Skip to content

Latest commit

 

History

History
61 lines (41 loc) · 1.54 KB

README.md

File metadata and controls

61 lines (41 loc) · 1.54 KB

KafkaPlainSaslServer2AD

Enhancing kafka with

  • customized PlainSaslServer using LDAPS simple bind for authentication
  • customized SimpleACLAuthorizer using LDAPS compare-matched for group membership verification

Thus, avoiding user and passwords in JAAS context file on kafka brokers

By defining Read/Write allowance with Active Directory groups, authorization is moved from Zookeeper Access Control Lists to group membership.

Binding and group membership information is cached (limited lifetime after write), giving minor performance penalty and reduced LDAPS traffic.

Tools

  • Kotlin
  • Gradle build tool

Components

  1. Unboundid LDAP SDK for LDAPS interaction
  2. Caffeine Cache
  3. YAML Configuration for LDAP baseDN for users, groups and more. See src/test/resources/ldapconfig.yaml for details

Observe that the directory hosting yaml configuration file must be in CLASSPATH

Kafka configuration examples

Example of JAAS context file on Kafka broker using the customized class for authentication.

KafkaServer{
no.nav.common.security.plain.PlainLoginModule required
username="x"
password="y";
};

Example of Kafka server.properties for using the customized class for authorization.

authorizer.class.name=no.nav.common.security.authorization.SimpleLDAPAuthorizer

Testing

Use of Unboundid in-memory LDAP server for all test cases.

Tested on confluent.io version 4.0.0.

Build

./gradlew clean build
./gradlew shadowJar
./gradlew publish

KafkaPlainSaslServer2AD-a_version-all.jar contains the relevant components only.