Security
- Configure Authentication
Redpanda supports multiple forms of authentication including SASL/SCRAM, mTLS with principal mapping, and basic authentication.
- Redpanda Authorization Mechanisms
Redpanda provides two mechanisms for controlling user permissions.
- Configure Kafka TLS Encryption
Enable encryption with TLS or mTLS.
- Configure Listeners
Use listeners to advertise the location of the broker, so other brokers in the cluster can be found.
- Redpanda Console Security
Security topics specific to Redpanda Console.
- IAM Roles
For Redpanda Self-Managed clusters deployed on a public cloud platform, cloud provider IAM roles and managed identities provide a safer alternative to the less secure static credential system, which is based on access keys.
All concepts described in this section are compatible with Kafka and its client libraries and CLIs. This section does not cover ways you can protect your Redpanda cluster externally; for example, through network ACLs or private networks. |
Was this helpful?