KONG – JWT plugins

For JWT plugins in Kong, client certificates are not typically required as part of the JWT validation process. However, let’s clarify based on potential misunderstandings:


✅ JWT Plugin Basics (No client certs needed)

  • JWT authentication in Kong works by verifying the JWT signature using either a shared secret (HS256) or a public key (RS256/ES256).
  • Kong does not require client certificates unless you are adding mutual TLS (mTLS) as an extra layer.

🔐 When Client Certificates Are Required

If you’re also enabling mTLS authentication using plugins like mtls-auth, or using Kong in a setup where TLS client auth is enforced at the proxy level, then:

  • Yes, you will typically use different client certificates per environment (dev/uat/prod) for security isolation and credential scoping.
  • This ensures:
    • Compromise in dev doesn’t impact prod.
    • You can rotate/test certs independently.

💡 Best Practice (if mTLS is involved)

EnvironmentClient CertNotes
Devclient-dev.crtLower trust level, used for testing
UATclient-uat.crtFor staging/pre-prod
Prodclient-prod.crtStrict security, strong validation policies

🎯 Summary

  • 🔸 For JWT plugin alone: No client certs are needed.
  • 🔸 If you combine with mTLS: Yes, use separate client certs per environment.
  • 🔒 Always store keys securely and rotate them periodically.

Leave a comment