Authorization

There are two types of authorization in Redpanda Cloud:

  • User authorization

    • Use role-based access control (RBAC) in the control plane and in the data plane to assign users access to specific resources. For example, you could grant everyone access to clusters in a development resource group while limiting access to clusters in a production resource group. Or, you could limit access to geographically-dispersed clusters in accordance with data residency laws. This alleviates the process of manually maintaining and verifying a set of ACLs for a user base that may contain thousands of users.

    • Use group-based access control (GBAC) in the control plane and in the data plane to manage permissions at the group level using OIDC. Assign OIDC groups to roles or create ACLs with Group:<name> principals, so that users inherit access based on their group membership in your identity provider. Because group membership is managed by your identity provider, onboarding and offboarding require no changes in Redpanda.

    • Use Kafka access control lists (ACLs) to grant users permission to perform specific types of operations on specific resources (such as topics, groups, clusters, or transactional IDs). ACLs provide a way to configure fine-grained access to provisioned users. ACLs work with SASL/SCRAM and with mTLS with principal mapping for authentication.

  • BYOC agent authorization

    When deploying an agent as part of BYOC cluster provisioning, Redpanda Cloud automatically assigns IAM policies to the agent. The IAM policy permissions granted to the agent provide it the authorization required to fully manage Redpanda Cloud clusters in AWS, Azure, or GCP.

    IAM policies do not apply or act as deployment permissions, and there are no explicit user actions associated with IAM policies. Rather, IAM policy permissions apply to Redpanda Cloud agents only, and serve to provide Redpanda agents access to AWS, GCP, or Azure clusters so Redpanda brokers can communicate with them.