Confluent Control Center Security¶
Configuring security for Control Center requires planning and needs to be done carefully. Because Control Center relies on Kafka Connect, Apache Kafka® brokers, Kafka Streams, interceptors, and metrics reporters to work properly, there are numerous options that should be set depending on a particular environment or requirement.
Confluent recommends reviewing Kafka Security and the associated components before configuring security for Control Center.
After a component is secured, it will be unable to communicate with other non-secured components. For instance, if you have a secured Kafka broker and a secured Control Center, but you have not secured Connect, Control Center will behave sporadically when you attempt to use it. Be sure to secure all components in your environment.