Kafka Authentication
PLAINTEXT
No security authentication mode is available. You only need to enter the IP address and port for connection.
SASL_PLAINTEXT
The SASL mechanism is used to connect to Kafka, and you need to configure SASL parameters.
Parameter |
Description |
---|---|
SASL Mechanisms |
SASL is used by client. The following four items are supported. Kafka server uses the GSSAPI mechanism by default. For details, see the SASL mechanisms.
|
Token Delegation |
Whether an agency token is used for authentication. This option is available when SCRAM-SHA-256 or SCRAM-SHA-512 is selected for SASL Mechanisms. |
Username |
Username for logging in to the database |
Password |
Password for the username |
SSL
SSL is used to encrypt the connection to Kafka. Related parameters need to be configured.
Parameter |
Description |
---|---|
Truststore Certificate |
SSL certificate with the file name extension .jks. For details about how to generate a certificate file, see SSL Certificate. |
Truststore Certificate Password |
Password of the certificate |
Endpoint Identification Algorithm |
Endpoint identification algorithm for verifying the host name of the server using the server certificate. This parameter is optional. If this parameter is left blank, host name verification is disabled. |
Mutual SSL Authentication |
Mutual SSL Authentication |
Keystore Certificate |
If mutual SSL authentication is enabled, you need to upload the mutual SSL authentication certificate with the file name extension .jks. |
Keystore Certificate Password |
Password of the mutual SSL authentication certificate. This option is available if mutual SSL authentication is enabled. |
Keystore Private Key Password |
(Optional) Password of the private key in the keystore certificate. |
SASL_SSL
If the SASL and SSL are used, configure SSL and SASL parameters. For details, see SASL_PLAINTEXT and SSL.
Feedback
Was this page helpful?
Provide feedbackThank you very much for your feedback. We will continue working to improve the documentation.