This project is a Spring Boot REST API for managing department data. It integrates Kong API Gateway as a reverse proxy and security layer, running in DB-Backed Mode with PostgreSQL. The JWT Plugin is enabled to handle authentication without modifying the application code.
This project is built and developed on Windows, using WSL (Windows Subsystem for Linux) to run Kong, while PostgreSQL is installed on Windows. Since Kong runs inside WSL and PostgreSQL is on Windows, network configurations must be set up properly to enable smooth communication between these components.
Kong is an API Gateway that sits in front of our services to provide security, traffic control, and observability. By using Kong, we achieve:
- Decoupled Authentication Logic – JWT authentication is handled at the gateway level, eliminating the need to modify Spring Boot code.
- Centralized Authentication & Security – Kong manages authentication for multiple services without changing backend code.
- Scalability & Extensibility – Easily integrate plugins like rate limiting, logging, and request transformation.
- Improved Performance – JWT validation is done at Kong before reaching the backend, reducing unnecessary load.
Kong strengthens API security by:
- Dynamic Configuration – Services, routes, and plugins can be configured dynamically via Kong Admin API without restarting Kong.
- Scalability – Stores configurations in PostgreSQL, making it easy to scale across multiple Kong instances.
- Better Management – Admin API allows real-time monitoring and adjustments without touching YAML files.
Since Kong runs in WSL and PostgreSQL is on Windows, we need to:
- Allow PostgreSQL connections from WSL.
- Retrieve WSL IP address and configure PostgreSQL to accept external connections.
- Update
pg_hba.conf
andpostgresql.conf
for proper authentication
The technology used in this project are:
Spring Boot Starter Web
– Used to build RESTful APIs for managing department dataKong API Gateway
– JWT Plugin enables token-based authentication without modifying backend logic.PostgreSQL
– Stores Kong configurations (services, routes, plugins) in a databaseLombok
– Reducing boilerplate codeWSL (Windows Subsystem for Linux)
– Environment to run Kong on Windows
The project is organized into the following package structure:
jwt-auth-with-kong/
│── src/main/java/com/yoanesber/jwt_auth_with_kong/
│ ├── 📂controller/ # Contains REST controllers that handle HTTP requests and return responses
│ ├── 📂entity/ # Contains entity classes
│ ├── 📂service/ # Business logic layer
│ │ ├── 📂impl/ # Implementation of services
Configuration values are stored in .env.development
and referenced in application.properties
.
Example .env.development
file content:
# Application properties
APP_PORT=8081
SPRING_PROFILES_ACTIVE=development
Example application.properties
file content:
# Application properties
spring.application.name=jwt-auth-with-kong
server.port=${APP_PORT}
spring.profiles.active=${SPRING_PROFILES_ACTIVE}
This project is built and developed on Windows, using WSL (Windows Subsystem for Linux) to run Kong, while PostgreSQL is installed on Windows. This setup allows seamless communication between Kong (running in WSL) and the PostgreSQL database on Windows.
A step by step series of examples that tell you how to get a development env running.
- Ensure you have Git installed on your Windows machine, then clone the repository to your local environment:
git clone https://github.com/yoanesber/Spring-Boot-JWT-Auth-Kong.git
- Navigate to the project folder:
cd Spring-Boot-JWT-Auth-Kong
- Run the application locally:
mvn spring-boot:run
- The API will be available at:
http://localhost:8081/
WSL (Windows Subsystem for Linux) is not enabled by default on Windows. You need to enable it manually before you can install and use it. Follow How to install Linux on Windows with WSL.
Make sure PostgreSQL is installed and running on your Windows machine at port 5432
, as Kong will use it in DB-Backed Mode.
- Set up the Kong APT repository by following Install Kong Gateway on Ubuntu. If you are using a different release, replace
noble
with$(lsb_release -sc)
or the release name in the command below. To check your release name, runlsb_release -sc
.
curl -1sLf "https://packages.konghq.com/public/gateway-39/gpg.B9DCD032B1696A89.key" | gpg --dearmor | sudo tee /usr/share/keyrings/kong-gateway-39-archive-keyring.gpg > /dev/null
curl -1sLf "https://packages.konghq.com/public/gateway-39/config.deb.txt?distro=ubuntu&codename=noble" | sudo tee /etc/apt/sources.list.d/kong-gateway-39.list > /dev/null
Note: These two commands are used in WSL (Ubuntu) to add Kong Gateway's official package repository to your system. The first command, downloads the GPG key from Kong's official repository. The GPG key is used to verify the authenticity of Kong's package repository, preventing security risks. The second one, adds Kong’s official package repository to your system so you can install Kong.
