When the security protocol of CKafka is set to SASL_SSL, SSL certificates will be used to encrypt data during transmission between the client and the CKafka instance, preventing data from being intercepted or eavesdropped on during network transmission and thereby enhancing data security.
By default, SSL certificates are provided by the server. You can also use custom certificates. This document describes how to configure custom certificates.
Constraints and Limitations
1. Only Pro Edition instances support using SASL_SSL access points and configuring custom SSL certificates.
2. Encryption algorithm of custom certificates.
Currently, only certificates with the following encryption algorithms are supported.
RSA |
| ECC |
|
2048 | 4096 | prime256v1 | secp384r1 |
3. Only one-way authentication certificates are supported.
Only one-way authentication certificates are supported, and two-way authentication certificates are not supported.
4. Replacement of expiring custom certificates.
It is recommended that you select certificates with a long validity period. Currently, replacing custom certificates through a productized approach is not supported. If needed, contact us through after-sales channels.
5. Domain name verification.
Domain name verification for custom certificates is not supported. Clients are required to disable domain name verification.
Step 1: Preparing an SSL Certificate
CKafka supports loading certificates managed in SSL Certificates. First, complete the management of a self-signed certificate or purchase a certificate in the SSL Certificates console. For specific steps, see Getting Started with SSL Certificates. Step 2: Configuring a Custom SSL Certificate
When purchasing a Pro Edition instance, enable Custom SSL Certificate Customization and select the appropriate certificate. You can only select certificates in the Issued status. For specific steps on purchasing a cluster, see Creating an Instance. Step 3: Enabling an SASL_SSL Access Point
Step 4: Using a Client to Send and Receive Messages