Protecting APIs exposed on Kong API Gateways

Protecting APIs exposed on Kong API Gateways
Learn how to apply access control to protect APIs deployed behind Kong API Gateways. Install necessary plugins in your Gateway. Deploy ACP’s Kong Authorizer to enforce policies applied to your discovered APIs.
Kong Authorizer configuration reference
Learn how to configure Kong Authorizer to adjust authorizer’s settings to your needs.