You can use Lightweight Directory Access Protocol (LDAP) users of ApsaraMQ for Confluent instances only after you create them in the ApsaraMQ for Confluent console. This topic describes how to add LDAP users and grant permissions to them.
Manage users
ApsaraMQ for Confluent allows you to add and remove users in the console.
Add a user
Log on to the ApsaraMQ for Confluent console. In the left-side navigation pane, click Instances.
On the Instances page, click the name of the instance that you want to manage.
In the left-side navigation pane of the Instance Details page, click Users.
On the Users page, click Add LDAP User.
In the Add LDAP User panel, specify the username and password and click OK.
ImportantIf you add multiple users with the same username but different passwords, only the first user takes effect.
Remove a user
In the Actions column corresponding to the user that you want to remove, click Delete.
In the message that appears, click OK.
ImportantAfter you delete a user, all permissions granted to the user are removed from the instance and the user can no longer use the instance.
Grant permissions to users
After you create a user in the ApsaraMQ for Confluent console, you can grant permissions to the user using one of the following methods:
Access control list (ACL) authorization: a permission-based authorization mechanism that allows you to grant fine-grained permissions.
Role-based access control (RBAC) authorization: an authorization mechanism suitable for batch authorization and permission revocation scenarios.
ACL authorization
We recommend that you implement ACL authorization using the Confluent CLI. For more information, see Manage ACLs using Confluent CLI.
RBAC authorization
You can use one of the following methods to implement RBAC authorization in ApsaraMQ for Confluent:
Use Control Center of ApsaraMQ for Confluent. In this topic, this method is used.
Use the Confluent CLI. For more information, see Manage RBAC permissions using Confluent CLI.
Log on to the ApsaraMQ for Confluent console. In the left-side navigation pane, click Instances.
On the Instances page, click the name of the instance that you want to manage.
In the upper-right corner of the Instance Details page, click Log on to Console. On the logon page of Control Center, enter your username and password to go to the Home page.
In the upper-right corner of the Home page, choose
> Manage role assignments to go to the RBAC authorization page on which the 10 built-in roles provided by Confluent are listed.
You can grant permissions only to the built-in roles provided by Confluent.

5. Click the Assignments tab. Then, click the ID of the cluster that you want to manage.

Grant permissions to users based on the cluster type.
Kafka cluster
Click the ID of the Kafka cluster and grant permissions to users based on the resource type (Cluster, Group, Topic, and TransactionId). In this example, the
ResourceOwnerrole of topics prefixed withdemois bound to thetestuser.
Click Add role assignment to go to the authorization details page. Then, follow the on-screen instructions to configure the parameters and click Save.

Connect cluster
Click the ID of the Connect cluster and grant permissions to users based on the resource type (Cluster and Connector). In this example, the
ClusterAdminrole of the Connect cluster is bound to thetestuser.
Click Add role assignment to go to the authorization details page. Then, follow the on-screen instructions to configure the parameters and click Save.

KSQL
Click the ID of the KSQL cluster and grant permissions to users based on the resource type (Cluster). In this example, the
ResourceOwnerrole of the KSQL cluster is bound to thetestuser.
Click Add role assignment to go to the authorization details page. Then, follow the on-screen instructions to configure the parameters and click Save.

Schema Registry
Click the ID of the Schema Registry cluster and grant permissions to users based on the resource type (Cluster and Subject). In this example, the
ResourceOwnerrole of all Schema Registry subjects is bound to thetestuser.
Click Add role assignment to go to the authorization details page. Then, follow the on-screen instructions to configure the parameters and click Save.
