[ 
https://issues.apache.org/jira/browse/KAFKA-1686?page=com.atlassian.jira.plugin.system.issuetabpanels:comment-tabpanel&focusedCommentId=14973752#comment-14973752
 ] 

Jun Rao commented on KAFKA-1686:
--------------------------------

[~sriharsha], I was thinking what happens when a user is removed from KDC or 
the user's life time has expired. The solution that you mentioned based on 
Authorizer will work. However, it seems that in those cases, it would be more 
natural if existing connections can just expire. Is this how ZK sasl works (cc 
[~fpj])? 

> Implement SASL/Kerberos
> -----------------------
>
>                 Key: KAFKA-1686
>                 URL: https://issues.apache.org/jira/browse/KAFKA-1686
>             Project: Kafka
>          Issue Type: Sub-task
>          Components: security
>    Affects Versions: 0.8.2.1
>            Reporter: Jay Kreps
>            Assignee: Sriharsha Chintalapani
>            Priority: Blocker
>             Fix For: 0.9.0.0
>
>
> Implement SASL/Kerberos authentication.
> To do this we will need to introduce a new SASLRequest and SASLResponse pair 
> to the client protocol. This request and response will each have only a 
> single byte[] field and will be used to handle the SASL challenge/response 
> cycle. Doing this will initialize the SaslServer instance and associate it 
> with the session in a manner similar to KAFKA-1684.
> When using integrity or encryption mechanisms with SASL we will need to wrap 
> and unwrap bytes as in KAFKA-1684 so the same interface that covers the 
> SSLEngine will need to also cover the SaslServer instance.



--
This message was sent by Atlassian JIRA
(v6.3.4#6332)

Reply via email to