This is an automated email from the ASF dual-hosted git repository.

granthenke pushed a commit to branch branch-1.10.x
in repository https://gitbox.apache.org/repos/asf/kudu.git


The following commit(s) were added to refs/heads/branch-1.10.x by this push:
     new 896c30c  docs: adjust ordering of security docs
896c30c is described below

commit 896c30c91dd97beae9d77218c4f401718bc360ab
Author: Andrew Wong <[email protected]>
AuthorDate: Wed Jun 26 11:38:12 2019 -0700

    docs: adjust ordering of security docs
    
    The "Scalability" section discusses the scalability of Kudu's
    authentication story, so I put it in the "Authentication" section.
    
    Coarse-grained authorization also seems to follow authentication
    naturally, so I moved the "Coarse-Grained Authorization" section up to
    be right after the "Authentication" section.
    
    Change-Id: I98d7b9c42de663e6613ab48d9201bfabe217d7e9
    Reviewed-on: http://gerrit.cloudera.org:8080/13758
    Tested-by: Kudu Jenkins
    Reviewed-by: Hao Hao <[email protected]>
    Reviewed-by: Grant Henke <[email protected]>
    (cherry picked from commit 5c652defff422f908dacc11011dc6ae59bf49be5)
    Reviewed-on: http://gerrit.cloudera.org:8080/13766
    Reviewed-by: Alexey Serbin <[email protected]>
---
 docs/security.adoc | 38 +++++++++++++++++++-------------------
 1 file changed, 19 insertions(+), 19 deletions(-)

diff --git a/docs/security.adoc b/docs/security.adoc
index dcb82d6..18d2d7a 100644
--- a/docs/security.adoc
+++ b/docs/security.adoc
@@ -112,7 +112,7 @@ $ kinit [email protected]
 Once authenticated, you use the same client code to read from and write to Kudu
 servers with and without Kerberos configuration.
 
-== Scalability
+=== Scalability
 
 Kudu authentication is designed to scale to thousands of nodes, which requires
 avoiding unnecessary coordination with a central authentication authority (such
@@ -121,24 +121,6 @@ establish initial trust with the Kudu master, and then use 
alternate credentials
 for subsequent connections. In particular, the master will issue internal
 X.509 certificates to servers, and temporary authentication tokens to clients.
 
-== Encryption
-
-Kudu allows all communications among servers and between clients and servers
-to be encrypted with TLS.
-
-Encryption can be configured on Kudu servers using the `--rpc_encryption` flag,
-which can be set to `required`, `optional`, or `disabled`. By default, the flag
-is set to `optional`. When `required`, Kudu will reject unencrypted 
connections.
-When `optional`, Kudu will attempt to use encryption. Same as authentication,
-when `disabled` or encryption fails for `optional`, Kudu will only allow
-unencrypted connections from trusted subnets and reject any unencrypted 
connections
-from publicly routable IPs. To secure a cluster, use 
`--rpc_encryption=required`.
-
-NOTE: Kudu will automatically turn off encryption on local loopback 
connections,
-since traffic from these connections is never exposed externally. This allows
-locality-aware compute frameworks like Spark and Impala to avoid encryption
-overhead, while still ensuring data confidentiality.
-
 == Coarse-Grained Authorization
 
 Kudu supports coarse-grained authorization of client requests based on the
@@ -169,6 +151,24 @@ to only those users who are able to successfully 
authenticate via Kerberos.
 Unauthenticated users on the same network as the Kudu servers will be unable
 to access the cluster.
 
+== Encryption
+
+Kudu allows all communications among servers and between clients and servers
+to be encrypted with TLS.
+
+Encryption can be configured on Kudu servers using the `--rpc_encryption` flag,
+which can be set to `required`, `optional`, or `disabled`. By default, the flag
+is set to `optional`. When `required`, Kudu will reject unencrypted 
connections.
+When `optional`, Kudu will attempt to use encryption. Same as authentication,
+when `disabled` or encryption fails for `optional`, Kudu will only allow
+unencrypted connections from trusted subnets and reject any unencrypted 
connections
+from publicly routable IPs. To secure a cluster, use 
`--rpc_encryption=required`.
+
+NOTE: Kudu will automatically turn off encryption on local loopback 
connections,
+since traffic from these connections is never exposed externally. This allows
+locality-aware compute frameworks like Spark and Impala to avoid encryption
+overhead, while still ensuring data confidentiality.
+
 [[web-ui]]
 == Web UI Encryption
 

Reply via email to