You are viewing a plain text version of this content. The canonical link for it is here.
Posted to dev@hbase.apache.org by "Josh Elser (Jira)" <ji...@apache.org> on 2022/01/13 22:23:00 UTC
[jira] [Created] (HBASE-26667) Integrate user-experience for hbase-client
Josh Elser created HBASE-26667:
----------------------------------
Summary: Integrate user-experience for hbase-client
Key: HBASE-26667
URL: https://issues.apache.org/jira/browse/HBASE-26667
Project: HBase
Issue Type: Sub-task
Reporter: Josh Elser
Fix For: HBASE-26553
Today, we have two mechanism in order to get the tokens needed to authenticate:
# Kerberos, we rely on a Kerberos ticket being present in a well-known location (defined by JVM properties) or via programmatic invocation of UserGroupInformation
# Delegation tokens, we rely on special API to be called (our mapreduce API) which loads the token into the current UserGroupInformation "context" (the JAAS PrivilegedAction).
The JWT bearer token approach is very similar to the delegation token mechanism, but HBase does not generate this JWT (as we do with delegation tokens). How does a client provide this token to the hbase-client (i.e. {{ConnectionFactory.getConnection()}} or a {{UserGroupInformation}} call)? We should be mindful of all of the different "entrypoints" to HBase ({{{}hbase ...{}}} commands, {{java -cp}} commands, Phoenix commands, Spark comands, etc). Our solution should be effective for all of these approaches and not require downstream changes.
--
This message was sent by Atlassian Jira
(v8.20.1#820001)