You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: modules/get-started/pages/whats-new-cloud.adoc
+6Lines changed: 6 additions & 0 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -9,6 +9,12 @@ This page lists new features added to Redpanda Cloud.
9
9
10
10
== July 2025
11
11
12
+
=== mTLS and SASL authentication for Kafka API on AWS
13
+
14
+
You can now enable mTLS and SASL authentication simultaneously for the Kafka API on AWS clusters. If you enable both mTLS and SASL on AWS clusters, Redpanda creates two distinct listeners: an mTLS listener operating on one port and a SASL listener operating on a different port.
15
+
16
+
See xref:security:cloud-authentication.adoc#service-authentication[Authentication] for details on available authentication methods in Redpanda Cloud.
17
+
12
18
=== Azure Private Link in the UI: GA
13
19
14
20
You can now xref:networking:azure-private-link-in-ui.adoc[configure Azure Private Link] for a new BYOC or Dedicated cluster using the Cloud UI. The Azure Private Link service is generally available (GA) in both the Cloud UI and the Cloud API.
Copy file name to clipboardExpand all lines: modules/security/pages/cloud-authentication.adoc
+24-16Lines changed: 24 additions & 16 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -68,14 +68,22 @@ Each Redpanda Cloud data plane runs its own dedicated agent,
68
68
which authenticates and connects against the control plane over a single TLS 1.2
69
69
encrypted TCP connection.
70
70
71
-
Different Redpanda APIs support different authentication methods. For GCP, you can simultaneously enable mTLS and SASL for Kafka API, and mTLS and Basic authentication for the HTTP APIs (HTTP Proxy and Schema Registry). If you enable both mTLS and SASL on GCP clusters, Redpanda creates two distinct listeners: an mTLS listener operating on one port and a SASL listener operating on a different port.
71
+
Different Redpanda APIs support different authentication methods:
72
72
73
-
.Redpanda APIs authentication methods
73
+
* Kafka API: Redpanda Cloud supports both SASL (over TLS 1.2) and <<mtls,mTLS>> authentication for Kafka clients connecting to Redpanda clusters over the TCP endpoint or listener.
74
+
* HTTP Proxy and Schema Registry: Redpanda Cloud supports HTTP Basic Authentication (encrypted over TLS 1.2) and <<mtls,mTLS>> for client authentication.
75
+
76
+
For AWS and GCP, you can simultaneously enable mTLS and SASL for Kafka API, and mTLS and Basic authentication for the HTTP APIs (HTTP Proxy and Schema Registry). If you enable both mTLS and SASL, Redpanda creates two distinct listeners: an mTLS listener operating on one port and a SASL listener operating on a different port.
over TLS 1.2 as well as <<mtls,mTLS>> to authenticate Kafka clients connecting to Redpanda clusters over
135
-
the TCP endpoint or listener.
136
-
* HTTP Proxy and Schema Registry: Authentication is done through an
137
-
HTTP Basic Authentication header encrypted over TLS 1.2.
138
-
139
141
The following features use IAM policies to generate
140
142
dynamic and short-lived credentials to interact with cloud provider APIs:
141
143
@@ -163,7 +165,7 @@ If you want to enable mTLS authentication:
163
165
* You must use the Cloud API to create a new mTLS-enabled cluster.
164
166
* You must also use the Cloud API to update an existing cluster to switch to mTLS authentication for Kafka API.
165
167
* You can use the Cloud UI to update an existing cluster to switch to mTLS authentication for HTTP Proxy and Schema Registry only.
166
-
* To enable mTLS and SASL (or Basic authentication) simultaneously on GCP clusters, you must use the Cloud API to create a new cluster or update an existing cluster.
168
+
* To enable mTLS and SASL (or Basic authentication) simultaneously, you must use the Cloud API to create a new cluster or update an existing cluster.
167
169
168
170
To configure service authentication in your cluster using the Cloud API, you must have the following:
169
171
@@ -224,7 +226,7 @@ NOTE: The following example enables mTLS for Kafka API. To enable mTLS for HTTP
224
226
CLUSTER_CREATE_BODY=`cat << EOF
225
227
{
226
228
"cluster": {
227
-
"cloud_provider": "CLOUD_PROVIDER_GCP",
229
+
"cloud_provider": "<cloud-provider>",
228
230
"connection_type": "CONNECTION_TYPE_PRIVATE",
229
231
"name": "<cluster-name>",
230
232
"resource_group_id": "<resource-group-id>",
@@ -258,6 +260,9 @@ Make sure to replace the following variables:
258
260
|`<cluster-id>`
259
261
|ID of the Redpanda cluster.
260
262
263
+
|`<cloud-provider>`
264
+
|Cloud provider for the cluster (`CLOUD_PROVIDER_AWS` or `CLOUD_PROVIDER_GCP`).
265
+
261
266
|`<cluster-name>`
262
267
|Name of the Redpanda cluster.
263
268
@@ -274,7 +279,7 @@ Make sure to replace the following variables:
274
279
|The zones where the cluster is created. For example, `["us-central1-a", "us-central1-b", "us-central1-c"]`.
275
280
276
281
|`<tier>`
277
-
|The usage tier of the cluster. For example, .
282
+
|The xref:reference:tiers/index.adoc[usage tier of the cluster].
278
283
279
284
|`<cluster-type>`
280
285
|The Redpanda cluster type, `TYPE_BYOC` or `TYPE_DEDICATED`.
@@ -364,7 +369,7 @@ When the operation state is `COMPLETED`, you can <<verify-mtls,verify that mTLS
364
369
365
370
=== Enable mTLS and SASL
366
371
367
-
NOTE: Enabling mTLS and SASL simultaneously is available for GCP clusters only. To unlock this feature for your account, contact your Customer Success Manager.
372
+
NOTE: You can enable mTLS and SASL simultaneously for AWS and GCP clusters only. To unlock this feature for your account, contact your Customer Success Manager.
368
373
369
374
You can choose to enable mTLS and SASL simultaneously for the Kafka API, and mTLS and Basic authentication for HTTP Proxy and Schema Registry. The `sasl` field in the API request examples toggle both SASL and Basic authentication.
370
375
@@ -384,7 +389,7 @@ You can enable mTLS and SASL or Basic authentication for any combination of the
384
389
CLUSTER_CREATE_BODY=`cat << EOF
385
390
{
386
391
"cluster": {
387
-
"cloud_provider": "CLOUD_PROVIDER_GCP",
392
+
"cloud_provider": "<cloud-provider>",
388
393
"connection_type": "CONNECTION_TYPE_PRIVATE",
389
394
"name": "<cluster-name>",
390
395
"resource_group_id": "<resource-group-id>",
@@ -439,6 +444,9 @@ Make sure to replace the following variables:
439
444
|`<cluster-id>`
440
445
|ID of Redpanda cluster.
441
446
447
+
|`<cloud-provider>`
448
+
|Cloud provider for the cluster (`CLOUD_PROVIDER_AWS` or `CLOUD_PROVIDER_GCP`).
449
+
442
450
|`<cluster-name>`
443
451
|Name of the Redpanda cluster.
444
452
@@ -455,7 +463,7 @@ Make sure to replace the following variables:
455
463
|The zones where the cluster is created. For example, `["us-central1-a", "us-central1-b", "us-central1-c"]`.
456
464
457
465
|`<tier>`
458
-
|The usage tier of the cluster. For example, .
466
+
|The xref:reference:tiers/index.adoc[usage tier of the cluster].
459
467
460
468
|`<cluster-type>`
461
469
|The Redpanda cluster type, `TYPE_BYOC` or `TYPE_DEDICATED`.
0 commit comments