Documentation
  • ๐ŸปIntro
    • Why API Security is Critical?
    • Pynt at a Glance
    • Who Should Use Pynt?
  • ๐Ÿ‘ฉโ€๐Ÿ’ปAPI Security Testing
    • Security Testing Overview
    • Prerequisites for Running Pynt Scans
    • How to Install Pynt CLI
    • How to install Pynt Binary (Linux only)
    • Pynt CLI Modes
      • ๐Ÿ”ตPynt Command CLI Mode
      • ๐Ÿ”ตPynt Listen CLI Mode
    • Pynt Security Tests Coverage
      • Business Logic Tests
      • Injection Tests
      • Authentication Bypass Tests
      • Mass Assignment Tests
      • Server-Side Request Forgery Tests
      • Stack Trace In Response
      • Lack of Resources and Rate Limiting
      • File Path Manipulation
      • GraphQL Introspection Vulnerability
      • GraphQL Alias Overloading
      • LLM APIs Vulnerabilities
      • Insecure Transport Scheme
      • Basic Authentication
      • HTTP Desynchronization (Desync) Attack
    • Sensitive Data Exposure Detection
    • Pynt Scans Troubleshooting
      • Pynt CLI Troubleshooting
      • Pynt for Postman Troubleshooting
        • Troubleshoot Pynt Container not Running Error
        • Troubleshoot Empty API Key Error
        • Troubleshoot Unauthorized API Key Error
        • Troubleshoot Collection Not Found Error
        • Troubleshoot Non-Unique Collection Name Error
        • Troubleshoot Empty Collection Identifier Error
        • Troubleshoot Unreachable Target Error
        • Troubleshoot Target Responds with Errors Error
        • Troubleshoot Unresolved Target Domain Error
        • Troubleshoot Unresolved Variable Error
        • Troubleshoot TLS Handshake Fail Error
        • Troubleshoot Few Requests Error
        • Troubleshoot One User Only Error
        • Troubleshoot Failed Assertions Error
    • How To
      • How to Run Business Logic Tests with Pynt
      • How to associate a Pynt scan to an Application in Pynt Dashboard
      • How to tag a scan in Pynt
    • Benchmarks
      • Pynt vs OWASP crAPI
  • ๐ŸคฒSecurity Testing Integrations
    • ๐ŸŸ Pynt with API Testing Tools
      • ๐Ÿ”˜Pynt for Postman
        • Fork Pynt Collection
        • Run Pynt Container
        • Run Pynt in Postman
        • View Scan Results in Postman
      • ๐Ÿ”˜Pynt for Insomnia
      • ๐Ÿ”˜Pynt for ReadyAPI
    • ๐ŸŸ Pynt with API Testing CLIs
      • ๐Ÿ”˜Pynt for Newman (Postman CLI)
      • ๐Ÿ”˜Pynt for TestRunner (ReadyAPI CLI)
    • ๐ŸŸ Pynt with Testing Frameworks
      • ๐Ÿ”˜Pynt for .NET (xUnit)
      • ๐Ÿ”˜Pynt for Selenium
      • ๐Ÿ”˜Pynt for Rest Assured
      • ๐Ÿ”˜Pynt for Jest
      • ๐Ÿ”˜Pynt for pytest
      • ๐Ÿ”˜Pynt for Go
      • ๐Ÿ”˜Pynt for JMeter
    • ๐ŸŸ Pynt on CI/CD
      • โ—How to get Pynt ID for CI/CD Authentication
      • ๐Ÿ”˜Pynt for GitHub Actions
      • ๐Ÿ”˜Pynt for Azure DevOps Pipelines
      • ๐Ÿ”˜Pynt for GitLab
      • ๐Ÿ”˜Pynt for Jenkins
    • ๐ŸŸ Pynt with Burp Suite
    • ๐ŸŸ Pynt with Browsers
      • ๐Ÿ”˜Pynt for Firefox Browser
    • ๐ŸŸ Live Traffic Connectors
      • ๐Ÿ”˜eBPF
        • ๐Ÿ”˜Key Components
      • ๐Ÿ”˜Traffic Mirroring
    • ๐ŸŸ Advanced Pynt Examples
      • ๐Ÿ”˜Pynt as a Standalone Container
      • ๐Ÿ”˜Pynt with Prerecorded Har Files
      • ๐Ÿ”˜Pynt with cURL
  • ๐ŸˆธApplications View
    • Application View Overview
    • Manage Applications
      • Add Application
      • Delete Application
      • Rename Application
    • Manage Sources for API Discovery
      • Add Source
      • Delete Source
      • View Source Info
      • Source Categories
        • API Documentation
          • Swagger
          • Postman Collection
        • API Gateways
          • AWS API Gateway
          • Azure API Gateway
          • Kong API Gateway
          • GCP API Gateway
          • Gravitee API Gateway
        • Testing (API Security Scans)
        • Live Traffic
          • Data Collection with eBPF
          • ALB Traffic Capture with AWS Traffic Mirroring
        • Code Repository
    • Application Dashboard
    • Generate Pentest Report
  • ๐Ÿ“šAPI Catalog
    • API Catalog Overview
    • Navigate API Catalog
      • Filtering API Catalog by Application
      • API Catalog Customization
      • API Related Info
      • APIs at Risk
    • Manage API Source Gaps
      • New APIs
      • Untested APIs
      • Shadow APIs
      • Undocumented APIs
    • View Detailed Endpoint Info
  • โชScan History
    • Scan History Overview
    • Navigate Scan History
      • Associating Scans with Specific Application
      • Filtering by Application
      • Scan Related Info
      • Scan History Customization
    • View Detailed Scan Info
    • Associate Vulnerabilities to Tickets with JIRA
  • Account Management
    • Single Sign-On (SSO)
      • Setting up Okta
      • Setting up Entra ID
Powered by GitBook
On this page
  1. Applications View
  2. Manage Sources for API Discovery
  3. Source Categories
  4. API Gateways

