Noma Runtime Protection

Third Party

Enable Noma Runtime Protection

Enable the Noma Runtime Protection plugin.

In this example, monitor mode is enabled, which means that the plugin will only monitor and log attacks. If you want to enable blocking, set monitor_mode to false.

This plugin also requires the following Kong Gateway entity configuration:

  1. Set up AI Gateway by creating a Service, a Route, and enabling the AI Proxy plugin.
  2. Create a Consumer and an auth key to identify the application/client calling the API.
  3. Group Consumers (Optional): If you want to set up shared runtime policies, group your Consumers into Consumer Groups.

Prerequisites

  • (Optional) You have created an application in Noma and copied its application’s ID. If you don’t specify an application ID, it will automatically take the name of the Kong Gateway Consumer.

  • The Noma Runtime Protection plugin is installed.

Environment variables

  • https://api.noma.security: The base URL for the Noma API. The default value is https://api.noma.security.

  • NOMA_APPLICATION_ID: Your Noma Application ID.

  • NOMA_CLIENT_ID: Your Noma Client ID. Contact your Noma Technical Account Manager to receive this.

  • NOMA_CLIENT_SECRET: Your Noma Client Secret. Contact your Noma Technical Account Manager to receive this.

Set up the plugin

Something wrong?

Help us make these docs great!

Kong Developer docs are open source. If you find these useful and want to make them better, contribute today!