Company
Date Published
Author
Olivia Greene, Yeva Byzek, Ahmed Saef Zamzam, Prabha Manepalli, Weifan Liang
Word count
1673
Language
English
Hacker News points
None

Summary

In this blog post, organizations are encouraged to define standards and policies around data usage in their production environments to ensure data quality and evolvability goals. The features described in this blog post, such as Schema Validation, Role-Based Access Control (RBAC), and encryption, are demonstrated in a rich tutorial called cp-demo, which shows how to configure a secured Kafka cluster along with many services including Schema Registry. These core security features also correspond to current and upcoming features in the fully managed Schema Registry in Confluent Cloud. To enable Schema Validation, clients must authenticate to the brokers with mTLS, provide authentication credentials for Schema Registry, and have an LDAP entry whose username/password is represented in the schema.registry.basic.auth.user.info configuration parameter. Additionally, role bindings are required to grant access to the Schema Registry subject(s). The blog post also highlights the importance of proper authorization in place, enabling users to log in to Confluent Control Center or Confluent Cloud UI to manage schemas and evolve them as needed.