Kafka Authentication
PLAINTEXT
No security authentication mode is available. You only need to enter the IP address and port for connection.
SASL_PLAINTEXT
The SASL mechanism is used to connect to Kafka, and you need to configure SASL parameters.
Parameter |
Description |
---|---|
SASL Mechanisms |
SASL is used by client. The following four items are supported. Kafka server uses the GSSAPI mechanism by default.
|
Token Delegation |
Whether an agency token is used for authentication. This option is available when SCRAM-SHA-256 or SCRAM-SHA-512 is selected for SASL Mechanisms. |
Username |
Username for logging in to the database |
Password |
Password for the username |
SSL
SSL is used to encrypt the connection to Kafka. Related parameters need to be configured.
Parameter |
Description |
---|---|
Truststore Certificate |
SSL certificate with the file name extension .jks. |
Truststore Certificate Password |
Password of the certificate |
Endpoint Identification Algorithm |
Endpoint identification algorithm for verifying the host name of the server using the server certificate. This parameter is optional. If this parameter is left blank, host name verification is disabled. |
Mutual SSL Authentication |
Mutual SSL Authentication |
Keystore Certificate |
If mutual SSL authentication is enabled, you need to upload the mutual SSL authentication certificate with the file name extension .jks. |
Keystore Certificate Password |
Password of the mutual SSL authentication certificate. This option is available if mutual SSL authentication is enabled. |
Keystore Private Key Password |
(Optional) Password of the private key in the keystore certificate. |
SASL_SSL
If the SASL and SSL are used, configure SSL and SASL parameters. For details, see SASL_PLAINTEXT and SSL.
Feedback
Was this page helpful?
Provide feedbackThank you very much for your feedback. We will continue working to improve the documentation.See the reply and handling status in My Cloud VOC.
For any further questions, feel free to contact us through the chatbot.
Chatbot