You are viewing a plain text version of this content. The canonical link for it is here.
Posted to dev@knox.apache.org by "Dilli Arumugam (JIRA)" <ji...@apache.org> on 2013/07/18 23:06:51 UTC

[jira] [Updated] (KNOX-25) Access Kerberos secured Hadoop cluster via gateway using SPNEGO from browser

     [ https://issues.apache.org/jira/browse/KNOX-25?page=com.atlassian.jira.plugin.system.issuetabpanels:all-tabpanel ]

Dilli Arumugam updated KNOX-25:
-------------------------------

    Summary: Access Kerberos secured Hadoop cluster via gateway using SPNEGO from browser  (was: Access Kerberos secured Hadoop cluster via gateway using SPNEGO)
    
> Access Kerberos secured Hadoop cluster via gateway using SPNEGO from browser
> ----------------------------------------------------------------------------
>
>                 Key: KNOX-25
>                 URL: https://issues.apache.org/jira/browse/KNOX-25
>             Project: Apache Knox
>          Issue Type: New Feature
>          Components: Server
>    Affects Versions: 0.2.0
>            Reporter: Kevin Minder
>            Assignee: Dilli Arumugam
>             Fix For: 0.4.0
>
>
> From BUG-4304
> The basic interactions flow might look like this.
> 1. Client authenticates with KDC
> 2. Client requests HDFS resource via gateway
> 3. Gateway forwards original request to service
> 4. Service challenges with SPNEGO
> 5. Gateway returns challenge to client.
> 6. Client resends request with tokens
> 7. Gateway dispatches request and tokens to service.
> 8. Service provides response including hadoop.auth cookie. This prevents subsequent KDC and SPNEGO interactions.

--
This message is automatically generated by JIRA.
If you think it was sent incorrectly, please contact your JIRA administrators
For more information on JIRA, see: http://www.atlassian.com/software/jira