You are viewing a plain text version of this content. The canonical link for it is here.
Posted to dev@hive.apache.org by "Shivaraju Gowda (JIRA)" <ji...@apache.org> on 2014/02/22 04:59:19 UTC

[jira] [Updated] (HIVE-6486) Support secure Subject.doAs() in HiveServer2 JDBC client.

     [ https://issues.apache.org/jira/browse/HIVE-6486?page=com.atlassian.jira.plugin.system.issuetabpanels:all-tabpanel ]

Shivaraju Gowda updated HIVE-6486:
----------------------------------

    Status: Patch Available  (was: Open)

Usage :
 Add "identityContext=fromKerberosSubject" in the URL to enable it
Ex: "jdbc:hive2://hive.example.com:10000/default;principal=hive/localhost.localdomain@EXAMPLE.COM;identityContext=fromKerberosSubject";


> Support secure Subject.doAs() in HiveServer2 JDBC client.
> ---------------------------------------------------------
>
>                 Key: HIVE-6486
>                 URL: https://issues.apache.org/jira/browse/HIVE-6486
>             Project: Hive
>          Issue Type: Improvement
>          Components: JDBC
>    Affects Versions: 0.12.0, 0.11.0
>            Reporter: Shivaraju Gowda
>
> HIVE-5155 addresses the problem of kerberos authentication in multi-user middleware server using proxy user.  In this mode the principal used by the middle ware server has privileges to impersonate selected users in Hive/Hadoop. 
> This enhancement is to support Subject.doAs() authentication in  Hive JDBC layer so that the end users Kerberos Subject is passed through in the middle ware server. With this improvement there won't be any additional setup in the server to grant proxy privileges to some users and there won't be need to specify a proxy user in the JDBC client. This version should also be more secure since it won't require principals with the privileges to impersonate other users in Hive/Hadoop setup.
>  



--
This message was sent by Atlassian JIRA
(v6.1.5#6160)