potiuk commented on issue #8803:
URL: https://github.com/apache/airflow/issues/8803#issuecomment-649715399


   Unless I am mistaken account impersonation does not essentially solve any of 
those problems you mentioned (like key rotation or key management) because the 
main service account that you have can do anything via impersonation - and you 
continue having access to this account. So my first thought is that there is no 
added value in using impersonation for the purpose you described.
   
   For example if someone steals the main "service account" credentials, that 
someone can still impersonate any of the other service accounts and do whatever 
those service accounts can do. You still have to manage the main service 
account key I believe and rotate it, and additionally you do not have separate 
access for each key, instead you have one "uber" service account that can 
impersonate any other service account and do everything. Which is not a good 
idea I think.
   
   But maybe I do not fully understand what exactly you want to achieve and how 
this all plays with different roles you have in mind (like admin/dag user etc.) 
- I'd love to understand more from you and maybe see some diagram (? not sure 
if I can ask for it) where you would show how the key management and service 
account structure would look like?


----------------------------------------------------------------
This is an automated message from the Apache Git Service.
To respond to the message, please log on to GitHub and use the
URL above to go to the specific comment.

For queries about this service, please contact Infrastructure at:
[email protected]


Reply via email to