Este conteúdo não está disponível no idioma selecionado.

Chapter 10. Securing Kafka


A secure deployment of Streams for Apache Kafka might encompass one or more of the following security measures:

Encryption

Streams for Apache Kafka supports Transport Layer Security (TLS), a protocol for encrypted communication.

  • Communication is always encrypted between Streams for Apache Kafka components.
  • To set up TLS-encrypted communication between Kafka and clients, you configure listeners in the Kafka custom resource.
Authentication

Kafka listeners use authentication to ensure a secure client connection to the Kafka cluster. Clients can also be configured for mutual authentication. Security credentials are created and managed by the Cluster and User Operator.

Supported authentication mechanisms:

  • mTLS authentication (on listeners with TLS-enabled encryption)
  • SASL SCRAM-SHA-512
  • OAuth 2.0 token based authentication
  • Custom authentication (supported by Kafka)
Authorization

Authorization controls the operations that are permitted on Kafka brokers by specific clients or users.

Supported authorization mechanisms:

  • Simple authorization using ACL rules
  • OAuth 2.0 authorization (if you are using OAuth 2.0 token-based authentication)
  • Open Policy Agent (OPA) authorization
  • Custom authorization (supported by Kafka)
Federal Information Processing Standards (FIPS)
Streams for Apache Kafka is designed to run on FIPS-enabled Kubernetes clusters to ensure data security and system interoperability. For more information about the NIST validation program and validated modules, see Cryptographic Module Validation Program on the NIST website.
Red Hat logoGithubredditYoutubeTwitter

Aprender

Experimente, compre e venda

Comunidades

Sobre a documentação da Red Hat

Ajudamos os usuários da Red Hat a inovar e atingir seus objetivos com nossos produtos e serviços com conteúdo em que podem confiar. Explore nossas atualizações recentes.

Tornando o open source mais inclusivo

A Red Hat está comprometida em substituir a linguagem problemática em nosso código, documentação e propriedades da web. Para mais detalhes veja o Blog da Red Hat.

Sobre a Red Hat

Fornecemos soluções robustas que facilitam o trabalho das empresas em plataformas e ambientes, desde o data center principal até a borda da rede.

Theme

© 2026 Red Hat
Voltar ao topo