You are viewing a plain text version of this content. The canonical link for it is here.
Posted to issues@hbase.apache.org by "Andrew Purtell (JIRA)" <ji...@apache.org> on 2014/05/12 05:51:16 UTC

[jira] [Resolved] (HBASE-9929) Trusted administration server

     [ https://issues.apache.org/jira/browse/HBASE-9929?page=com.atlassian.jira.plugin.system.issuetabpanels:all-tabpanel ]

Andrew Purtell resolved HBASE-9929.
-----------------------------------

    Resolution: Not a Problem

Seems resolved as not a problem by consensus. Reopen if I have that wrong

> Trusted administration server
> -----------------------------
>
>                 Key: HBASE-9929
>                 URL: https://issues.apache.org/jira/browse/HBASE-9929
>             Project: HBase
>          Issue Type: New Feature
>            Reporter: Andrew Purtell
>
> Some deployments would like to avoid needing kerberos principals for taking administrative actions with the HBase shell, substituting their own authentication. The HBase shell is a regular HBase client, which could run anywhere, and cannot be trusted with simple authentication or impersonation of arbitrary users. 
> Other Hadoop ecosystem components have a service process registered in cluster configuration afforded the elevated privilege of impersonation. For HBase, this could be a trusted administration server that would reside at a fixed location, could be trusted to impersonate, with the shell modified to optionally proxy administrative commands through it.
> Carried over from HBASE-2016 without comment.



--
This message was sent by Atlassian JIRA
(v6.2#6252)