Archives of Support Questions (Read Only)

This is an archived board for historical reference. Information and links may no longer be available or relevant
Announcements
This board is archived and read-only for historical reference. To ask a new question, please post a new topic on the appropriate active board.

How do you mask passwords for xml files in HDP?

avatar
Expert Contributor

How can we mask passwords on xml configuration files in HDP for instance, the ranger-policymgr-ssl.xml file?

1 ACCEPTED SOLUTION

avatar

Unfortunately an application that uses a credential store will always need at least one cleartext password so it can unlock that credential store. This can be hardcoded into the binary or stored in a file. The ranger-policymgr-ssl.xml files contain the passwords to unlock the keystore and truststore used by Ranger agents. Obviously this file should be secured with the minimal permissions necessary.

Other passwords in Ranger config files are stored in a credential store (jceks file), so they don't show up in plaintext in the configs. The credential stores typically use the default keystore password, so the files themselves should still be protected by appropriate file permissions.

(thanks to @lmccay for clarifying the last part for me)

View solution in original post

2 REPLIES 2

avatar
Expert Contributor

Not for ranger, but for hive, you can remove password from hive-site.xml by following the below:

https://cwiki.apache.org/confluence/display/Hive/AdminManual+Configuration

avatar

Unfortunately an application that uses a credential store will always need at least one cleartext password so it can unlock that credential store. This can be hardcoded into the binary or stored in a file. The ranger-policymgr-ssl.xml files contain the passwords to unlock the keystore and truststore used by Ranger agents. Obviously this file should be secured with the minimal permissions necessary.

Other passwords in Ranger config files are stored in a credential store (jceks file), so they don't show up in plaintext in the configs. The credential stores typically use the default keystore password, so the files themselves should still be protected by appropriate file permissions.

(thanks to @lmccay for clarifying the last part for me)