Author: more Date: Mon Nov 6 21:12:28 2017 New Revision: 1814442 URL: http://svn.apache.org/viewvc?rev=1814442&view=rev Log: KNOX-1087 - Doc - For Anonymous authentication Auth will not work Modified: knox/site/books/knox-0-14-0/user-guide.html knox/trunk/books/0.14.0/config_authz.md Modified: knox/site/books/knox-0-14-0/user-guide.html URL: http://svn.apache.org/viewvc/knox/site/books/knox-0-14-0/user-guide.html?rev=1814442&r1=1814441&r2=1814442&view=diff ============================================================================== --- knox/site/books/knox-0-14-0/user-guide.html (original) +++ knox/site/books/knox-0-14-0/user-guide.html Mon Nov 6 21:12:28 2017 @@ -2646,7 +2646,23 @@ url -k --header "SM_USER: nobody@ca
    curl -i -k -u sam:sam-password -X GET 'https://localhost:8443/gateway/sandbox/webhdfs/v1/?op=LISTSTATUS' 
 

The command should be executed successfully and you should see the groups ‘scientist’ and ‘analyst’ to which user ‘sam’ belongs to in gateway-audit.log i.e.

    ||a99aa0ab-fc06-48f2-8df3-36e6fe37c230|audit|WEBHDFS|sam|||identity-mapping|principal|sam|success|Groups: [scientist, analyst]
-

Authorization

Service Level Authorization

The Knox Gateway has an out-of-the-box authorization provider that allows administrators to restrict access to the individual services within a Hadoop cluster.

This provider utilizes a simple and familiar pattern of using ACLs to protect Hadoop resources by specifying users, groups and ip addresses that are permitted access.

Configuration

ACLs are bound to services within the topology descriptors by introducing the authorization provider with configuration like:

+ +

Authorization

Service Level Authorization

The Knox Gateway has an out-of-the-box authorization provider that allows administrators to restrict access to the individual services within a Hadoop cluster.

This provider utilizes a simple and familiar pattern of using ACLs to protect Hadoop resources by specifying users, groups and ip addresses that are permitted access.

Note : This feature will not work as expected if ‘anonymous’ authentication is used.

Configuration

ACLs are bound to services within the topology descriptors by introducing the authorization provider with configuration like:

<provider>
     <role>authorization</role>
     <name>AclsAuthz</name>

Modified: knox/trunk/books/0.14.0/config_authz.md
URL: http://svn.apache.org/viewvc/knox/trunk/books/0.14.0/config_authz.md?rev=1814442&r1=1814441&r2=1814442&view=diff
==============================================================================
--- knox/trunk/books/0.14.0/config_authz.md (original)
+++ knox/trunk/books/0.14.0/config_authz.md Mon Nov  6 21:12:28 2017
@@ -1,4 +1,4 @@
-
+-->
 
 ### Authorization ###
 
@@ -23,6 +23,8 @@ The Knox Gateway has an out-of-the-box a
 
 This provider utilizes a simple and familiar pattern of using ACLs to protect Hadoop resources by specifying users, groups and ip addresses that are permitted access.
 
+Note : This feature will not work as expected if 'anonymous' authentication is used. 
+
 #### Configuration ####
 
 ACLs are bound to services within the topology descriptors by introducing the authorization provider with configuration like: