Describes authorization for Kafka KSQL.
In secure clusters, authorization is enabled by default. In insecure clusters, authorization is disabled by default.
/opt/mapr/ksql/ksql-<version>/etc/ksql/ksql-server.properties file
through the following option:authorization.enable=[true|false]Permissions grant or deny access to users that run commands and maintain background processes that interact with KSQL internal data and structure information, such as persistent queries, tables, streams, and server configuration. Read permission grants users and groups access to FETCH, SHOW, and DESCRIBE . Modify permission grants users and groups access to ADD, UPDATE, and REMOVE.
Each user or group in a cluster can have no permissions, read permission, modify permission, or both read and modify permission to the KSQL service. By default all data-fabric cluster users have both read and modify permissions.
Internally, the authorization filter is based on consumeperms and
produceperms for the KSQL Kafka store internal stream
(/apps/ksql/<service.id>/ksql-internal-stream). Consumeperms
correspond to the KSQL service read permissions. Produceperms correspond
to the KSQL service modify permissions. These permissions can be changed by modifying
the ACE of produceperms and consumeperms for
/apps/ksql/<service.id>/ksql-internal-stream.
The following sections describe KSQL statements that require read and modify access.