Security in Event Stream Processor

Security in Event Stream Processor is managed centrally, by the cluster manager. All projects running in a cluster are subject to the security rules defined for that cluster.

Event Stream Processor integrates with existing Kerberos and LDAP security systems and provides built-in RSA certificate-based security. If you use RSA for security, users requesting server connections are required to provide a valid RSA key alias, keystore which contains a private key, and the password of the keystore. If you use LDAP or Kerberos for your security, users must have an LDAP or Kerberos user name and password.

LDAP supports role-based policy configuration. Further refine your security implementation by defining policies that provide or restrict access to a project or its resources, based on role. For example, you can define an administrator role that allows full access to all projects.