Alberto Romero created ATLAS-2784:
-------------------------------------

             Summary: Wildcards not supported for authorization granularity in 
Ranger policies
                 Key: ATLAS-2784
                 URL: https://issues.apache.org/jira/browse/ATLAS-2784
             Project: Atlas
          Issue Type: Improvement
          Components:  atlas-core
    Affects Versions: 0.8.2
            Reporter: Alberto Romero


Creating Ranger policies for Atlas resources (such as entities, types, terms, 
taxonomies) does not allow for actual multitenancy or segregation of 
permissions due to policies ignoring wildcards (*). For example, cannot define 
a policy for type "user_*" to allow users or groups of users to create, read or 
update only types that start with the string "user_".

The problem is that Atlas throws a 403 error "You are not authorized for READ 
on [ENTITY] : *" even when trying to read a specific entity that would match 
the pattern that contains the wildcard. In the UI is exactly the same. The 
expected behaviour would be for the user to only be able to see entities, 
terms, etc that match the pattern but the fact is that it complains about not 
having being able to READ on [ENTITY] : *. The '*' in error is the clue there, 
it is actually expecting access to everything.
It is only when we add the users to a policy that gives them access to '*' that 
it works for them.



--
This message was sent by Atlassian JIRA
(v7.6.3#76005)

Reply via email to