-
Can anybody help me to achieve the following ? Lets say i have users A, B, C, D. Users A,B,C are used inside of bigger env, where TCP port is exposed and they should be allowed to all pub and sub - no restrictions on that TCP listener, but user D is connected over TLS listener which is exposed to the world and my goal is that ONLY this user can be authorised on TLS listener and should only be allowed to publish, no subscribe. I tried plenty of approaches with ACL, but no success :( |
Beta Was this translation helpful? Give feedback.
Replies: 3 comments 7 replies
-
Hi. Sounds like clients A, B and C have unrestricted access on the cluster. If that's so, wouldn't it work for you to register all A-D clients in a authenticator (for example, built-in database), and set up an authorizer (for example, file or built-in database) with lax rules for A-C and pub-only for D? i.e., no need to forbid A-C from connecting to the TLS listener, if they are allowed anything. |
Beta Was this translation helpful? Give feedback.
-
AuthenticationYou can set For TLS listener, there are a few ways to allow only desired clients to connect:
AuthorizationTo allow clients connected from TCP listener publish/subscribe any topic they want, it's a bit more complex. SuperuserConfigure authentication for TCP listener and grant clients Use ACL template
Notes:
|
Beta Was this translation helpful? Give feedback.
-
Looks like following approach does the job:
Thank you |
Beta Was this translation helpful? Give feedback.
Looks like following approach does the job: