Skip to content
Kong Docs are moving soon! Our docs are migrating to a new home. You'll be automatically redirected to the new site in the future. In the meantime, view this page on the new site!
Kong Logo | Kong Docs Logo
  • Docs
    • Explore the API Specs
      View all API Specs View all API Specs View all API Specs arrow image
    • Documentation
      API Specs
      Kong Gateway
      Lightweight, fast, and flexible cloud-native API gateway
      Kong Konnect
      Single platform for SaaS end-to-end connectivity
      Kong AI Gateway
      Multi-LLM AI Gateway for GenAI infrastructure
      Kong Mesh
      Enterprise service mesh based on Kuma and Envoy
      decK
      Helps manage Kong’s configuration in a declarative fashion
      Kong Ingress Controller
      Works inside a Kubernetes cluster and configures Kong to proxy traffic
      Kong Gateway Operator
      Manage your Kong deployments on Kubernetes using YAML Manifests
      Insomnia
      Collaborative API development platform
  • Plugin Hub
    • Explore the Plugin Hub
      View all plugins View all plugins View all plugins arrow image
    • Functionality View all View all arrow image
      View all plugins
      AI's icon
      AI
      Govern, secure, and control AI traffic with multi-LLM AI Gateway plugins
      Authentication's icon
      Authentication
      Protect your services with an authentication layer
      Security's icon
      Security
      Protect your services with additional security layer
      Traffic Control's icon
      Traffic Control
      Manage, throttle and restrict inbound and outbound API traffic
      Serverless's icon
      Serverless
      Invoke serverless functions in combination with other plugins
      Analytics & Monitoring's icon
      Analytics & Monitoring
      Visualize, inspect and monitor APIs and microservices traffic
      Transformations's icon
      Transformations
      Transform request and responses on the fly on Kong
      Logging's icon
      Logging
      Log request and response data using the best transport for your infrastructure
  • Support
  • Community
  • Kong Academy
Get a Demo Start Free Trial
  • Home icon
  • Konnect Dev Portal
  • Self-Service Developer & Application Registration
github-edit-pageEdit this page
report-issueReport an issue
  • Kong Gateway
  • Kong Konnect
  • Kong Mesh
  • Kong AI Gateway
  • Plugin Hub
  • decK
  • Kong Ingress Controller
  • Kong Gateway Operator
  • Insomnia
  • Kuma

  • Docs contribution guidelines
  • Portals
    • Overview
    • Customization
      • Customization
      • Pages
      • Snippets
      • Appearance
      • Portal Editor
    • Publishing APIs
    • Settings
      • General
      • Custom Domains
      • Security
      • Team Mapping
    • Audit Logs
  • APIs
    • Overview
    • Versioning
    • Documentation
    • Link Gateway Service
  • Access and Approvals
    • Overview
    • Developer Signup
    • Configuring SSO
    • Portal Teams
  • Application Registration
    • Overview
    • Auth Strategies
      • Key Auth
      • OIDC
        • Overview
        • DCR
          • Overview
enterprise-switcher-icon Switch to OSS
On this pageOn this page
  • Region specific applications
  • Konnect Application Auth plugin
  • Authentication strategies
  • Dev Portal security settings and defaults
  • Get started

Self-Service Developer & Application Registration

Konnect Dev Portal provides flexible options for controlling access to content and APIs. When combined with a Gateway Service, Developers visiting a Dev Portal can sign up, create an Application, register it with an API, and retrieve API keys without any necessary intervention by Dev Portal administrators. Developer signups and Applications creation require admin approvals by default, which can be changed in Settings/Security.

Application registration can be provided by enabling User Authentication (and optionally Role-based Access Control), linking an API to a Gateway Service (version 3.6+) and then selecting an authentication strategy when publishing the API to a Dev Portal.

Region specific applications

The Applications and API keys that enable self-service application registration are specific to a geographic region. When an authentication strategy is selected during publication and application registration enabled, the resulting Applications and API keys are specific to the developers in that region.

Konnect Application Auth plugin

When an authentication strategy is selected during publishing an API to a Dev Portal, Kong Konnect will automatically enable and configure the Konnect Application Auth (KAA) plugin on a linked Gateway Service.

Konnect will configure the Konnect Application Auth (KAA) plugin on the linked Gateway Service to use the desired mode: key authentication, Open ID Connect (OIDC), or Dynamic Client Registration (DCR) (DCR coming soon to Beta). This Gateway Service Plugin will prevent unauthenticated usage of the API except by Applications created in the Dev Portal.

If there is no Gateway Service linked to an API when User Authentication is enabled, the configuration is saved and will be applied once a Gateway Service is linked. Likewise, if a Gateway Service is unlinked, the configuration will be removed from that service, and applied to a new service when it is linked.

