This is an automated email from the ASF dual-hosted git repository.
xvrl pushed a commit to branch master
in repository https://gitbox.apache.org/repos/asf/druid.git
The following commit(s) were added to refs/heads/master by this push:
new 95c5bc3 Clarify when changes to credentialIterations take effect
(#11590)
95c5bc3 is described below
commit 95c5bc3a6ddeb2ce10f696a352bcda492dba853a
Author: sthetland <[email protected]>
AuthorDate: Fri Aug 13 17:02:07 2021 -0700
Clarify when changes to credentialIterations take effect (#11590)
This change updates doc to clarify when and how a change to
druid.auth.authenticator.basic.credentialIterations takes effect: changes apply
only to new users or existing users upon changing their password via the
credentials API, which may not be the expectation.
---
docs/development/extensions-core/druid-basic-security.md | 11 +++++++++--
1 file changed, 9 insertions(+), 2 deletions(-)
diff --git a/docs/development/extensions-core/druid-basic-security.md
b/docs/development/extensions-core/druid-basic-security.md
index b8b1054..a5ada03 100644
--- a/docs/development/extensions-core/druid-basic-security.md
+++ b/docs/development/extensions-core/druid-basic-security.md
@@ -94,12 +94,19 @@ The remaining examples of authenticator configuration use
either `MyBasicMetadat
|`druid.auth.authenticator.MyBasicMetadataAuthenticator.authorizerName`|Authorizer
that requests should be directed to|N/A|Yes|
##### Credential iterations and API performance
-The credential iterations setting affects API performance, including query
times. The default setting of 10000 is intentionally high to prevent attackers
from using brute force to guess passwords, but it adds latency.
-You can decrease the number of iterations to speed up API response times, but
it potentially exposes your system to dictionary attacks. Therefore, only
reduce the number of iterations if your environment fits one of the following
conditions:
+As noted above, `credentialIterations` determines the number of iterations
used to hash a password. A higher number increases security, but costs more in
terms of CPU utilization.
+
+This cost affects API performance, including query times. The default setting
of 10000 is intentionally high to prevent attackers from using brute force to
guess passwords.
+
+You can decrease the number of iterations to speed up API response times, but
it may expose your system to dictionary attacks. Therefore, only reduce the
number of iterations if your environment fits one of the following conditions:
- **All** passwords are long and random which make them as safe as a
randomly-generated token.
- You have secured network access to Druid so that no attacker can execute a
dictionary attack against it.
+
+If Druid uses the default credentials validator (i.e.,
`credentialsValidator.type=metadata`), changing the `credentialIterations`
value affects the number of hashing iterations only for users created after the
change or for users who subsequently update their passwords via the
`/druid-ext/basic-security/authentication/db/basic/users/{userName}/credentials`
endpoint. If Druid uses the `ldap` validator, the change applies to any user
at next log in (as well as to new users or users who upd [...]
+
#### Properties for LDAP user authentication
+
|Property|Description|Default|required|
|--------|-----------|-------|--------|
|`druid.auth.authenticator.MyBasicLDAPAuthenticator.initialAdminPassword`|Initial
[Password Provider](../../operations/password-provider.md) for the
automatically created default admin user. If no password is specified, the
default admin user will not be created. If the default admin user already
exists, setting this property will not affect its password.|null|No|
---------------------------------------------------------------------
To unsubscribe, e-mail: [email protected]
For additional commands, e-mail: [email protected]