Security
- Configure Authentication
Redpanda supports multiple forms of authentication including SASL/SCRAM, mTLS with principal mapping, and basic authentication.
- Configure Authorization
ACLs are the main mechanism supported by Redpanda to manage user permissions.
- Configure Kafka TLS Encryption
Enable encryption with TLS or mTLS.
- Configure Listeners
Use listeners to advertise the location of the broker, so other brokers in the cluster can be found.
- Redpanda Console Security
Security topics specific to Redpanda Console.
- IAM Roles
For self-hosted clusters deployed on a public cloud platform, cloud provider IAM roles provide a safer alternative to the less secure static credential system, which is based on access keys.
| All concepts described in this section are compatible with Kafka and its client libraries and CLIs. This section does not cover ways you can protect your Redpanda cluster externally; for example, through network ACLs or private networks. |
Was this helpful?