- 
                Notifications
    You must be signed in to change notification settings 
- Fork 47
Doc 1500 ephemeral auth #1210
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Doc 1500 ephemeral auth #1210
Changes from 2 commits
2a3ca40
              0eb3704
              f9a7883
              c198f6a
              2e0d279
              f3cfe14
              31edeb2
              e5a07f1
              2092749
              0e40080
              f019a52
              fdb8a2c
              cb4a1e7
              File filter
Filter by extension
Conversations
Jump to
Diff view
Diff view
There are no files selected for viewing
| Original file line number | Diff line number | Diff line change | 
|---|---|---|
|  | @@ -657,10 +657,19 @@ endif::[] | |
|  | ||
| Schema Registry and HTTP Proxy connect to Redpanda over the Kafka API. For the Kafka username and password, Redpanda uses ephemeral credentials internal to the cluster. Ephemeral credentials are regular SCRAM credentials, but they're only stored in memory and are lost when a broker restarts. When the Schema Registry or HTTP Proxy start up, they broadcast an ephemeral credential to other brokers over the internal RPC. If authentication fails to a particular broker, new ephemeral credentials are sent to that broker, and the service reconnects. | ||
|  | ||
| [IMPORTANT] | ||
| There was a problem hiding this comment. Choose a reason for hiding this commentThe reason will be displayed to describe this comment to others. Learn more. I am checking this part with the Kubernetes team to see what we currently do. Either way, we'll need to update the paragraph before this section because we will no longer be using ephemeral credentials. cc @chrisseto There was a problem hiding this comment. Choose a reason for hiding this commentThe reason will be displayed to describe this comment to others. Learn more. oooooooooh, dear. This is probably going to break some things... AFAIK we set  There was a problem hiding this comment. Choose a reason for hiding this commentThe reason will be displayed to describe this comment to others. Learn more. We should really be enabling auth on pandaproxy and kafka API together. The fact that most people don't use pandaproxy and just leave it alone probably means there are a bunch of clusters that have root access to their cluster exposed via pandaproxy. 
 Yeah, but it's for better security and TBH I really suspect very few people actually use the HTTP proxy for anything. There was a problem hiding this comment. Choose a reason for hiding this commentThe reason will be displayed to describe this comment to others. Learn more. 
 TBH the right fix is not to generate passwords IMO, but to enable auth for HTTP proxy. | ||
| ==== | ||
| *Breaking change in Redpanda 25.2:* Ephemeral credentials for HTTP Proxy are removed. If your HTTP Proxy API listeners use `authentication_method: none`, you must configure explicit SASL credentials for HTTP Proxy to authenticate with the Kafka API. Without these credentials, HTTP Proxy attempts unauthenticated connections. | ||
|  | ||
| Redpanda Data recommends configuring authentication for HTTP Proxy to ensure secure communication with the Kafka API. | ||
|  | ||
| This change does not affect Schema Registry, which continues to use ephemeral credentials. | ||
|         
                  paulohtb6 marked this conversation as resolved.
              Outdated
          
            Show resolved
            Hide resolved | ||
| ==== | ||
|  | ||
| Schema Registry and HTTP Proxy support only the SASL/SCRAM mechanism. | ||
|  | ||
| ifndef::env-kubernetes[] | ||
| You can override the ephemeral credentials and manually configure Schema Registry and HTTP Proxy to connect to Redpanda with SASL. This approach is particularly useful when you want to apply specific access control through ACLs for the Schema Registry and HTTP Proxy users. | ||
| Starting in Redpanda 25.2, you must manually configure HTTP Proxy to connect to Redpanda with SASL when HTTP Proxy API listeners use `authentication_method: none`. For Schema Registry, you can override the ephemeral credentials and manually configure Schema Registry to connect to Redpanda with SASL. This approach is particularly useful when you want to apply specific access control through ACLs for the Schema Registry and HTTP Proxy users. | ||
|         
                  Feediver1 marked this conversation as resolved.
              Outdated
          
            Show resolved
            Hide resolved | ||
|  | ||
| . xref:manage:security/authorization/index.adoc[Create appropriate ACLs] for the Schema Registry and HTTP Proxy users to define and restrict their access rights within the Redpanda cluster. | ||
|  | ||
|  | @@ -698,7 +707,22 @@ schema_registry_client: | |
| sasl_mechanism: SCRAM-SHA-256 | ||
| ---- | ||
| + | ||
| For HTTP Proxy: | ||
| For HTTP Proxy (required when `authentication_method: none` starting in Redpanda 25.2): | ||
| + | ||
| [,yaml] | ||
| ---- | ||
| pandaproxy_client: | ||
| brokers: | ||
| - address: 127.0.0.1 | ||
| port: 9092 | ||
| scram_username: <username> | ||
| scram_password: <password> | ||
| sasl_mechanism: SCRAM-SHA-256 | ||
| ---- | ||
| + | ||
| When HTTP Proxy API listeners use `authentication_method: none`, the HTTP Proxy client uses these credentials to authenticate with the Kafka API. The user specified in `scram_username` must have appropriate permissions to access the required Kafka resources. | ||
| + | ||
| If TLS is enabled for the Kafka API, additional configuration is required: | ||
| + | ||
| [,yaml] | ||
| ---- | ||
|  | @@ -1757,6 +1781,11 @@ For all available endpoints, see xref:api:ROOT:pandaproxy-schema-registry.adoc[] | |
|  | ||
| To disable authentication for a listener, set `authentication_method` to `none`: | ||
|  | ||
| [IMPORTANT] | ||
| ==== | ||
| *Breaking change in Redpanda 25.2:* When HTTP Proxy API listeners use `authentication_method: none`, you must configure explicit SASL credentials for HTTP Proxy to authenticate with the Kafka API. Configure the `pandaproxy_client` properties: `scram_username`, `scram_password`, and `sasl_mechanism`. Without these credentials, HTTP Proxy will attempt unauthenticated connections to the Kafka API. Redpanda Data recommends configuring authentication for HTTP Proxy. For more information, see xref:reference:properties/broker-properties.adoc#scram_username[HTTP Proxy Client properties]. | ||
| ==== | ||
|  | ||
| ifdef::env-kubernetes[] | ||
| [tabs] | ||
| ====== | ||
|  | ||
Uh oh!
There was an error while loading. Please reload this page.