This is an automated email from the ASF dual-hosted git repository.

xvrl pushed a commit to branch master
in repository https://gitbox.apache.org/repos/asf/druid.git


The following commit(s) were added to refs/heads/master by this push:
     new 95c5bc3  Clarify when changes to credentialIterations take effect 
(#11590)
95c5bc3 is described below

commit 95c5bc3a6ddeb2ce10f696a352bcda492dba853a
Author: sthetland <[email protected]>
AuthorDate: Fri Aug 13 17:02:07 2021 -0700

    Clarify when changes to credentialIterations take effect (#11590)
    
    This change updates doc to clarify when and how a change to 
druid.auth.authenticator.basic.credentialIterations takes effect: changes apply 
only to new users or existing users upon changing their password via the 
credentials API, which may not be the expectation.
---
 docs/development/extensions-core/druid-basic-security.md | 11 +++++++++--
 1 file changed, 9 insertions(+), 2 deletions(-)

diff --git a/docs/development/extensions-core/druid-basic-security.md 
b/docs/development/extensions-core/druid-basic-security.md
index b8b1054..a5ada03 100644
--- a/docs/development/extensions-core/druid-basic-security.md
+++ b/docs/development/extensions-core/druid-basic-security.md
@@ -94,12 +94,19 @@ The remaining examples of authenticator configuration use 
either `MyBasicMetadat
 
|`druid.auth.authenticator.MyBasicMetadataAuthenticator.authorizerName`|Authorizer
 that requests should be directed to|N/A|Yes|
 
 ##### Credential iterations and API performance
-The credential iterations setting affects API performance, including query 
times. The default setting of 10000 is intentionally high to prevent attackers 
from using brute force to guess passwords, but it adds latency.
 
-You can decrease the number of iterations to speed up API response times, but 
it potentially exposes your system to dictionary attacks. Therefore, only 
reduce the number of iterations if your environment fits one of the following 
conditions:
+As noted above, `credentialIterations` determines the number of iterations 
used to hash a password. A higher number increases security, but costs more in 
terms of CPU utilization. 
+
+This cost affects API performance, including query times. The default setting 
of 10000 is intentionally high to prevent attackers from using brute force to 
guess passwords.
+
+You can decrease the number of iterations to speed up API response times, but 
it may expose your system to dictionary attacks. Therefore, only reduce the 
number of iterations if your environment fits one of the following conditions:
 - **All** passwords are long and random which make them as safe as a 
randomly-generated token.
 - You have secured network access to Druid so that no attacker can execute a 
dictionary attack against it.
+
+If Druid uses the default credentials validator (i.e., 
`credentialsValidator.type=metadata`), changing the `credentialIterations` 
value affects the number of hashing iterations only for users created after the 
change or for users who subsequently update their passwords via the 
`/druid-ext/basic-security/authentication/db/basic/users/{userName}/credentials`
 endpoint. If Druid uses the `ldap` validator, the change applies to any user 
at next log in (as well as to new users or users who upd [...]
+
 #### Properties for LDAP user authentication
+
 |Property|Description|Default|required|
 |--------|-----------|-------|--------|
 
|`druid.auth.authenticator.MyBasicLDAPAuthenticator.initialAdminPassword`|Initial
 [Password Provider](../../operations/password-provider.md) for the 
automatically created default admin user. If no password is specified, the 
default admin user will not be created. If the default admin user already 
exists, setting this property will not affect its password.|null|No|

---------------------------------------------------------------------
To unsubscribe, e-mail: [email protected]
For additional commands, e-mail: [email protected]

Reply via email to