Confluent Control Center Security¶
Configuring security for Control Center requires planning and needs to be done carefully. Because Control Center relies on Kafka Connect, Apache Kafka® brokers, Kafka Streams, interceptors, and metrics reporters to work properly, there are numerous options that should be set depending on a particular environment or requirement.
Confluent recommends reviewing Kafka Security and the associated components before configuring security for Control Center.
Important
After a component is secured, it will be unable to communicate with other non-secured components. For instance, if you have a secured Kafka broker and a secured Control Center, but you have not secured Connect, Control Center will behave sporadically when you attempt to use it. Be sure to secure all components in your environment.
- Configuring SSL
- Control Center Configuring SASL
- Control Center UI Authentication
- Configuring Control Center to work with Kafka ACLs
- Configuring Control Center with LDAP authentication
- Configure RBAC for Control Center
- Prerequisites
- Limitations
- Control Center resource access by role
- Configure RBAC for Control Center
- Set RBAC configuration options in the Control Center properties file
- Add a role binding for the Control Center user
- Role privileges
- Known issues with RBAC in Control Center
- Troubleshoot RBAC in Control Center
- Disable RBAC
- Manage and view RBAC roles in Control Center