ranger-dev mailing list archives

Site index · List index
Message view « Date » · « Thread »
Top « Date » · « Thread »
From "Ankita Sinha (JIRA)" <j...@apache.org>
Subject [jira] [Updated] (RANGER-973) Kerberos : Ranger Admin to perform Key operations using Principal / keytab of RangerAdmin from UI
Date Fri, 06 May 2016 10:16:12 GMT

     [ https://issues.apache.org/jira/browse/RANGER-973?page=com.atlassian.jira.plugin.system.issuetabpanels:all-tabpanel
]

Ankita Sinha updated RANGER-973:
--------------------------------
    Attachment: RANGER-973.patch

> Kerberos : Ranger Admin to perform Key operations using Principal / keytab of RangerAdmin
from UI
> -------------------------------------------------------------------------------------------------
>
>                 Key: RANGER-973
>                 URL: https://issues.apache.org/jira/browse/RANGER-973
>             Project: Ranger
>          Issue Type: Bug
>          Components: admin, kms
>    Affects Versions: 0.6.0
>            Reporter: Mehul Parikh
>            Assignee: Ankita Sinha
>             Fix For: 0.6.0
>
>         Attachments: RANGER-973.patch
>
>
> +*Problem Statement :*+
> Currently even in kerberos environment Ranger admin sends request using repo config user.
As now Ranger Admin and Ranger KMS are working in kerberos environment, request for key operations
from UI needs to go using ranger admin credentials. 
> +*Need to improve following features:*+
> 1. KMS to use rangeradmin credentials for test connection, resource lookup and for encrytpion
key operation from Ranger admin UI Encryption tab.
> 2. Download Policy Session Log was created in every policy refresher call, so in x_auth_session
it is getting bulk of downloadpolicy session log.
> 3. To add ambari service check user in default policy using service config custom property



--
This message was sent by Atlassian JIRA
(v6.3.4#6332)

Mime
View raw message