[ 
https://issues.apache.org/jira/browse/HADOOP-10428?page=com.atlassian.jira.plugin.system.issuetabpanels:comment-tabpanel&focusedCommentId=13960168#comment-13960168
 ] 

Larry McCay commented on HADOOP-10428:
--------------------------------------

Hi Benoy - #2 is an interesting point. I view the client side password 
configuration as the master password for the keystores available to that 
client. For instance, a particular tenant perhaps based on role would have 
access any number of keystores within the cluster deployment. Having to provide 
the password for those keystores is sufficient, in my mind, since the file 
permissions on the store itself should additional protect access to the 
protected keys. This is in line with the intent of the environment variable 
specification of the master password. In other words, the password is tied to 
the client rather than individual keystores. The passwords for individual 
passwords are more aligned with their file permissions than being based on 
their own identities/URIs.

>       JavaKeyStoreProvider should accept keystore password via configuration 
> falling back to ENV VAR
> -----------------------------------------------------------------------------------------------
>
>                 Key: HADOOP-10428
>                 URL: https://issues.apache.org/jira/browse/HADOOP-10428
>             Project: Hadoop Common
>          Issue Type: Improvement
>          Components: security
>    Affects Versions: 3.0.0
>            Reporter: Alejandro Abdelnur
>            Assignee: Alejandro Abdelnur
>         Attachments: HADOOP-10428.patch, HADOOP-10428.patch, 
> HADOOP-10428.patch
>
>
> Currently the password for the {{JavaKeyStoreProvider}} must be set in an ENV 
> VAR.
> Allowing the password to be set via configuration enables applications to 
> interactively ask for the password before initializing the 
> {{JavaKeyStoreProvider}}.



--
This message was sent by Atlassian JIRA
(v6.2#6252)

Reply via email to