mTLS authentication aligned with Kafka practices
Security shouldn’t come at the cost of friction. Kafka relies on mTLS for Zero Trust security between clients and brokers. Previously, bridging external consumers to this internal standard required complex certificate management or breaking the mTLS chain at the edge, neither of which aligned with Kafka's architectural assumptions.
That is why Kong Event Gateway 1.1 introduces mTLS authentication that fully aligns with common Kafka practices. Rather than forcing teams into a new model, this approach:
- Works with existing Kafka security patterns: Leverages familiar certificate-based mutual authentication
- Simplifies certificate management: The list of trusted certificate bundles is maintained centrally in Kong Konnect. You can easily manage your trust stores as first-class resources, whether you prefer to click through the UI or deploy via declarative configuration.
- Integrates cleanly into the current platform setups: Creates a secure-by-default communication layer that feels native to Kafka teams.
The result is a secure-by-default communication layer that feels familiar to Kafka teams while still benefiting from Kong’s policy enforcement capabilities.
How it works in practice
The gateway seamlessly handles the mTLS handshake with the consuming client and verifies the certificate against your configured trust store.
Crucially, the gateway doesn't just authenticate the connection; it can also dynamically extract the principal from the client's certificate. You can then use this extracted identity to drive advanced gateway logic, such as applying custom encryption based on the specific client, enforcing strict access policies, or logging the exact identity for downstream auditing.
By handling all of this at the edge, the gateway ensures end-to-end encryption and strict identity verification before a single byte is forwarded, drastically reducing the attack surface of your Kafka clusters while maintaining the architectural purity your infrastructure teams expect.