Security

  • Configure Authentication

    Redpanda supports multiple forms of authentication including SASL/SCRAM, mTLS with principal mapping, and basic authentication.

  • Configure Authorization

    Redpanda uses access-control lists (ACLs) to manage user permissions. Redpanda stores ACLs internally, replicated with Raft, to provide the same consensus guarantees as your data.

  • Configure Kafka TLS Encryption

    Enable encryption with TLS or mTLS.

  • Configure Listeners

    Steps to configure listeners.

  • Redpanda Console Security

    Redpanda Console Security.

  • IAM Roles

    For self-hosted clusters deployed on a public cloud platform, cloud provider IAM roles provide a safer alternative to the less secure static credential system, which is based on access keys.