StreamNative Platform security model uses a flexible design and supports three security options: authentication, authorization, and network encryption.
By default, the state of the Pulsar cluster is wide open and anyone can access it. Any client can communicate to the Pulsar cluster using a plain text service URLs and any connected clients are effectively acting as “superusers” able to perform all actions. This means your messages are coming in clear text without authentication. Your cluster is not secure.
Do not expose your Pulsar cluster on the public internet without first enabling TLS and authorization security on StreamNative Platform.
StreamNative Platform security model uses a flexible design and supports three security options: authentication, authorization, and network encryption.
By default, the state of the Pulsar cluster is wide open and anyone can access it. Any client can communicate to the Pulsar cluster using a plain text service URLs and any connected clients are effectively acting as “superusers” able to perform all actions. This means your messages are coming in clear text without authentication. Your cluster is not secure.
Do not expose your Pulsar cluster on the public internet without first enabling TLS and authorization security on StreamNative Platform.