Important

You are viewing documentation for an older version of Confluent Platform. For the latest, click here.

Confluent Control Center Security

Configuring security for Control Center requires planning and needs to be done carefully. Because Control Center relies on Kafka Connect, Apache Kafka® brokers, Kafka Streams, interceptors, and metrics reporters to work properly, there are numerous options that should be set depending on a particular environment or requirement.

Confluent recommends reviewing Kafka Security and the associated components before configuring security for Control Center.

Important

After a component is secured, it will be unable to communicate with other non-secured components. For instance, if you have a secured Kafka broker and a secured Control Center, but you have not secured Connect, Control Center will behave sporadically when you attempt to use it. Be sure to secure all components in your environment.