- Update the repository:
sudo apt-get update
Note: This command is used in Ubuntu (including WSL) to update the package lists from all configured repositories. This ensures you get the latest package versions before installing new software.
- Install Kong:
sudo apt-get install -y kong-enterprise-edition=3.9.1.1
Note: This command installs a specific version of Kong Enterprise Edition (3.9.1.1) in WSL (Ubuntu).
- Ensure Kong is installed:
kong version
- Allow PostgreSQL Port 5432 in Windows Firewall (Create a new inbound rule to allow traffic on port 5432):
- Open "Windows Defender Firewall with Advanced Security"
- Go to "Inbound Rules"
- Click "New Rule" → Select "Port" → Click "Next"
- Choose "TCP" and enter "5432", then click "Next"
- Select "Allow the Connection" → Click "Next"
- Apply to "Private" and "Public" networks → Click "Next"
- Name it "PostgreSQL 5432" and click "Finish"
Note: By default, Windows Firewall blocks external connections. Since Kong is running inside WSL and PostgreSQL is installed on Windows, they need to communicate over the network. By allowing port 5432 in Windows Firewall, you ensure that WSL can connect to PostgreSQL running on Windows.
- Find Your WSL IP Address, run the following command in WSL:
ip addr show eth0 | grep 'inet ' | awk '{print $2}' | cut -d'/' -f1
Example output:
192.168.1.101
- Allow Windows PostgreSQL to Accept External Connections
- Navigate to
C:\Program Files\PostgreSQL\<version>\data
. - Before making any changes, create a backup of your
postgresql.conf
andpg_hba.conf
file. - Open
postgresql.conf
using Notepad as administrator. Editpostgresql.conf
and find:
listen_addresses = 'localhost'
Change it to:
listen_addresses = '*'
- Open
pg_hba.conf
using Notepad as administrator. Editpg_hba.conf
and add the following line at the end:
host all all <WSL_IP_ADDRESS>/32 md5
for example:
host all all 192.168.1.101/32 md5
- Reload PostgreSQL (Preferred Way). Open Command Prompt, Run as Admin, then execute:
pg_ctl reload -D "C:\Program Files\PostgreSQL\<version>\data"
Note: You must either restart or reload PostgreSQL for changes in pg_hba.conf to take effect.
- Ensure WSL can communicate with PostgreSQL by running the following command in WSL:
psql -h <WINDOWS_IP_ADDRESS> -U postgres -d postgres
Note: After running this, you will be prompted to fill in the password.
- Create a Separate User and Database for Kong
- Connect to PostgreSQL (from WSL or Windows Terminal)
psql -h <WINDOWS_IP_ADDRESS> -U postgres -d postgres
- Then, run this scripts:
CREATE DATABASE kong;
CREATE USER kong WITH PASSWORD '<PASSWORD>';
GRANT ALL ON SCHEMA public TO kong;
GRANT ALL PRIVILEGES ON DATABASE kong TO kong;
- Modify Kong’s Configuration in WSL
- Copy the default configuration file and edit the copied file:
sudo cp /etc/kong/kong.conf.default /etc/kong/kong.conf
sudo nano /etc/kong/kong.conf
Note: However, kong.conf.default
should not be modified directly. Instead, we copy it to create a new configuration file.
- Find and modify the following lines:
database = postgres
pg_host = <WINDOWS_IP_ADDRESS>
pg_port = 5432
pg_user = kong
pg_password = <PASSWORD>
pg_database = kong
Note: Replace <WINDOWS_IP_ADDRESS>
with your Windows PostgreSQL IP and <PASSWORD>
with your actual PostgreSQL credentials.
- Save and exit Nano: Press
CTRL+X
, then Y, then Enter
- Bootstrap the database
- Migrate Kong Database
sudo kong migrations bootstrap -c /etc/kong/kong.conf
- Start Kong Service
kong start --conf /etc/kong/kong.conf
- Verify Kong is Running in WSL
curl -i http://localhost:8001
Kong Ports:
8000
: Kong Proxy (HTTP) → Used to forward API requests8001
: Kong Admin API (HTTP) → Used for managing services, routes, plugins
- Register Your API as a Kong Service in WSL
- Run the following command in WSL (replace the values accordingly):
curl -i -X POST http://localhost:8001/services --data "name=department-service" --data "url=http://<WINDOWS_IP_ADDRESS>:<RUNNING_APP_PORT>/api/v1/departments"
Note: This registers a new service in Kong called "department-service"
and stores the configuration in Kong's database.
