Confluent Control Center Security¶
Configuring security for Control Center requires planning and needs to be done carefully. Because Control Center relies on Kafka Connect, Apache Kafka® brokers, Kafka Streams, interceptors and metrics reporters to work properly, there are numerous options that could be set depending on a particular environment or requirement.
Confluent recommends reviewing Kafka Security and the associated components before configuring security for Control Center.
After a component is secured, it will be unable to communicate with other non-secured components. For instance, if you have a secured Kafka broker and a secured Control Center, but you have not secured Connect, Control Center will behave sporadically when you attempt to use or view it. Be sure to secure all components in your environment.
- Configuring SSL
- Confluent Control Center Configuring SASL
- Confluent Control Center UI Authentication
- Configuring Control Center with LDAP authentication