Member since
09-21-2016
15
Posts
0
Kudos Received
0
Solutions
06-18-2018
02:51 PM
Geoffrey Shelton Okot Thanks for your answer. Unfortunately for me, it leads to more (inner) questions 😉 1) While the client/Kerberos dialogs are well-described with a non-encrypted secret key for the client (described in Wikipedia), I have not found yet a description explaining how parties agree to work together, when the client side has only an encrypted secret key in a keytab. 2) I don't see why things are improved after encrypting the secret key in a keytab. AFAIU one identity could be stolen when copying a keytab, and then, in that case, having, inside the keytab, a secret key, encrypted or not, does not look like to change anything related to keytab copy protection. Some things are still obscure for me. About (1) : do you have any link pointing to a protocol detail description when working with an encrypted secret key in a keytab ? Thanks again.
... View more
06-11-2018
09:21 AM
Hi, I have not yet kerberized my Hadoop cluster yet. But, I am wondering about keytab (content). Originally, I thought a keytab entry is just 1..to..N couples (principal name, secret key unencrypted). But, recently, while trying to validate that point of view, I have read, here for example, that the secret key is stored encrypted. So, it means then that there should be somewhere a master key to store the keytab's secret in an encrypted form. So, my (simple) questions: - How a secret key is stored inside a keytab ? raw (uncrypted) ? encrypted ? - If stored encrypted, what is the master key to crypt keytab's secret ? Thanks.
... View more
Labels:
- Labels:
-
Apache Hadoop
05-21-2018
03:52 PM
In most examples, Knox is presented as a gateway to a secure Hadoop cluster, with Kerberos-based security I mean. does Knox work as a gateway with an UNsecure Hadoop cluster (that is, with default Hadoop security) ? Is Knox able to offer SSO in that case ? Thanks
... View more
Labels:
- Labels:
-
Apache Knox
03-19-2018
01:21 PM
@dvillarreal oops, I have missed that ones. Thanks for pointing me policy change/update traces/audits.
... View more
03-15-2018
12:45 PM
Well, AFAIR now, Ranger audits itself for some features --- Ranger KMS is producing its own audit logs as the HDP docs say: 7.1.3. Enable Ranger KMS Audit Ranger KMS supports audit to DB, HDFS, and Solr. Solr is well-suited for short-term auditing and UI access (for example, one month of data accessible via quick queries in the Web UI). HDFS is typically used for archival auditing. They are not mutually exclusive; we recommend configuring audit to both Solr and HDFS. --- And whenever, a "admin" user makes some user profile modifications, Ranger Admin Console stores some trace. --- And a trace is written too when a user (whatever he/she is) connects to Ranger Admin Console. All these last 2 kinds of traces could be displayed through the Ranger Admin Console "Audit" feature. But, does Ranger write any trace for all the resource-based policy modifications ? I don't know. If anyone has a clue, and want to share it, thanks.
... View more
02-16-2018
08:42 AM
Hi, Ranger collects audit log through its plugins. Does Ranger audit itself also? I mean: does Ranger produce an audit log when an admin account is, for example, creating a new user, or is modifying associated role? More generally, are all admin tasks through Ranger UI producing an audit log? Thanks
... View more
Labels:
- Labels:
-
Apache Ranger
01-30-2018
10:29 PM
Hi, Why the need to map Kerberos principals to usernames (and groups too) ? AFAIU, it's all about getting (from a principal) a username and a group to match (next) with HDFS authorizations and to determine if a Kerberos principal is authorized, or not, to access a HDFS resource. So my question is simple: is there another need for such Kerberos/username and Kerberos/group mapping? Thanks. Regards, Dominique
... View more
01-22-2018
09:57 AM
Thanks Harald for your quick answer. While reading it, I understand the following : 1) as soon as the TGT is valid 2) and also, if the requested service has been also authenticated, then the TS is granted... So, (1) is about client authentication and (2) is about service authentication. And then, (2) is not about authorization as I understood previously (see my first post). Is my understanding of your sentences correct ? Thanks
... View more
01-21-2018
09:37 PM
Hi, I am wondering about which authorization-related module is doing exactly what. So my view = at first glance, at high level: 1) Kerberos : does authentication 2) Ranger: does authorization So, Kerberos role: 1.a) a client requests Kerberos and gets (in return) a Ticket Granting Ticket (TGT) 1.b) and, next, the same client uses the Ticket Granting Ticket (TGT) to get (in return) a TS (Ticket Service) for a __given__ service. Next step : Ranger is used for authorization. But (1.b) looks like some kind of authorization to me... even before Ranger comes into the game... Because if a client gets a TS (Ticket Service) for a __given__ service, then one could see that as "ok, the client is __authorized__ for the __request__ service".at a high-level (while Ranger gives low-level authorizations) So, it looks like Kerberos could be seen as doing things in the "authorization" league, while Ranger operates too in the same league, but at a lower-level. Option_1 : Kerberos is authorizing, or not, access to a given service from such or such client while granting, or not, a TS (Ticket Service) => is it the case ? is Kerberos doing this bit of authorization (giving, or not, a TS) ? Then, is Kerberos configured to do so through Ambari ? Option_2 : Kerberos is giving a TS (Ticket Service) for __any__ service And it is not a problem, because, in the next steps, Ranger is filtering access throught its authorization configuration. And then, Kerberos is only doing authentication, while Ranger is doing authorization. Does anybody know if which option (Option_1 or Option_2) is valid ? Thanks.
... View more
Labels:
- Labels:
-
Apache Ranger