The Konnect Application Auth (KAA) plugin added to the Gateway Service is read-only and not configurable outside of the Dev Portal UI & APIs.

Authentication strategies

Konnect provides the capability to configure and implement a range of authentication strategies. Utilizing the OpenID Connect authentication strategy allows for specific permissions to be set within your Identity Provider (IdP). This system offers the versatility to either apply a unified authentication strategy across all API Products or to designate a unique authentication strategy to individual API Products.

As an example, consider an organization with four authentication strategies defined:

  • The default key-auth strategy that ships with Konnect
  • An Okta OIDC strategy okta-oidc
  • An Okta DCR strategy okta-dcr
  • An Auth0 OIDC strategy auth0-oidc

Along with these, the organization has three APIs, Weather API v1, Weather API v2, and Maps API v2. Finally, the organization has two Dev Portals, Staging and Production.

The following configuration is possible with these building blocks:

  • The Staging Portal has all three APIs published to it using two different authentication strategies:
    • The two APIs, Weather API v2 and Maps API v2 both use the okta-oidc strategy, and
    • the Weather API v1 uses the key-auth strategy.
  • The Production Portal has two of the APIs published to it using two different authentication strategies:
    • The Weather API v2 uses the okta-dcr strategy, and
    • the Maps API v2 uses the auth0-oidc strategy.

The following diagram illustrates this “publication” configuration for application registration, with the arrows representing the authentication strategy used by each API when published to each portal:

Authentication strategies are independently configured entities, meaning they can be used by multiple APIs (for example, Weather API v2 and Maps API v2 in Staging Portal both use the Okta OIDC config). Independently configured authentication strategies also give you the flexibility to configure the same API to use different auth strategies in different portals. For example, Maps API v2 uses the Okta OIDC strategy in the Staging Portal, and the Auth0 OIDC Auth Config in the Production Portal.

Developers are limited to using a single auth strategy per application. For example, they can create an application to register for both Weather v2 and Maps v2, as both employ okta-oidc, however, registering for Weather APIv1 and Weather API v2 requires two separate applications due to their differing authentication strategies.

Prerequisites

  • A version 3.6+ Gateway Service configured in Konnect Gateway Manager,
  • API linked to Gateway Service, and
  • Published to a Dev Portal.

An API must be linked to a Konnect Gateway Service (version 3.6+) to be able to restrict access to your API with Authentication Strategies.

Dev Portal security settings and defaults

In Settings/Security for each portal, make appropriate choices to setup Developer & Application registration for your needs.

*When a new Dev Portal is created, if Private is selected, User Authentication will automatically be enabled, and key auth will be the default Application Auth Strategy.

*If you would like anonymous/not-logged-in users to be able to see some content, and logged in users to have more access, select Private and adjust visibility settings on the APIs and Pages during publishing to make them viewable publicly. Consider using Role-based access control (RBAC, see below) for more granular control for logged-in users.

  1. Enable User Authentication to allow developers to register their applications to access APIs. Application registration is not possible with anonymous/not-logged-in users.

  2. Optional: Enable Role-based access control (RBAC) to allow granular control of viewing and consuming APIs in the Dev Portal by defining roles within Teams.

  3. Optional: Click the Auto Approve checkbox to enable new Developers registrations and/or thier Applications to be approved automatically by the system. If not set, portal admins will need to approve any new registrations and/or applications.

  4. Optional: Select the preferred Default Auth Strategy (default is the built-in key-auth strategy). This will not retroactively change any published APIs, but will set the default on any new publications.

Get started

  • Key Auth
  • OIDC
  • DCR: Coming soon!
Thank you for your feedback.
Was this page useful?
Too much on your plate? close cta icon
More features, less infrastructure with Kong Konnect. 1M requests per month for free.
Try it for Free
  • Kong
    Powering the API world

    Increase developer productivity, security, and performance at scale with the unified platform for API management, service mesh, and ingress controller.

    • Products
      • Kong Konnect
      • Kong Gateway Enterprise
      • Kong Gateway
      • Kong Mesh
      • Kong Ingress Controller
      • Kong Insomnia
      • Product Updates
      • Get Started
    • Documentation
      • Kong Konnect Docs
      • Kong Gateway Docs
      • Kong Mesh Docs
      • Kong Insomnia Docs
      • Kong Konnect Plugin Hub
    • Open Source
      • Kong Gateway
      • Kuma
      • Insomnia
      • Kong Community
    • Company
      • About Kong
      • Customers
      • Careers
      • Press
      • Events
      • Contact
  • Terms• Privacy• Trust and Compliance
© Kong Inc. 2025