Learn how to enable Kerberos Authentication for Kafka.
Apache Kafka supports Kerberos authentication, but it is supported only for the new Kafka
Producer and Consumer APIs.
If you already have a Kerberos server, you can add Kafka to your current configuration. If
you do not have a Kerberos server, install it before proceeding.
If you already have configured the mapping from Kerberos principals to short names using
the hadoop.security.auth_to_local HDFS configuration property, configure
the same rules for Kafka by adding the
sasl.kerberos.principal.to.local.rules property to the Advanced
Configuration Snippet for Kafka Broker Advanced Configuration Snippet using Cloudera
Manager. Specify the rules as a comma separated list.
In Cloudera Manager, navigate to Kafka > Configuration.
Set SSL Client Authentication to none.
Set Inter Broker Protocol to
SASL_PLAINTEXT.
Click Save Changes.
Restart the Kafka service, select Action > Restart.
Make sure that listeners = SASL_PLAINTEXT is present in the Kafka
broker logs, by default in /var/log/kafka/server.log.
Create a jaas.conf file with either cached credentials or
keytabs.
To use cached Kerberos credentials, where you use kinit first, use
this configuration:
This site uses cookies and related technologies, as described in our privacy policy, for purposes that may include site operation, analytics, enhanced user experience, or advertising. You may choose to consent to our use of these technologies, or