Securing apis with kong and keycloak. The examples shared are all Fortunately, some reverse proxy solutions like Ko...