In order to give you better service we use cookies. By continuing to use our website, you agree to the use of cookies as described in our Cookie Policy I Agree
List your extension here!
Portal Application Registration
Allow portal developers to register applications against Services
Basic Authentication
Add Basic Authentication to your Services
HMAC Authentication
Add HMAC Authentication to your Services
Kong JWT Signer
Verify and (re-)sign one or two tokens in a request
JWT
Verify and authenticate JSON Web Tokens
Key Authentication - Encrypted
Add key authentication to your Services
Key Authentication
LDAP Authentication Advanced
Secure Kong clusters, Routes, and Services with username and password protection
LDAP Authentication
Integrate Kong with an LDAP server
Mutual TLS Authentication
Secure routes and services with client certificate and mutual TLS authentication
OAuth 2.0 Introspection
Integrate Kong with a third-party OAuth 2.0 Authorization Server
OAuth 2.0 Authentication
Add OAuth 2.0 authentication to your Services
OpenID Connect
Integrate Kong with a third-party OpenID Connect 1.0 provider
Session
Support sessions for Kong Authentication Plugins.
Vault Authentication
Add Vault authentication to your Services
Okta
Integrate Okta's API Access Management (OAuth as a Service) with Kong API Gateway.
PASETO
PASETO (Platform-Agnostic Security Tokens)
Upstream HTTP Basic Authentication
Add HTTP Basic Authentication header to upstream service request
ACME
Let's Encrypt and ACMEv2 integration with Kong
Bot Detection
Detect and block bots or custom clients
CORS
Allow developers to make requests from the browser
IP Restriction
Allow or deny IPs that can make requests to your Services
Cleafy plugin for Kong
Integrate Kong API GW with Cleafy threat detection & protection for API-based apps
Approov API Threat Protection
Approov ensures that only genuine and unmodified instances of your mobile app can connect to your server or cloud backend
Kong Spec Expose
Expose OAS/Swagger/etc. specifications of auth protected APIs proxied by Kong
Kong Upstream JWT
Add a signed JWT into the header of proxied requests
Salt Security
Integrate Kong API Gateway with Salt Security Discovery & Prevention for API-based apps
Kong Path Allow
Determine if the path is in the path allow list, and if not, return a 403
Signal Sciences
Secure your web applications and APIs without impacting your business
Wallarm
Wallarm is AI-Powered Security Platform for protecting microservices and APIs
ACL
Control which Consumers can access Services
Canary Release
Slowly roll out software changes to a subset of users
Forward Proxy Advanced
Allows Kong to connect to intermediary transparent HTTP proxies
GraphQL Proxy Caching Advanced
Cache and serve commonly requested responses in Kong
GraphQL Rate Limiting Advanced
Provide rate limiting for GraphQL queries
Proxy Caching Advanced
Proxy Cache
Rate Limiting Advanced
Upgrades Kong Rate Limiting with more flexibility and higher performance
Rate Limiting
Rate-limit how many HTTP requests can be made in a period of time
Request Size Limiting
Block requests with bodies greater than a specified size
Request Termination
Terminates all requests with a specific response
Request Validator
Validates requests before they reach the Upstream service
Response Rate Limiting
Rate-limiting based on a custom response header value
Route By Header
Route request based on request headers
Kong Response Size Limiting
Block responses with bodies greater than a specified size
Kong Service Virtualization
Mock virtual API request and response pairs through Kong Gateway
JWT to Header (Route by JWT Claim)
Convert JWT Claims to Headers for upstream consumption or to route by JWT Claims
AWS Lambda
Invoke and manage AWS Lambda functions from Kong
Azure Functions
Invoke and manage Azure functions from Kong
Apache OpenWhisk
Invoke and manage OpenWhisk actions from Kong
Serverless Functions
Dynamically run Lua code from Kong
Datadog
Visualize metrics on Datadog
Prometheus
Expose metrics related to Kong and proxied Upstream services in Prometheus exposition format
Zipkin
Propagate Zipkin spans and report space to a Zipkin server
ArecaBay MicroSensor
Discover, Monitor, and Secure your APIs at object/data level.
Moesif API Analytics
User Behavior API analytics and observability
SignalFx
Monitor and analyze Kong in SignalFx
Correlation ID
Correlate requests and responses using a unique ID
DeGraphQL
Transform a GraphQL upstream into a REST API
Exit Transformer
Customize Kong exit responses sent downstream
gRPC-gateway
Access gRPC services through HTTP REST
gRPC-Web
Allow browser clients to call gRPC services
Kafka Upstream
Transform requests into Kafka messages in a Kafka topic
Request Transformer Advanced
Use powerful regular expressions, variables, and templates to transform API requests
Request Transformer
Use regular expressions, variables, and templates to transform requests
Response Transformer Advanced
Modify the upstream response before returning it to the client
Response Transformer
Route Transformer Advanced
Transform routing by changing the upstream server, port, or path
Inspur Request Transformer
Kong plugin to transform diversiform requests
Inspur Response Transform
kong plugin to transform http response from json to xml
API Transformer
Kong middleware to transform requests / responses, using Lua script.
Reedelk Transformer
Kong plugin to transform Reedelk requests and responses
Template Transformer
Kong middleware to transform requests / responses, using pre-configured templates.
URL Rewrite
Kong middleware to completely rewrite the URL of a route.
File Log
Append request and response data to a log file
HTTP Log
Send request and response logs to an HTTP server
Kafka Log
Publish logs to a Kafka topic
Loggly
Send request and response logs to Loggly
StatsD Advanced
Send metrics to StatsD with more flexible options
StatsD
Send request and response logs to StatsD
Syslog
Send request and response logs to Syslog
TCP Log
Send request and response logs to a TCP server
UDP Log
Send request and response logs to a UDP server
Kong Google Cloud Logging
Logs Kong requests with Google Cloud Logging
Kong Splunk Log
Log API transactions to Splunk using the Splunk HTTP collector
Google Analytics Log
Log API transactions to Google Analytics
Kong on AWS with Terraform
Terraform module to provision Kong and Kong Enterprise clusters on Amazon Web Services.
Kong on Microsoft Azure Certified
The Bitnami Kong Stack provides a one-click install solution for Kong
Kong Heroku app
Deploy Kong clusters to Heroku Common Runtime or Private Spaces
Kongverge
A Desired State Configuration tool for Kong.
Microsoft Azure
Deploy Kong on Microsoft Azure
Microsoft Azure Container Instances
Deploy Kong on Microsoft Azure Container Instances
KongMap
Visually Map and Manage your Kong Clusters