You are viewing a plain text version of this content. The canonical link for it is here.
Posted to commits@hawq.apache.org by yo...@apache.org on 2017/04/25 00:04:29 UTC

[36/50] [abbrv] incubator-hawq-docs git commit: Removing release designation from Ranger limitations pending voted release

Removing release designation from Ranger limitations pending voted release


Project: http://git-wip-us.apache.org/repos/asf/incubator-hawq-docs/repo
Commit: http://git-wip-us.apache.org/repos/asf/incubator-hawq-docs/commit/c9ead701
Tree: http://git-wip-us.apache.org/repos/asf/incubator-hawq-docs/tree/c9ead701
Diff: http://git-wip-us.apache.org/repos/asf/incubator-hawq-docs/diff/c9ead701

Branch: refs/heads/master
Commit: c9ead701d1d3c0ed3ade1c47f6877141753dd6ed
Parents: 4759d34
Author: David Yozie <yo...@apache.org>
Authored: Wed Apr 5 10:31:25 2017 -0700
Committer: David Yozie <yo...@apache.org>
Committed: Wed Apr 5 10:31:25 2017 -0700

----------------------------------------------------------------------
 markdown/ranger/ranger-overview.html.md.erb | 13 ++++++++-----
 1 file changed, 8 insertions(+), 5 deletions(-)
----------------------------------------------------------------------


http://git-wip-us.apache.org/repos/asf/incubator-hawq-docs/blob/c9ead701/markdown/ranger/ranger-overview.html.md.erb
----------------------------------------------------------------------
diff --git a/markdown/ranger/ranger-overview.html.md.erb b/markdown/ranger/ranger-overview.html.md.erb
index f88a093..bfda4e8 100644
--- a/markdown/ranger/ranger-overview.html.md.erb
+++ b/markdown/ranger/ranger-overview.html.md.erb
@@ -37,12 +37,15 @@ A single configuration parameter, `hawq_acl_type` determines whether HAWQ defers
 
 The Ranger plug-in service caches Ranger policies locally on each HAWQ node to avoid unnecessary round trips between the HAWQ node and the Ranger Policy Manager server.
 
-## <a id="limitations"></a>Limitations of Ranger Policy Management in HAWQ 2.2.0.0-incubating
-Neither Kerberos authentication nor SSL encryption is supported between a HAWQ node and the Ranger plug-in service, or between the plug-in service and the Ranger Policy Manager.
+## <a id="limitations"></a>Limitations of Ranger Policy Management
 
-The Ranger plug-in service is not compatible with Highly-Available HAWQ deployments. Should you need to activate the standby master in your HAWQ cluster, you must manually update the HAWQ Ranger service definition with the new master node connection information.
+In this release, HAWQ integration with Ranger has several limitations:
 
-Ranger User Group policies cannot be used with HAWQ in this release. Only User Policies are currently supported.
+- Neither Kerberos authentication nor SSL encryption is supported between a HAWQ node and the Ranger plug-in service, or between the plug-in service and the Ranger Policy Manager.
 
-Some authorization checks for superuser-restricted authorization events are handled by HAWQ natively, even when Ranger integration is enabled. See [HAWQ-Native Authorization](../clientaccess/hawq-access-checks.html#alwaysnative).
+- The Ranger plug-in service is not compatible with Highly-Available HAWQ deployments. Should you need to activate the standby master in your HAWQ cluster, you must manually update the HAWQ Ranger service definition with the new master node connection information.
+
+- Ranger User Group policies cannot be used with HAWQ in this release. Only User Policies are currently supported.
+
+- Some authorization checks for superuser-restricted authorization events are handled by HAWQ natively, even when Ranger integration is enabled. See [HAWQ-Native Authorization](../clientaccess/hawq-access-checks.html#alwaysnative).