You are viewing a plain text version of this content. The canonical link for it is here.
Posted to issues-all@impala.apache.org by "Tim Armstrong (Jira)" <ji...@apache.org> on 2020/03/12 04:49:00 UTC

[jira] [Resolved] (IMPALA-9456) Allow disabling kerberos for incoming internal and external connections even if --principal is set

     [ https://issues.apache.org/jira/browse/IMPALA-9456?page=com.atlassian.jira.plugin.system.issuetabpanels:all-tabpanel ]

Tim Armstrong resolved IMPALA-9456.
-----------------------------------
    Fix Version/s: Impala 3.4.0
       Resolution: Fixed

> Allow disabling kerberos for incoming internal and external connections even if --principal is set
> --------------------------------------------------------------------------------------------------
>
>                 Key: IMPALA-9456
>                 URL: https://issues.apache.org/jira/browse/IMPALA-9456
>             Project: IMPALA
>          Issue Type: Improvement
>          Components: Backend
>            Reporter: Tim Armstrong
>            Assignee: Tim Armstrong
>            Priority: Major
>              Labels: kerberos, security
>             Fix For: Impala 3.4.0
>
>
> This would be useful in cases where we need to talk to kerberized services (HMS, etc) and want to keep our TGT up to date using Impala's kinit infrastructure, but don't want to kerberize all connections.



--
This message was sent by Atlassian Jira
(v8.3.4#803005)

---------------------------------------------------------------------
To unsubscribe, e-mail: issues-all-unsubscribe@impala.apache.org
For additional commands, e-mail: issues-all-help@impala.apache.org