- Create a Route for
/api/v1/departments
- Now, expose the API by defining a route:
curl -i -X POST http://localhost:8001/services/department-service/routes --data "name=department-route" --data "paths[]=/api/v1/departments"
Note: This tells Kong that requests to "http://localhost:8000/api/v1/departments"
will now be proxied to your Spring Boot API "http://<WINDOWS_IP_ADDRESS>:<RUNNING_APP_PORT>/api/v1/departments"
.
- Test the API via Kong:
curl -i http://localhost:8000/api/v1/departments
- Kong forwards it to:
http://<WINDOWS_IP_ADDRESS>:<RUNNING_APP_PORT>/api/v1/departments
- Spring Boot API returns the response back through Kong.
HTTP/1.1 200
Content-Type: application/json
...
{"statusCode":200,"timestamp":"2025-03-24T11:11:52.286996700Z","message":"Departments retrieved successfully","data":...}
- Enable the JWT Plugin
- First, you need to enable the JWT authentication plugin on your registered Kong service (e.g., department-service). Run the following command in WSL:
curl -X POST http://localhost:8001/services/department-service/plugins --data "name=jwt"
Note: name=jwt
→ This enables JWT authentication for the department-service. Kong will now require a valid JWT token for every request to this service.
- View Applied Plugins
- To check if the jwt plugin is successfully applied, run:
curl -i http://localhost:8001/plugins
- Create a Consumer in Kong
- A consumer in Kong represents a client (user or application) that will use the API. Run the following command to create a consumer named
channel1
:
curl -X POST http://localhost:8001/consumers --data "username=channel1"
Note: This registers a new consumer with username channel1
. The consumer will be assigned a JWT credential to authenticate API requests.
- Generate JWT Credentials for the Consumer
- Now, you need to create JWT credentials for
channel1
:
curl -i -X POST http://localhost:8001/consumers/channel1/jwt
Response example:
{
"created_at": 1742920551,
"algorithm": "HS256",
"tags": null,
"id": "e3b517ef-c4fb-4fa9-9dc3-311fafa7e332",
"secret": "F6gGrmGLi7VLpoaJNDUVztjssptmj23q",
"rsa_public_key": null,
"consumer": {
"id": "29a3b728-19f7-486c-b02b-33b3f70a5e5d"
},
"key": "xBSCWsI6qJLBMuyv3s7OQVuLU5J7EIEa"
}
Note: Key (key
) → This will be used as the JWT iss
(issuer). Secret (secret
) → Used to sign JWT tokens. Keep the secret
safe, as it will be used to sign JWTs.
- Create and Sign a JWT Token
To authenticate API requests, a JWT Token must be generated and signed. One option is to use JWT debugger at jwt.io to manually generate tokens for testing. Alternatively, a JWT provider service can be used to issue tokens dynamically.
The claims must contain the secret’s key field in the configured claim. That claim isiss
(issuer field) by default. Set its value to our previously created credential’skey
. The claims may contain other values.
Header (Algorithm & Token Type)
{
"alg": "HS256",
"typ": "JWT"
}
Payload (Data)
{
"iss": "xBSCWsI6qJLBMuyv3s7OQVuLU5J7EIEa",
"username": "channel1",
"iat": 1711800000,
"exp": 1711836000
}
Sign JWT (Secret)
F6gGrmGLi7VLpoaJNDUVztjssptmj23q
JSON Web Token Response
eyJhbGciOiJIUzI1NiIsInR5cCI6IkpXVCJ9.eyJpc3MiOiJ4QlNDV3NJNnFKTEJNdXl2M3M3T1FWdUxVNUo3RUlFYSIsInVzZXJuYW1lIjoiY2hhbm5lbDEiLCJpYXQiOjE3MTE4MDAwMDAsImV4cCI6MTcxMTgzNjAwMH0.YuTP87HXLHcXRI1JY1VIC8l89uVSSX5_0IvWTTntQWc
- Test the API with JWT Token via Kong
Once the JWT token is generated, send a request to your API through Kong:
curl -i -X GET http://localhost:8000/api/v1/departments -H "Authorization: Bearer <YOUR_JWT_TOKEN>"
- If the token is valid, Kong will forward the request to your Spring Boot API.
- If the token is invalid, Kong will return:
{
"message": "Invalid signature"
}
- If the token is missing, Kong will return:
{
"message": "Unauthorized"
}
- If the claim iss field (
key
) is invalid, Kong will return:
{
"message": "No credentials found for given 'iss'"
}
- Rate Limit with Kong GitHub Repository, check out Spring Boot Department API with Kong API Gateway & Rate Limiting.
- REST API with JWT Authentication Repository, check out Netflix Shows REST API with JWT Authentication.
- Form-Based Authentication Repository, check out Spring Web Application with JDBC Session.