Repository: kafka
Updated Branches:
  refs/heads/trunk 0cf770800 -> 83bdcdbae


MINOR: Refer consistently to server.properties in security docs

Author: Manikumar Reddy <manikumar.re...@gmail.com>

Reviewers: Ismael Juma <ism...@juma.me.uk>

Closes #3788 from omkreddy/RULE-DOC


Project: http://git-wip-us.apache.org/repos/asf/kafka/repo
Commit: http://git-wip-us.apache.org/repos/asf/kafka/commit/83bdcdba
Tree: http://git-wip-us.apache.org/repos/asf/kafka/tree/83bdcdba
Diff: http://git-wip-us.apache.org/repos/asf/kafka/diff/83bdcdba

Branch: refs/heads/trunk
Commit: 83bdcdbaef4e594ec5aac0736ffce5d0172c1671
Parents: 0cf7708
Author: Manikumar Reddy <manikumar.re...@gmail.com>
Authored: Tue Sep 19 05:33:02 2017 +0100
Committer: Ismael Juma <ism...@juma.me.uk>
Committed: Tue Sep 19 05:33:02 2017 +0100

----------------------------------------------------------------------
 docs/security.html | 10 +++++-----
 1 file changed, 5 insertions(+), 5 deletions(-)
----------------------------------------------------------------------


http://git-wip-us.apache.org/repos/asf/kafka/blob/83bdcdba/docs/security.html
----------------------------------------------------------------------
diff --git a/docs/security.html b/docs/security.html
index dab00dd..3e469b2 100644
--- a/docs/security.html
+++ b/docs/security.html
@@ -154,7 +154,7 @@
                 <li>ssl.truststore.type=JKS</li>
                 <li>ssl.secure.random.implementation=SHA1PRNG</li>
             </ol>
-            If you want to enable SSL for inter-broker communication, add the 
following to the broker properties file (it defaults to PLAINTEXT)
+            If you want to enable SSL for inter-broker communication, add the 
following to the server.properties file (it defaults to PLAINTEXT)
             <pre>
             security.inter.broker.protocol=SSL</pre>
 
@@ -664,13 +664,13 @@
     </ol>
 
     <h3><a id="security_authz" href="#security_authz">7.4 Authorization and 
ACLs</a></h3>
-    Kafka ships with a pluggable Authorizer and an out-of-box authorizer 
implementation that uses zookeeper to store all the acls. Kafka acls are 
defined in the general format of "Principal P is [Allowed/Denied] Operation O 
From Host H On Resource R". You can read more about the acl structure on 
KIP-11. In order to add, remove or list acls you can use the Kafka authorizer 
CLI. By default, if a Resource R has no associated acls, no one other than 
super users is allowed to access R. If you want to change that behavior, you 
can include the following in broker.properties.
+    Kafka ships with a pluggable Authorizer and an out-of-box authorizer 
implementation that uses zookeeper to store all the acls. Kafka acls are 
defined in the general format of "Principal P is [Allowed/Denied] Operation O 
From Host H On Resource R". You can read more about the acl structure on 
KIP-11. In order to add, remove or list acls you can use the Kafka authorizer 
CLI. By default, if a Resource R has no associated acls, no one other than 
super users is allowed to access R. If you want to change that behavior, you 
can include the following in server.properties.
     <pre>allow.everyone.if.no.acl.found=true</pre>
-    One can also add super users in broker.properties like the following (note 
that the delimiter is semicolon since SSL user names may contain comma).
+    One can also add super users in server.properties like the following (note 
that the delimiter is semicolon since SSL user names may contain comma).
     <pre>super.users=User:Bob;User:Alice</pre>
-    By default, the SSL user name will be of the form 
"CN=writeuser,OU=Unknown,O=Unknown,L=Unknown,ST=Unknown,C=Unknown". One can 
change that by setting a customized PrincipalBuilder in broker.properties like 
the following.
+    By default, the SSL user name will be of the form 
"CN=writeuser,OU=Unknown,O=Unknown,L=Unknown,ST=Unknown,C=Unknown". One can 
change that by setting a customized PrincipalBuilder in server.properties like 
the following.
     <pre>principal.builder.class=CustomizedPrincipalBuilderClass</pre>
-    By default, the SASL user name will be the primary part of the Kerberos 
principal. One can change that by setting 
<code>sasl.kerberos.principal.to.local.rules</code> to a customized rule in 
broker.properties.
+    By default, the SASL user name will be the primary part of the Kerberos 
principal. One can change that by setting 
<code>sasl.kerberos.principal.to.local.rules</code> to a customized rule in 
server.properties.
     The format of <code>sasl.kerberos.principal.to.local.rules</code> is a 
list where each rule works in the same way as the auth_to_local in <a 
href="http://web.mit.edu/Kerberos/krb5-latest/doc/admin/conf_files/krb5_conf.html";>Kerberos
 configuration file (krb5.conf)</a>. Each rules starts with RULE: and contains 
an expression in the format [n:string](regexp)s/pattern/replacement/g. See the 
kerberos documentation for more details. An example of adding a rule to 
properly translate u...@mydomain.com to user while also keeping the default 
rule in place is:
     
<pre>sasl.kerberos.principal.to.local.rules=RULE:[1:$1@$0](.*@MYDOMAIN.COM)s/@.*//,DEFAULT</pre>
 

Reply via email to