[ https://issues.apache.org/jira/browse/HIVE-8705?page=com.atlassian.jira.plugin.system.issuetabpanels:comment-tabpanel&focusedCommentId=14197661#comment-14197661 ]
Lefty Leverenz commented on HIVE-8705: -------------------------------------- Documentation for this belongs in the HiveServer2 Clients doc. * [HiveServer2 Clients | https://cwiki.apache.org/confluence/display/Hive/HiveServer2+Clients] As a reminder, the documentation for HIVE-6486 (secure Subject.doAs() in HiveServer2 JDBC client) is here: * [HiveServer2 Clients -- Multi-User Scenarios and Programmatic Login to Kerberos KDC | https://cwiki.apache.org/confluence/display/Hive/HiveServer2+Clients#HiveServer2Clients-Multi-UserScenariosandProgrammaticLogintoKerberosKDC] > Support using pre-authenticated subject in kerberized HiveServer2 HTTP mode > ---------------------------------------------------------------------------- > > Key: HIVE-8705 > URL: https://issues.apache.org/jira/browse/HIVE-8705 > Project: Hive > Issue Type: Bug > Components: HiveServer2, JDBC > Affects Versions: 0.13.0, 0.14.0 > Reporter: Vaibhav Gumashta > Assignee: Vaibhav Gumashta > Priority: Critical > Labels: TODOC14 > Fix For: 0.14.0 > > Attachments: HIVE-8705.1.patch, HIVE-8705.1.patch, > TestPreAuthenticatedKerberosSubject.java > > > HIVE-6486 provided a patch to utilize pre-authenticated subject (someone who > has programmatically done a JAAS login and is not doing kinit before > connecting to HiveServer2 using the JDBC driver). However, that feature was > only for the binary mode code path. We need to have a similar feature when > the driver-server communicate using http transport. -- This message was sent by Atlassian JIRA (v6.3.4#6332)