Support Questions

Find answers, ask questions, and share your expertise
Announcements
We’ve updated our product names and community labels - click here for full details

Securing the deployed application

avatar

Dear All,

I hope you are doing well.

I would like your help in understand how I can secure the deployed application.

  • Public Applications

    By default, authentication for applications is enforced on all ports and users cannot create public applications. If desired, the Admin user can allow users to create public applications that can be accessed by unauthenticated users.

    To allow users to create public applications on an Cloudera AI Workbench:
    1. As an Admin user, turn on the feature flag in Admin > Security by selecting Allow applications to be configured with unauthenticated access.
    2. When creating a new application, select Enable Unauthenticated Access.
    3. For an existing application, in Settings select Enable Unauthenticated Access.

    To prevent all users from creating public applications, go to Admin > Security and deselect Allow applications to be configured with unauthenticated access. All existing public applications will immediately stop being publicly accessible.

  • Transparent Authentication

    Cloudera AI can pass user authentication information to an application, if the application expects an authenticated request. The REMOTE-USER and REMOTE-USER-PERM HTTP headers will be injected to the application hosted by the user.

    For example:
    Remote-user=<username> 
    Remote-user-perm=<RO/RW/Unauthorized>

    How can I implement and integrate the Transparent Authentication in the deployed application script?

     

    Best wishes,

    Salim  

1 REPLY 1

avatar
Master Collaborator

Hello @SalimAlhajri

The Transparent Authentication is built-in Cloudera AI. 
When the application is started, it will inject the REMOTE-USER and REMOTE-USER-PERM HTTP headers automatically, this is why it is transparent, no manual intervention is needed. 

https://docs.cloudera.com/machine-learning/1.5.5/applications/topics/ml-securing-applications.html 


Regards,
Andrés Fallas
--
Was your question answered? Please take some time to click on "Accept as Solution" below this post.
If you find a reply useful, say thanks by clicking on the thumbs-up button.