Skip to content

Settings and activity

9 results found

  1. 3 votes

    We're glad you're here

    Please sign in to leave feedback

    Signed in as (Sign out)

    We’ll send you updates on this idea

    How important is this to you?

    We're glad you're here

    Please sign in to leave feedback

    Signed in as (Sign out)
    An error occurred while saving the comment
    Shaun Killingbeck commented  · 

    Similarly, the event log for ACL deletion should state the user, resource and permission of the ACL (like the ACL creation log) and not just the ID - the random ID of a deleted ACL isn't much use after the fact for debugging issues, because there's no way at that point to know what the ACL used to do

    Shaun Killingbeck supported this idea  · 
  2. 6 votes

    We're glad you're here

    Please sign in to leave feedback

    Signed in as (Sign out)

    We’ll send you updates on this idea

    How important is this to you?

    We're glad you're here

    Please sign in to leave feedback

    Signed in as (Sign out)
    An error occurred while saving the comment
    Shaun Killingbeck commented  · 

    We've needed this feature for a very long time, and had to invest a lot of engineering effort working around it (which has in turn created a lot of additional complexity and tech debt)

    The Aiven platform already has this feature for certificate expiry, so extending the same/similar to resetting credentials would be ideal (though it would need to be optional, e.g. in case the credentials were being reset due to being leaked)

    Shaun Killingbeck supported this idea  · 
  3. 8 votes

    We're glad you're here

    Please sign in to leave feedback

    Signed in as (Sign out)

    We’ll send you updates on this idea

    How important is this to you?

    We're glad you're here

    Please sign in to leave feedback

    Signed in as (Sign out)
    Shaun Killingbeck supported this idea  · 
  4. 22 votes

    We're glad you're here

    Please sign in to leave feedback

    Signed in as (Sign out)

    We’ll send you updates on this idea

    How important is this to you?

    We're glad you're here

    Please sign in to leave feedback

    Signed in as (Sign out)
    Shaun Killingbeck supported this idea  · 
  5. 12 votes

    We're glad you're here

    Please sign in to leave feedback

    Signed in as (Sign out)

    We’ll send you updates on this idea

    How important is this to you?

    We're glad you're here

    Please sign in to leave feedback

    Signed in as (Sign out)
    Shaun Killingbeck shared this idea  · 
  6. 2 votes

    We're glad you're here

    Please sign in to leave feedback

    Signed in as (Sign out)

    We’ll send you updates on this idea

    How important is this to you?

    We're glad you're here

    Please sign in to leave feedback

    Signed in as (Sign out)
    Shaun Killingbeck supported this idea  · 
  7. 8 votes

    We're glad you're here

    Please sign in to leave feedback

    Signed in as (Sign out)

    We’ll send you updates on this idea

    How important is this to you?

    We're glad you're here

    Please sign in to leave feedback

    Signed in as (Sign out)
    Shaun Killingbeck supported this idea  · 
  8. 11 votes

    We're glad you're here

    Please sign in to leave feedback

    Signed in as (Sign out)

    We’ll send you updates on this idea

    How important is this to you?

    We're glad you're here

    Please sign in to leave feedback

    Signed in as (Sign out)
    Shaun Killingbeck supported this idea  · 
  9. 8 votes

    We're glad you're here

    Please sign in to leave feedback

    Signed in as (Sign out)

    We’ll send you updates on this idea

    How important is this to you?

    We're glad you're here

    Please sign in to leave feedback

    Signed in as (Sign out)
    An error occurred while saving the comment
    Shaun Killingbeck commented  · 

    Absence of this feature makes it infeasible to use OIDC with Kafka, since currently Schema Registry auth would still need to use a different mechanism (negating the value of adopting OIDC)

    Shaun Killingbeck supported this idea  ·