Kong API Gateway Integration
Ping Identity provides a Kong Gateway integration that enables the use of PingAccess and other Ping Identity products for policy decisions.
Integration with Kong Gateway allows PingAccess to handle the complexities of the OAuth and OpenID Connect (OIDC) protocols, making it easier to manage access control in your API. Instead of making access control configurations repeatedly, install and configure the Kong plugin once and manage your access control rules in PingAccess.
The following diagram explains how traffic flows through Kong Gateway and PingAccess.
-
The HTTP client sends an inbound request to the API gateway.
-
The API gateway sends a sideband request to PingAccess.
-
PingAccess evaluates the request and sends a response to the API gateway.
-
The API gateway analyzes the response from PingAccess to determine whether the request should be forwarded to the API and, if so, whether any modifications should be made to the request.
If the request is denied, PingAccess includes directives to influence how the API gateway responds to the HTTP Client.
-
The API sends an outbound response to the API gateway.
-
The API gateway passes the response to PingAccess for processing.
-
PingAccess sends a response to the API gateway.
-
The API gateway processes the response from PingAccess.
If modifications should be made, the response to the HTTP client includes directives for modifying the response.
Review the following usage considerations before setting up the Kong plugin:
|
To set up the Kong Gateway integration: