You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
<li><h4><aid="security_sasl_plain"href="#security_sasl_plain">Authentication using SASL/PLAIN</a></h4>
644
644
<p>SASL/PLAIN is a simple username/password authentication mechanism that is typically used with TLS for encryption to implement secure authentication.
645
645
Kafka supports a default implementation for SASL/PLAIN which can be extended for production use as described <ahref="#security_sasl_plain_production">here</a>.</p>
646
-
The username is used as the authenticated <code>Principal</code> for configuration of ACLs etc.
646
+
Under the default implementation of <code>principal.builder.class</code>, the username is used as the authenticated <code>Principal</code> for configuration of ACLs etc.
addresses the security concerns with traditional mechanisms that perform username/password authentication
713
713
like PLAIN and DIGEST-MD5. The mechanism is defined in <ahref="https://tools.ietf.org/html/rfc5802">RFC 5802</a>.
714
714
Kafka supports <ahref="https://tools.ietf.org/html/rfc7677">SCRAM-SHA-256</a> and SCRAM-SHA-512 which
715
-
can be used with TLS to perform secure authentication. The username is used as the authenticated
715
+
can be used with TLS to perform secure authentication. Under the default implementation of <code>principal.builder.class</code>, the username is used as the authenticated
716
716
<code>Principal</code> for configuration of ACLs etc. The default SCRAM implementation in Kafka
717
717
stores SCRAM credentials in Zookeeper and is suitable for use in Kafka installations where Zookeeper
718
718
is on a private network. Refer to <ahref="#security_sasl_scram_security">Security Considerations</a>
The default OAUTHBEARER implementation in Kafka creates and validates <ahref="https://tools.ietf.org/html/rfc7515#appendix-A.5">Unsecured JSON Web Tokens</a>
807
807
and is only suitable for use in non-production Kafka installations. Refer to <ahref="#security_sasl_oauthbearer_security">Security Considerations</a>
808
808
for more details.</p>
809
+
Under the default implementation of <code>principal.builder.class</code>, the principalName of OAuthBearerToken is used as the authenticated <code>Principal</code> for configuration of ACLs etc.
frameworks to distribute the workload to available workers in a secure environment without the added cost of distributing
1048
1049
Kerberos TGT/keytabs or keystores when 2-way SSL is used. See <ahref="https://cwiki.apache.org/confluence/display/KAFKA/KIP-48+Delegation+token+support+for+Kafka">KIP-48</a>
1049
1050
for more details.</p>
1051
+
Under the default implementation of <code>principal.builder.class</code>, the owner of delegation token is used as the authenticated <code>Principal</code> for configuration of ACLs etc.
1050
1052
1051
1053
<p>Typical steps for delegation token usage are:</p>
0 commit comments