You are viewing a plain text version of this content. The canonical link for it is here.
Posted to dev@ranger.apache.org by "Mehul Parikh (JIRA)" <ji...@apache.org> on 2016/05/06 10:13:12 UTC

[jira] [Created] (RANGER-973) Kerberos : Ranger Admin to perform Key operations using Principal / keytab of RangerAdmin from UI

Mehul Parikh created RANGER-973:
-----------------------------------

             Summary: Kerberos : Ranger Admin to perform Key operations using Principal / keytab of RangerAdmin from UI
                 Key: RANGER-973
                 URL: https://issues.apache.org/jira/browse/RANGER-973
             Project: Ranger
          Issue Type: Bug
          Components: admin, kms
    Affects Versions: 0.6.0
            Reporter: Mehul Parikh
            Assignee: Ankita Sinha
             Fix For: 0.6.0


+*Problem Statement :*+
Currently even in kerberos environment Ranger admin sends request using repo config user. As now Ranger Admin and Ranger KMS are working in kerberos environment, request for key operations from UI needs to go using ranger admin credentials. 

+*Need to improve following features:*+
1. KMS to use rangeradmin credentials for test connection, resource lookup and for encrytpion key operation from Ranger admin UI Encryption tab.

2. Download Policy Session Log was created in every policy refresher call, so in x_auth_session it is getting bulk of downloadpolicy session log.

3. To add ambari service check user in default policy using service config custom property






--
This message was sent by Atlassian JIRA
(v6.3.4#6332)