You are viewing a plain text version of this content. The canonical link for it is here.
Posted to mapreduce-issues@hadoop.apache.org by "Benoy Antony (JIRA)" <ji...@apache.org> on 2017/10/16 19:43:00 UTC
[jira] [Resolved] (MAPREDUCE-4551) Key Protection : Add ability to
read keys and protect keys in JobClient and TTS/NodeManagers
[ https://issues.apache.org/jira/browse/MAPREDUCE-4551?page=com.atlassian.jira.plugin.system.issuetabpanels:all-tabpanel ]
Benoy Antony resolved MAPREDUCE-4551.
-------------------------------------
Resolution: Won't Do
Cleaning up jiras which is not relevant anymore.
> Key Protection : Add ability to read keys and protect keys in JobClient and TTS/NodeManagers
> -----------------------------------------------------------------------------------------------
>
> Key: MAPREDUCE-4551
> URL: https://issues.apache.org/jira/browse/MAPREDUCE-4551
> Project: Hadoop Map/Reduce
> Issue Type: Sub-task
> Components: job submission, security
> Reporter: Benoy Antony
> Assignee: Benoy Antony
> Attachments: MR_4551_1_1.patch, MR_4551_trunk.patch
>
>
> Based on Cluster configuration, NodeManager/TaskTrackers set up Decrypters to decrypt the job's secrets.
> Based on Job configuration, JobClient reads secrets from a KeyStore using a Keyprovider implementation and encrypts them using the cluster's public key.
> The encrypted secrets are stored in Job Credentials.
> The task addresses the following requirements:
> • Plug in different key store mechanisms.
> • Retrieve specified keys from a configured keystore as part of job submission
> • Protect keys during its transport through the cluster.
> • Make sure that keys are handed over only to the tasks of the correct job.
--
This message was sent by Atlassian JIRA
(v6.4.14#64029)
---------------------------------------------------------------------
To unsubscribe, e-mail: mapreduce-issues-unsubscribe@hadoop.apache.org
For additional commands, e-mail: mapreduce-issues-help@hadoop.apache.org