Kong API Gateway

Optimize your API security with Pynt and Kong! Explore our guide on integrating Pynt with Kong API Gateway for advanced API discovery, risk assessment, and gap analysis capabilities.

PreviousAzure API GatewayNextGCP API Gateway

Last updated 8 months ago

is an open-source API gateway and microservices management layer that provides a scalable and flexible platform for managing, securing, and optimizing your APIs and microservices. Designed to handle high-performance API traffic, Kong sits in front of your APIs and handles requests from clients, directing them to the appropriate backend services. Kong is built on top of NGINX, a high-performance web server, which enables it to manage millions of API calls per second with low latency.

Kong offers a wide range of features, including load balancing, caching, request and response transformation, and more, making it a powerful tool for enhancing the reliability and performance of your APIs. One of Kongโ€™s standout features is its extensive plugin ecosystem, which allows you to easily extend the functionality of the API gateway with plugins for authentication, logging, rate limiting, security, and more. Kong supports both RESTful and gRPC APIs, providing flexibility for different API architectures.

Security is a critical aspect of Kong, with built-in features such as OAuth2, JWT authentication, and IP filtering to protect your APIs from unauthorized access and threats. Kong also integrates seamlessly with service meshes, like Kuma or Istio, allowing you to manage and secure your microservices architecture with ease.

As part of its Pynt allows seamless with Kong API Gateway.

Integrating Pynt with Kong enhances your API discovery, security, and management capabilities. Pynt automatically discovers and catalogs your APIs as they pass through Kong, providing real-time security assessments and insights. This integration ensures that vulnerabilities are identified and addressed early, helping you maintain a secure API environment. With Pynt and Kong working together, you can manage, scale, and protect your APIs and microservices with confidence, ensuring they are resilient against threats while maintaining high performance.

๐Ÿˆธ
Kong API Gateway
API Catalog
integration
Kong