Confluent Control Center Security

Configuring security for Control Center requires planning and needs to be done carefully. Because Control Center relies on Kafka Connect, Apache Kafka® brokers, Kafka Streams, interceptors and metrics reporters to work properly, there are numerous options that could be set depending on a particular environment or requirement.

Confluent recommends reviewing Kafka Security and the associated components before configuring security for Control Center.


After a component is secured, it will be unable to communicate with other non-secured components. For instance, if you have a secured Kafka broker and a secured Control Center, but you have not secured Connect, Control Center will behave sporadically when you attempt to use or view it. Be sure to secure all components in your environment.