[ 
https://issues.apache.org/jira/browse/KNOX-2020?page=com.atlassian.jira.plugin.system.issuetabpanels:comment-tabpanel&focusedCommentId=16947984#comment-16947984
 ] 

Sharad K edited comment on KNOX-2020 at 10/9/19 8:43 PM:
---------------------------------------------------------

# As I explained this may not be an out of feature box but paves way for future 
applications that want to interact with AWS ecosystem (or any cloud provider 
that supports SAML federation).
 # SAML is a stronger authentication protocol than other protocols that accept 
user credentials with the service provider. Right now the major use cases are 
with a browser (or so called SAML passive profile). I'd not like to add an API 
that accepts credentials, and then does cloud federation. It goes against the 
best practices that SAML, OAuth, OIDC etc try to achieve (distinction between 
SP and IDP etc). As I understand the SAML active profile is not very well 
adopted, but it could be a possibility in future to add via which a non browser 
application could present it's SAML token to Knox, and it gives back a 
decorated hadoop-jwt cookie (much like what kinit does with kerberos). Another 
benefit is that it's seamless to the end user (has to do nothing special than 
what he used to) like a data scientist working with a notebook like Jupyter. 
His Spark jobs run as the right user via Livy.
 # That's true and as I said this contribution paves way for a secure mechanism 
to federate into AWS, or any other cloud provider that supports SAML. Once in 
cookie we have the notebooks or REST ful services like Livy, or HS2 that can 
benefit from it. In credentials file the CLI apps can benefit from it.

I am open to your suggestions [~lmccay] .

 


was (Author: sharad-oss):
# As I explained this may not be an out of feature box but paves way for future 
applications that want to interact with AWS ecosystem (or any cloud provider 
that supports SAML federation).
 # SAML is a stronger authentication protocol than other protocols that accept 
user credentials with the service provider. Right now the major use cases are 
with a browser (or so called passive profile). I'd not like to add an API that 
accepts credentials, and then does cloud federation. It goes against the best 
practices that SAML, OAuth, OIDC etc try to achieve (distinction between SP and 
IDP etc). As I understand the SAML active profile is not very well adopted, but 
it could be a possibility in future to add via which a non browser application 
could present it's SAML token to Knox, and it gives back a decorated hadoop-jwt 
cookie (much like what kinit does with kerberos). Another benefit is that it's 
seamless to the end user (has to do nothing special than what he used to) like 
a data scientist working with a notebook like Jupyter. His Spark jobs run as 
the right user via Livy.
 # That's true and as I said this contribution paves way for a secure mechanism 
to federate into AWS, or any other cloud provider that supports SAML. Once in 
cookie we have the notebooks or REST ful services like Livy, or HS2 that can 
benefit from it. In credentials file the CLI apps can benefit from it.

I am open to your suggestions [~lmccay] .

 

> Enhance hadoop-jwt cookie to interact with the AWS ecosystem
> ------------------------------------------------------------
>
>                 Key: KNOX-2020
>                 URL: https://issues.apache.org/jira/browse/KNOX-2020
>             Project: Apache Knox
>          Issue Type: New Feature
>          Components: KnoxSSO, Server
>            Reporter: Sharad K
>            Priority: Major
>         Attachments: AWS Federation in Knox.docx
>
>          Time Spent: 6h 40m
>  Remaining Estimate: 0h
>
> It's desirable to access AWS managed services while accessing resources using 
> Apache Knox. AWS provides SAML for federation, and we could enhance the SAML 
> login flow in Knox to interact with AWS, and enhance the hadoop-jwt cookie 
> with AWS credentials. The cookie now gives the gateway to interact with other 
> AWS services like S3, DDB, EC2 etc (as defined by the IDP admin in the AWS 
> Role that gets injected in SAML assertion).



--
This message was sent by Atlassian Jira
(v8.3.4#803005)

Reply via email to