Josh Elser created PHOENIX-3686:
-----------------------------------

             Summary: De-couple PQS's use of Kerberos to talk to HBase and 
client authentication
                 Key: PHOENIX-3686
                 URL: https://issues.apache.org/jira/browse/PHOENIX-3686
             Project: Phoenix
          Issue Type: New Feature
            Reporter: Josh Elser
            Assignee: Josh Elser
             Fix For: 4.10.0


Was trying to help a user that was using 
https://bitbucket.org/lalinsky/python-phoenixdb to talk to PQS. After upgrading 
Phoenix (to a version that actually included client authentication), their 
application suddenly broke and they were upset.

Because they were running Phoenix/HBase on a cluster with Kerberos 
authentication enabled, they suddenly "inherited" this client authentication. 
AFAIK, the python-phoenixdb project doesn't presently include the ability to 
authenticate via SPNEGO. This means a Phoenix upgrade broke their app which 
stinks.

This happens because, presently, when sees that HBase is configured for 
Kerberos auth (via hbase-site.xml), it assumes that clients should be required 
to also authenticate via Kerberos to it. In certain circumstances, users might 
not actually want to do this.

It's a pretty trivial change I've hacked together which shows that this is 
possible, and I think that, with adequate disclaimer/documentation about this 
property, it's OK to do. As long as we are very clear about what exactly this 
configuration property is doing (allowing *anyone* into your HBase instance as 
the PQS Kerberos user), it will unblock these users while the various client 
drivers build proper support for authentication.



--
This message was sent by Atlassian JIRA
(v6.3.15#6346)

Reply via email to