDFS. All three were added by request of our customers, and we’re happy to see these new capabilities already being deployed into test environments.

Announcing Insomnia 2021.1

TL;DR Insomnia Designer and Insomnia Core are now Insomnia. Insomnia Designer users will have to migrate to the new Insomnia application and Designer will no longer receive updates. When we originally built Insomnia Designer, we didn’t want to make large changes to Insomnia without understanding whether the changes would be useful to developers, with the release of Insomnia Designer we were praised for not making these changes directly inside of Insomnia at first.