Karan Mehta created PHOENIX-4430:
------------------------------------

             Summary: Restrict the read of table metadata from SYSTEM CATALOG 
based on user permissions
                 Key: PHOENIX-4430
                 URL: https://issues.apache.org/jira/browse/PHOENIX-4430
             Project: Phoenix
          Issue Type: Improvement
            Reporter: Karan Mehta


PHOENIX-4198 removes the need for users to have write access to SYSTEM.CATALOG 
table, by impersonating as login user on the server side. Users now require 
just READ and EXEC access on the table. 

Users can still, however, run {{SELECT * FROM SYSTEM.CATALOG}} and read other 
table's metadata. Some applications might require greater level of security and 
want to restrict meta-data read as well. 

This JIRA is to discuss potential solutions for this problem. If we restrict a 
table's metadata, then we have to restrict the metadata for index and views as 
well. 

HBase allows users to set row-level permissions as well. Although we don't 
expose it via SQL API in PHOENIX-672, we can use it internally to grant/revoke 
permissions on specific metadata rows. The grant/revoke commands will also have 
to change the permissions on SYSCAT rows appropriately. Challenges and corner 
cases will come in cases of tenant specific views, which can be generated on 
the fly and the row key starts with TenantID followed by table name.

Other ideas / suggestions welcome.

[[email protected]] [[email protected]] [~jamestaylor] [~apurtell] 



--
This message was sent by Atlassian JIRA
(v6.4.14#64029)

Reply via email to