[ 
https://issues.apache.org/jira/browse/HIVE-3591?page=com.atlassian.jira.plugin.system.issuetabpanels:comment-tabpanel&focusedCommentId=13747019#comment-13747019
 ] 

Sushanth Sowmyan commented on HIVE-3591:
----------------------------------------

[~lmccay] : I wouldn't say "resolved", per se - the issue you bring is a valid 
one, but one that does not fit the original hive security design (designed to 
prevent people from accidentally doing something dangerous, as opposed to being 
designed to prevent malicious users). For the security-conscious, there is 
currently a work-around(metastore-side security) for the intermediate case 
where stronger security is needed.

I think this is an important data point though, for us to consider when trying 
to nail down hive security, and there is some intermediate work possible for 
this in the short run as well(the above restricted conf idea)
                
> set hive.security.authorization.enabled can be executed by any user
> -------------------------------------------------------------------
>
>                 Key: HIVE-3591
>                 URL: https://issues.apache.org/jira/browse/HIVE-3591
>             Project: Hive
>          Issue Type: Bug
>          Components: Authorization, CLI, Clients, JDBC
>    Affects Versions: 0.7.1
>         Environment: RHEL 5.6
> CDH U3
>            Reporter: Dev Gupta
>              Labels: Authorization, Security
>
> The property hive.security.authorization.enabled can be set to true or false, 
> by any user on the CLI, thus circumventing any previously set grants and 
> authorizations. 

--
This message is automatically generated by JIRA.
If you think it was sent incorrectly, please contact your JIRA administrators
For more information on JIRA, see: http://www.atlassian.com/software/jira

Reply via email to