Apr 14, 2025
This guide provides the necessary steps to configure Metadata Service (MDS) for OAuth authentication in Confluent Platform clusters. It covers configurations to support OAuth with and without LDAP, and for CLI SSO, as well as configuring MDS clients.
Configuration Settings for OAuth on MDS:
confluent.metadata.server.oauthbearer.jwks.endpoint.url=<idp-jwks-endpoint>confluent.metadata.server.oauthbearer.expected.issuer=<idp-issuer>confluent.metadata.server.oauthbearer.expected.audience=Confluent,api://default,https://my-company.comconfluent.metadata.server.oauthbearer.sub.claim.name=subconfluent.metadata.server.oauthbearer.groups.claim.name=groupsTruststore Configuration
confluent.metadata.server.user.store=OAUTHconfluent.metadata.server.user.store=LDAP_WITH_OAUTHconfluent.oidc.idp.device.authorization.endpoint.uri=<idp-device-auth-endpoint>curl -X POST \
-H "Authorization: Basic <base-64-encoded client-id:client-secret>" \
-H "Content-Type: application/x-www-form-urlencoded" \
-d "grant_type=client_credentials" \
-d "scope=groups" \
<idp-token-endpoint>
Authorization when calling MDS.curl -X GET "http://localhost:8090/security/1.0/roles" \
-H "accept: application/json" \
-H "Authorization: Bearer <bearer-token>"