Security Deployment Profiles in Confluent Platform¶
Confluent Platform offers multiple security deployment profiles tailored to meet the diverse security needs of various deployment scenarios. The following table provides a comprehensive overview of the available security deployment profiles for your Confluent Platform cluster and the security configurations they support.
Security options¶
Confluent Platform supports many different security options for authentication, authorization, encryption, and identity provider protocols. To help you understand the security options available for your Confluent Platform clusters and the security deployment profiles that support them. The purpose of this section is to summarize all of the available options and provide links to learn more about them. The table below this section lists different security deployment profiles supported in Confluent Platform clusters and the security options they support.
Authentication methods¶
Various authentication methods are available to meet diverse security needs across different deployment scenarios, ensuring secure communication and authentication within your Confluent Platform cluster.
For details, see Authentication Methods.
Click to expand or collapse the summary of authentication methods
- HTTP Basic Authentication
Uses Base64-encoded usernames and passwords included in HTTP request headers to authenticate clients and services over HTTP.
For details, see HTTP Basic Authentication.
- LDAP
Uses Lightweight Directory Access Protocol (LDAP) to verify user credentials against an LDAP directory, allowing applications and services to authenticate users by querying and validating user information in a centralized directory service.
For details, see Configure Kafka Clients for LDAP Authentication.
- mTLS
Uses Mutual Transport Layer Security (mTLS) to ensure that clients and services authenticate each other using certificates. Secure communication is provided by using TLS to encrypt data in motion (or data in transit) and using certificates to authenticate identities.
For details, see Mutual TLS (mTLS) Authentication.
- OIDC (SSO)
Uses OpenID Connect (OIDC) to extend OAuth 2.0 to provide single sign-on capabilities provided by an external identity provider (IdP). OIDC SSO allows clients and services to authenticate once and gain access to multiple services and applications.
For details, see Configure SSO using OIDC.
- SASL/GSSAPI (Kerberos)
Uses the Kerberos protocol within the SASL framework to provide secure, mutual authentication between clients and services, leveraging GSSAPI to interface with Kerberos.
For details, see Use SASL/GSSAPI Authentication.
- SASL/OAUTHBEARER (with IdP as token issuer)
Uses OAuth 2.0 bearer tokens issued by an external identity provider (IdP) to securely authenticate clients and services within the SASL framework.
For details, see Use SASL/OAUTHBEARER Authentication.
- SASL/OAUTHBEARER (with MDS as token issuer)
Uses OAuth 2.0 bearer tokens issued by the Confluent Metadata Service (MDS) to securely authenticate clients and services within the SASL framework.
For details, see Use SASL/OAUTHBEARER Authentication.
- SASL/PLAIN or SASL/PLAIN (with LDAP server)
Uses the SASL framework with plain text for authentication. Because SASL/PLAIN transmits credentials (usernames and passwords) in plain text, it is vulnerable to interception unless used over secure channels using TLS.
For details, see Use SASL/PLAIN Authentication.
- SASL/SCRAM
Uses Salted Challenge Response Authentication Mechanism (SCRAM) with salted and hashed passwords to securely authenticate clients and services, providing protection against replay attacks and password theft.
Uses the SASL framework with the Salted Challenge Response Authentication Mechanism (SCRAM) and salted, hashed passwords to securely authenticate clients and services, providing protection against replay attacks and password theft.
For details, see: Use SASL/SCRAM Authentication.
Authorization mechanisms¶
Authorization mechanisms are used to control access to resources in your Confluent Platform cluster.
For details, see Authorization.
Click to expand or collapse the summary of authorization mechanisms
- ACLs
Access control lists (ACLs) provide a mechanism to control access to resources in your Confluent Platform cluster by defining the set of users, clients, and services that are allowed or denied access to specific resources.
For details, see Use Access Control Lists (ACLs) for Authorization.
- RBAC
Role-Based Access Control (RBAC) allows fine-grained access management by defining roles with specific permissions and assigning these roles to users and services.
For details, see Use Role-Based Access Control (RBAC) for Authorization.
Encryption¶
Encryption is used to secure data in motion (or data in transit) and at data at rest in your Confluent Platform cluster.
For details, see Encryption.
Click to expand or collapse summary of encryption options
- TLS
Transport Layer Security (TLS) is a cryptographic protocol designed to provide secure communication over computer networks. TLS is the successor to the deprecated Secure Sockets Layer (SSL) protocol, offering improved security features and more robust support against modern threats.
For details, see TLS Encryption.
Identity provider protocols¶
Identity provider (IdP) protocols are frameworks or sets of rules used to define how identities (users and services) are authenticated and managed within your Confluent Platform cluster. These protocols are used to integrate with external identity providers and provide a single source of truth for user and service authentication.
Click to expand or collapse the summary of identity provider (IdP) protocols
- LDAP
Lightweight Directory Access Protocol (LDAP) is a protocol used to access and maintain distributed directory information services over an IP network.
For details, see LDAP.
- OIDC
OpenID Connect (OIDC) extends OAuth 2.0 authorization to provide sign-in and profile information about authenticated users. OIDC is widely used to implement single sign-on (SSO) for integration with external identity providers and to provide a single source of truth for user and service authentication.
For details, see Configure SSO for Confluent Control Center using OIDC.
Security deployment profiles¶
The columns in the following table represent the different security options available for your Confluent Platform clusters and the security deployment profiles that support them.
- Authentication: Kafka client: Options for Kafka clients authenticating to Confluent Server brokers
- Authentication: Kafka client to non-Kafka component: Options for Kafka clients authenticating to Schema Registry, REST Proxy, ksqlDB, and Confluent Control Center
- Authentication: Service-to-service: Options for authenticating Schema Registry to Confluent Server, Connect to Schema Registry, Connect to Confluent Server, etc.
- Authentication: User: Options for users authenticating using Confluent Control Center or Confluent CLI
- Authorization: Options for controlling access to resources in your Confluent Platform cluster
- Encryption: Options for encrypting data in motion (or data in transit)
- Identity provider protocols: Options for integrating with external identity providers
Profile | Authentication: Kafka client | Authentication: Client to non-Kafka component | Authentication: Service to service | Authentication: User | Authorization | Encryption | Identity provider protocols |
---|---|---|---|---|---|---|---|
1 | SASL (/PLAIN, /GSSAPI, /SCRAM) or mTLS | mTLS | mTLS | HTTP Basic Authentication | ACLs | TLS | |
2 | SASL (/GSSAPI, /SCRAM) or mTLS | SASL (/GSSAPI, /SCRAM) | mTLS | HTTP Basic Authentication | ACLs | TLS | |
3 | SASL (/PLAIN, /PLAIN with LDAP server, /GSSAPI, /SCRAM) or mTLS | HTTP Basic Authentication | OAuthBearer (powered by LDAP and MDS-issued tokens) | HTTP Basic Authentication | RBAC | TLS | LDAP |
4 | SASL (/PLAIN, /PLAIN with LDAP server, /GSSAPI, /SCRAM) or mTLS | HTTP Basic Authentication | OAuthBearer powered by LDAP and MDS-issued tokens | OIDC (SSO) | RBAC | TLS | Both OIDC and LDAP |
5 | SASL (/OAUTHBEARER with IdP-issued tokens, /PLAIN, /PLAIN with LDAP server, /GSSAPI, /SCRAM) or mTLS | HTTP Basic Authentication | OAuthBearer with IdP-issued tokens | OIDC (SSO) | RBAC | TLS | Both OIDC and LDAP |
6 | SASL (/OAUTHBEARER with IdP-issued tokens, /PLAIN, /SCRAM, /GSSAPI) or mTLS | mTLS | mTLS | HTTP Basic Authentication | ACLs | TLS | OIDC |
7 | SASL (/OAUTHBEARER with IdP-issued tokens, /PLAIN, /PLAIN with LDAP server, /SCRAM, /GSSAPI) or mTLS | OAuthBearer with IdP-issued tokens or HTTP Basic Authentication | OAuthBearer with IdP-issued tokens | OIDC (SSO) | RBAC | TLS | Both OIDC and LDAP |
8 | SASL (/OAUTHBEARER with IdP-issued tokens, /PLAIN, /SCRAM, /GSSAPI) or mTLS | OAuthBearer with IdP-issued tokens or mTLS | mTLS | HTTP Basic Authentication | ACLs | TLS | OIDC |
9 | SASL (/OAUTHBEARER with IdP-issued tokens, /PLAIN, /SCRAM, /GSSAPI) or mTLS | OAuthBearer with IdP-issued tokens | OAuth | OIDC (SSO) | RBAC | TLS | OIDC |