This is an automated email from the ASF dual-hosted git repository.
mimaison pushed a commit to branch trunk
in repository https://gitbox.apache.org/repos/asf/kafka.git
The following commit(s) were added to refs/heads/trunk by this push:
new 19b5853565 MINOR: Improve the description of principal under different
mechanisms of sasl (#11947)
19b5853565 is described below
commit 19b585356555374755a84f1651bef9024680df70
Author: RivenSun <[email protected]>
AuthorDate: Fri Apr 15 17:09:20 2022 +0800
MINOR: Improve the description of principal under different mechanisms of
sasl (#11947)
Reviewers: Mickael Maison <[email protected]>
---
docs/security.html | 6 ++++--
1 file changed, 4 insertions(+), 2 deletions(-)
diff --git a/docs/security.html b/docs/security.html
index 8ff9e6d8b6..2a31942662 100644
--- a/docs/security.html
+++ b/docs/security.html
@@ -643,7 +643,7 @@ sasl.kerberos.service.name=kafka</code></pre></li>
<li><h4><a id="security_sasl_plain"
href="#security_sasl_plain">Authentication using SASL/PLAIN</a></h4>
<p>SASL/PLAIN is a simple username/password authentication
mechanism that is typically used with TLS for encryption to implement secure
authentication.
Kafka supports a default implementation for SASL/PLAIN which
can be extended for production use as described <a
href="#security_sasl_plain_production">here</a>.</p>
- The username is used as the authenticated <code>Principal</code>
for configuration of ACLs etc.
+ Under the default implementation of
<code>principal.builder.class</code>, the username is used as the authenticated
<code>Principal</code> for configuration of ACLs etc.
<ol>
<li><h5 class="anchor-heading"><a
id="security_sasl_plain_brokerconfig" class="anchor-link"></a><a
href="#security_sasl_plain_brokerconfig">Configuring Kafka Brokers</a></h5>
<ol>
@@ -712,7 +712,7 @@ sasl.mechanism=PLAIN</code></pre></li>
addresses the security concerns with traditional mechanisms
that perform username/password authentication
like PLAIN and DIGEST-MD5. The mechanism is defined in <a
href="https://tools.ietf.org/html/rfc5802">RFC 5802</a>.
Kafka supports <a
href="https://tools.ietf.org/html/rfc7677">SCRAM-SHA-256</a> and SCRAM-SHA-512
which
- can be used with TLS to perform secure authentication. The
username is used as the authenticated
+ can be used with TLS to perform secure authentication. Under
the default implementation of <code>principal.builder.class</code>, the
username is used as the authenticated
<code>Principal</code> for configuration of ACLs etc. The
default SCRAM implementation in Kafka
stores SCRAM credentials in Zookeeper and is suitable for use
in Kafka installations where Zookeeper
is on a private network. Refer to <a
href="#security_sasl_scram_security">Security Considerations</a>
@@ -806,6 +806,7 @@ sasl.mechanism=SCRAM-SHA-256 (or
SCRAM-SHA-512)</code></pre></li>
The default OAUTHBEARER implementation in Kafka creates and
validates <a href="https://tools.ietf.org/html/rfc7515#appendix-A.5">Unsecured
JSON Web Tokens</a>
and is only suitable for use in non-production Kafka
installations. Refer to <a href="#security_sasl_oauthbearer_security">Security
Considerations</a>
for more details.</p>
+ Under the default implementation of
<code>principal.builder.class</code>, the principalName of OAuthBearerToken is
used as the authenticated <code>Principal</code> for configuration of ACLs etc.
<ol>
<li><h5 class="anchor-heading"><a
id="security_sasl_oauthbearer_brokerconfig" class="anchor-link"></a><a
href="#security_sasl_oauthbearer_brokerconfig">Configuring Kafka
Brokers</a></h5>
<ol>
@@ -1047,6 +1048,7 @@ sasl.mechanism.inter.broker.protocol=GSSAPI (or one of
the other enabled mechani
frameworks to distribute the workload to available workers in
a secure environment without the added cost of distributing
Kerberos TGT/keytabs or keystores when 2-way SSL is used. See
<a
href="https://cwiki.apache.org/confluence/display/KAFKA/KIP-48+Delegation+token+support+for+Kafka">KIP-48</a>
for more details.</p>
+ Under the default implementation of
<code>principal.builder.class</code>, the owner of delegation token is used as
the authenticated <code>Principal</code> for configuration of ACLs etc.
<p>Typical steps for delegation token usage are:</p>
<ol>