You are viewing a plain text version of this content. The canonical link for it is here.
Posted to dev@ranger.apache.org by "Gautam Borad (JIRA)" <ji...@apache.org> on 2016/05/10 09:21:12 UTC

[jira] [Commented] (RANGER-973) Kerberos : Ranger Admin to perform Key operations using Principal / keytab of RangerAdmin from UI

    [ https://issues.apache.org/jira/browse/RANGER-973?page=com.atlassian.jira.plugin.system.issuetabpanels:comment-tabpanel&focusedCommentId=15277849#comment-15277849 ] 

Gautam Borad commented on RANGER-973:
-------------------------------------

Committed to master : https://github.com/apache/incubator-ranger/commit/2bd65f7bc9fa5eff9cc33d17c1218571ca756cf6

> Kerberos : Ranger Admin to perform Key operations using Principal / keytab of RangerAdmin from UI
> -------------------------------------------------------------------------------------------------
>
>                 Key: RANGER-973
>                 URL: https://issues.apache.org/jira/browse/RANGER-973
>             Project: Ranger
>          Issue Type: Bug
>          Components: admin, kms
>    Affects Versions: 0.6.0
>            Reporter: Mehul Parikh
>            Assignee: Ankita Sinha
>             Fix For: 0.6.0
>
>         Attachments: RANGER-973.patch
>
>
> +*Problem Statement :*+
> Currently even in kerberos environment Ranger admin sends request using repo config user. As now Ranger Admin and Ranger KMS are working in kerberos environment, request for key operations from UI needs to go using ranger admin credentials. 
> +*Need to improve following features:*+
> 1. KMS to use rangeradmin credentials for test connection, resource lookup and for encrytpion key operation from Ranger admin UI Encryption tab.
> 2. Download Policy Session Log was created in every policy refresher call, so in x_auth_session it is getting bulk of downloadpolicy session log.
> 3. To add ambari service check user in default policy using service config custom property



--
This message was sent by Atlassian JIRA
(v6.3.4#6332)