[ 
https://issues.apache.org/jira/browse/CASSANDRA-9927?page=com.atlassian.jira.plugin.system.issuetabpanels:comment-tabpanel&focusedCommentId=14662586#comment-14662586
 ] 

Paulo Motta commented on CASSANDRA-9927:
----------------------------------------

bq. {{CREATE}} is not a table-level permission, so you should change {{CREATE 
MV}} to require {{SELECT}} on the table and {{CREATE}} on the keyspace.

Really? I saw in this 
[doc|http://docs.datastax.com/en/cql/3.1/cql/cql_reference/list_permissions_r.html]
 {{CREATE}} being listed as a table permission. If it's really forbidden, 
shouldn't we rethink that for MVs ? It allows for a more fine-grained 
authorization, since you may want to allow creation of MVs of a given table, 
but not on the whole keyspace.

bq. More importantly, you should alter SelectStatement to check for {{SELECT}} 
on the base table.

How can I miss that? My filtering algorithm for implementing the policies was 
statement.contains("MATERIALIZED VIEW"). Will fix that in v2.

> Security for MaterializedViews
> ------------------------------
>
>                 Key: CASSANDRA-9927
>                 URL: https://issues.apache.org/jira/browse/CASSANDRA-9927
>             Project: Cassandra
>          Issue Type: Task
>            Reporter: T Jake Luciani
>            Assignee: Paulo Motta
>              Labels: materializedviews
>             Fix For: 3.0 beta 1
>
>
> We need to think about how to handle security wrt materialized views. Since 
> they are based on a source table we should possibly inherit the same security 
> model as that table.  
> However I can see cases where users would want to create different security 
> auth for different views.  esp once we have CASSANDRA-9664 and users can 
> filter out sensitive data.



--
This message was sent by Atlassian JIRA
(v6.3.4#6332)

Reply via email to