Important
You are viewing documentation for an older version of Confluent Platform. For the latest, click here.
Confluent Control Center Security¶
Configuring security for Control Center requires planning and needs to be done carefully. Because Control Center relies on Kafka Connect, Apache Kafka® brokers, Kafka Streams, interceptors, and metrics reporters to work properly, there are numerous options that should be set depending on a particular environment or requirement.
Confluent recommends reviewing Kafka Security and the associated components before configuring security for Control Center.
Important
After a component is secured, it will be unable to communicate with other non-secured components. For instance, if you have a secured Kafka broker and a secured Control Center, but you have not secured Connect, Control Center will behave sporadically when you attempt to use it. Be sure to secure all components in your environment.
- Configuring SSL
- Control Center Configuring SASL
- Control Center UI Authentication
- Configuring Control Center to work with Kafka ACLs
- Configuring Control Center with LDAP authentication
- Configure RBAC for Control Center
- Prerequisites
- Limitations
- Control Center resource access by role
- Configure RBAC for Control Center
- Set RBAC configuration options in the Control Center properties file
- Add a role binding for the Control Center user
- Role privileges
- Known issues with RBAC in Control Center
- Troubleshoot RBAC in Control Center
- Disable RBAC
- Manage and view RBAC roles in Control Center