[ 
https://issues.apache.org/jira/browse/KAFKA-7352?page=com.atlassian.jira.plugin.system.issuetabpanels:all-tabpanel
 ]

Rajini Sivaram resolved KAFKA-7352.
-----------------------------------
    Resolution: Fixed
      Reviewer: Rajini Sivaram

> KIP-368: Allow SASL Connections to Periodically Re-Authenticate
> ---------------------------------------------------------------
>
>                 Key: KAFKA-7352
>                 URL: https://issues.apache.org/jira/browse/KAFKA-7352
>             Project: Kafka
>          Issue Type: Improvement
>          Components: clients, core
>            Reporter: Ron Dagostino
>            Assignee: Ron Dagostino
>            Priority: Major
>              Labels: kip
>             Fix For: 2.2.0
>
>
> KIP-368: Allow SASL Connections to Periodically Re-Authenticate
> The adoption of KIP-255: OAuth Authentication via SASL/OAUTHBEARER in release 
> 2.0.0 creates the possibility of using information in the bearer token to 
> make authorization decisions.  Unfortunately, however, Kafka connections are 
> long-lived, so there is no ability to change the bearer token associated with 
> a particular connection.  Allowing SASL connections to periodically 
> re-authenticate would resolve this.  In addition to this motivation there are 
> two others that are security-related.  First, to eliminate access to Kafka 
> the current requirement is to remove all authorizations (i.e. remove all 
> ACLs).  This is necessary because of the long-lived nature of the 
> connections.  It is operationally simpler to shut off access at the point of 
> authentication, and with the release of KIP-86: Configurable SASL Callback 
> Handlers it is going to become more and more likely that installations will 
> authenticate users against external directories (e.g. via LDAP).  The ability 
> to stop Kafka access by simply disabling an account in an LDAP directory (for 
> example) is desirable.  The second motivating factor for re-authentication 
> related to security is that the use of short-lived tokens is a common OAuth 
> security recommendation, but issuing a short-lived token to a Kafka client 
> (or a broker when OAUTHBEARER is the inter-broker protocol) currently has no 
> benefit because once a client is connected to a broker the client is never 
> challenged again and the connection may remain intact beyond the token 
> expiration time (and may remain intact indefinitely under perfect 
> circumstances).  This KIP proposes adding the ability for clients (and 
> brokers when OAUTHBEARER is the inter-broker protocol) to re-authenticate 
> their connections to brokers and have the new bearer token appear on their 
> session rather than the old one.



--
This message was sent by Atlassian JIRA
(v7.6.3#76005)

Reply via email to