Overview
AutoMQ is a widely-used tool in enterprise core data links for transmitting vital business data. AutoMQ Cloud provides extensive and flexible security configuration options for the data plane, including identity recognition, permission control, and data encryption. This document outlines the security configuration features supported by AutoMQ on the data plane.
This section only addresses the security configuration of data plane instances. For details on managing member accounts, RBAC, and other aspects related to the BYOC console and the control plane, please refer to the documentation Overview▸.
Identity Recognition
The AutoMQ data plane (AutoMQ instance) offers Kafka API access capabilities and adheres to the identity recognition protocols provided by the Apache Kafka community, supporting the following identity recognition mechanisms.
Recognition Protocol | Description |
---|---|
Anonymous Mode |
It is not recommended to use anonymous mode in production environments. It is advised to perform strict identity verification using protocols such as SASL or mTLS. |
SASL Mode |
|
Mutual TLS (mTLS) |
|
For configuration and usage methods of identity recognition protocols, refer to the following documentation:
Access Control
AutoMQ data plane (AutoMQ instance) provides access to Kafka APIs, following the ACL access control protocol established by the Apache Kafka community to offer permission management capabilities.
For configuration and instructions on Kafka ACLs, refer to Manage Kafka ACLs▸.
Data Protection and Encryption
AutoMQ Cloud provides customers with robust encryption capabilities for data in transit and at rest.
-
Transmission Encryption: As noted in the referenced document, AutoMQ supports the mTLS protocol. When accessing data using mTLS, the transmission link is encrypted via TLS, ensuring data remains secure and protected against leakage during network transmission.
-
Data Encryption at Rest: AutoMQ is built upon cloud storage, inherently supporting data storage encryption. This feature can be enabled when creating an installation in the BYOC console and during the creation of an AutoMQ instance. It supports transparent data encryption using cloud vendor-managed keys.
For configuring data encryption at rest, please refer to Data Encryption at Rest▸.