Schema Registry Impersonation

Describes impersonation for Kafka Schema Registry.

Impersonation authorizes the impersonated user to perform permission-sensitive operations on the Schema Registry. In secure clusters, impersonation is enabled by default. In insecure clusters, impersonation is disabled by default.

Requirement: For impersonation to work, Schema Registry authentication must be enabled; otherwise, the server will not start and the system will return an error. When authentication is enabled, all commands run as the authenticated user instead of the Schema Registry principal. The Schema Registry principal is the user that started the Schema Registry server.

You can enable or disable impersonation for the Schema Registry in the <schema-registry-client>/etc/schema-registry/schema-registry.properties file through the following option:
impersonation.enable=[true|false]