Configuring security for Control Center involves various steps and needs to be done with care. Because the Control Center relies on Kafka Connect, Kafka brokers, Kafka Streams, interceptors and metrics reporters to work, there are numerous options that could be set depending on a particular environment or need.
It is recommended you first farmiliarize yourself with Kafka Security and the associated components.
Once a component is secured, will be unable to communicate to other non-secured components. For instance, if you have a secured Kafka broker and a secured Control Center, but you have not secured Connect, the Control Center will behave sporatically when you attempt to use/view it.