ranger-dev mailing list archives

Site index · List index
Message view « Date » · « Thread »
Top « Date » · « Thread »
From "Mehul Parikh (JIRA)" <j...@apache.org>
Subject [jira] [Created] (RANGER-973) Kerberos : Ranger Admin to perform Key operations using Principal / keytab of RangerAdmin from UI
Date Fri, 06 May 2016 10:13:12 GMT
Mehul Parikh created RANGER-973:
-----------------------------------

             Summary: Kerberos : Ranger Admin to perform Key operations using Principal /
keytab of RangerAdmin from UI
                 Key: RANGER-973
                 URL: https://issues.apache.org/jira/browse/RANGER-973
             Project: Ranger
          Issue Type: Bug
          Components: admin, kms
    Affects Versions: 0.6.0
            Reporter: Mehul Parikh
            Assignee: Ankita Sinha
             Fix For: 0.6.0


+*Problem Statement :*+
Currently even in kerberos environment Ranger admin sends request using repo config user.
As now Ranger Admin and Ranger KMS are working in kerberos environment, request for key operations
from UI needs to go using ranger admin credentials. 

+*Need to improve following features:*+
1. KMS to use rangeradmin credentials for test connection, resource lookup and for encrytpion
key operation from Ranger admin UI Encryption tab.

2. Download Policy Session Log was created in every policy refresher call, so in x_auth_session
it is getting bulk of downloadpolicy session log.

3. To add ambari service check user in default policy using service config custom property






--
This message was sent by Atlassian JIRA
(v6.3.4#6332)

Mime
View raw message