Repository: hbase
Updated Branches:
  refs/heads/master d55f4aee4 -> bd9a41a36


HBASE-12983 HBase book mentions hadoop.ssl.enabled when it should be 
hbase.ssl.enabled


Project: http://git-wip-us.apache.org/repos/asf/hbase/repo
Commit: http://git-wip-us.apache.org/repos/asf/hbase/commit/bd9a41a3
Tree: http://git-wip-us.apache.org/repos/asf/hbase/tree/bd9a41a3
Diff: http://git-wip-us.apache.org/repos/asf/hbase/diff/bd9a41a3

Branch: refs/heads/master
Commit: bd9a41a3685ec3f42776b89b756e121c02640b93
Parents: d55f4ae
Author: Misty Stanley-Jones <[email protected]>
Authored: Mon Aug 10 09:46:40 2015 +1000
Committer: Misty Stanley-Jones <[email protected]>
Committed: Wed Oct 7 12:02:28 2015 +1000

----------------------------------------------------------------------
 src/main/asciidoc/_chapters/security.adoc | 12 ++++++------
 1 file changed, 6 insertions(+), 6 deletions(-)
----------------------------------------------------------------------


http://git-wip-us.apache.org/repos/asf/hbase/blob/bd9a41a3/src/main/asciidoc/_chapters/security.adoc
----------------------------------------------------------------------
diff --git a/src/main/asciidoc/_chapters/security.adoc 
b/src/main/asciidoc/_chapters/security.adoc
index 3d9082c..eab10b2 100644
--- a/src/main/asciidoc/_chapters/security.adoc
+++ b/src/main/asciidoc/_chapters/security.adoc
@@ -42,7 +42,7 @@ HBase provides mechanisms to secure various components and 
aspects of HBase and
 == Using Secure HTTP (HTTPS) for the Web UI
 
 A default HBase install uses insecure HTTP connections for Web UIs for the 
master and region servers.
-To enable secure HTTP (HTTPS) connections instead, set `hadoop.ssl.enabled` to 
`true` in _hbase-site.xml_.
+To enable secure HTTP (HTTPS) connections instead, set `hbase.ssl.enabled` to 
`true` in _hbase-site.xml_.
 This does not change the port used by the Web UI.
 To change the port for the web UI for a given HBase component, configure that 
port's setting in hbase-site.xml.
 These settings are:
@@ -522,21 +522,21 @@ This is future work.
 Secure HBase requires secure ZooKeeper and HDFS so that users cannot access 
and/or modify the metadata and data from under HBase. HBase uses HDFS (or 
configured file system) to keep its data files as well as write ahead logs 
(WALs) and other data. HBase uses ZooKeeper to store some metadata for 
operations (master address, table locks, recovery state, etc).
 
 === Securing ZooKeeper Data
-ZooKeeper has a pluggable authentication mechanism to enable access from 
clients using different methods. ZooKeeper even allows authenticated and 
un-authenticated clients at the same time. The access to znodes can be 
restricted by providing Access Control Lists (ACLs) per znode. An ACL contains 
two components, the authentication method and the principal. ACLs are NOT 
enforced hierarchically. See 
link:https://zookeeper.apache.org/doc/r3.3.6/zookeeperProgrammers.html#sc_ZooKeeperPluggableAuthentication[ZooKeeper
 Programmers Guide] for details. 
+ZooKeeper has a pluggable authentication mechanism to enable access from 
clients using different methods. ZooKeeper even allows authenticated and 
un-authenticated clients at the same time. The access to znodes can be 
restricted by providing Access Control Lists (ACLs) per znode. An ACL contains 
two components, the authentication method and the principal. ACLs are NOT 
enforced hierarchically. See 
link:https://zookeeper.apache.org/doc/r3.3.6/zookeeperProgrammers.html#sc_ZooKeeperPluggableAuthentication[ZooKeeper
 Programmers Guide] for details.
 
-HBase daemons authenticate to ZooKeeper via SASL and kerberos (See 
<<zk.sasl.auth>>). HBase sets up the znode ACLs so that only the HBase user and 
the configured hbase superuser (`hbase.superuser`) can access and modify the 
data. In cases where ZooKeeper is used for service discovery or sharing state 
with the client, the znodes created by HBase will also allow anyone (regardless 
of authentication) to read these znodes (clusterId, master address, meta 
location, etc), but only the HBase user can modify them. 
+HBase daemons authenticate to ZooKeeper via SASL and kerberos (See 
<<zk.sasl.auth>>). HBase sets up the znode ACLs so that only the HBase user and 
the configured hbase superuser (`hbase.superuser`) can access and modify the 
data. In cases where ZooKeeper is used for service discovery or sharing state 
with the client, the znodes created by HBase will also allow anyone (regardless 
of authentication) to read these znodes (clusterId, master address, meta 
location, etc), but only the HBase user can modify them.
 
 === Securing File System (HDFS) Data
-All of the data under management is kept under the root directory in the file 
system (`hbase.rootdir`). Access to the data and WAL files in the filesystem 
should be restricted so that users cannot bypass the HBase layer, and peek at 
the underlying data files from the file system. HBase assumes the filesystem 
used (HDFS or other) enforces permissions hierarchically. If sufficient 
protection from the file system (both authorization and authentication) is not 
provided, HBase level authorization control (ACLs, visibility labels, etc) is 
meaningless since the user can always access the data from the file system. 
+All of the data under management is kept under the root directory in the file 
system (`hbase.rootdir`). Access to the data and WAL files in the filesystem 
should be restricted so that users cannot bypass the HBase layer, and peek at 
the underlying data files from the file system. HBase assumes the filesystem 
used (HDFS or other) enforces permissions hierarchically. If sufficient 
protection from the file system (both authorization and authentication) is not 
provided, HBase level authorization control (ACLs, visibility labels, etc) is 
meaningless since the user can always access the data from the file system.
 
 HBase enforces the posix-like permissions 700 (`rwx------`) to its root 
directory. It means that only the HBase user can read or write the files in FS. 
The default setting can be changed by configuring `hbase.rootdir.perms` in 
hbase-site.xml. A restart of the active master is needed so that it changes the 
used permissions. For versions before 1.2.0, you can check whether HBASE-13780 
is committed, and if not, you can manually set the permissions for the root 
directory if needed. Using HDFS, the command would be:
 [source,bash]
 ----
 sudo -u hdfs hadoop fs -chmod 700 /hbase
 ----
-You should change `/hbase` if you are using a different `hbase.rootdir`. 
+You should change `/hbase` if you are using a different `hbase.rootdir`.
 
-In secure mode, SecureBulkLoadEndpoint should be configured and used for 
properly handing of users files created from MR jobs to the HBase daemons and 
HBase user. The staging directory in the distributed file system used for bulk 
load (`hbase.bulkload.staging.dir`, defaults to `/tmp/hbase-staging`) should 
have (mode 711, or `rwx--x--x`) so that users can access the staging directory 
created under that parent directory, but cannot do any other operation. See 
<<hbase.secure.bulkload>> for how to configure SecureBulkLoadEndPoint. 
+In secure mode, SecureBulkLoadEndpoint should be configured and used for 
properly handing of users files created from MR jobs to the HBase daemons and 
HBase user. The staging directory in the distributed file system used for bulk 
load (`hbase.bulkload.staging.dir`, defaults to `/tmp/hbase-staging`) should 
have (mode 711, or `rwx--x--x`) so that users can access the staging directory 
created under that parent directory, but cannot do any other operation. See 
<<hbase.secure.bulkload>> for how to configure SecureBulkLoadEndPoint.
 
 == Securing Access To Your Data
 

Reply via email to