(note: I did not review the PR)

On-prem systems usually have different security perimeters than cloud
systems.

While vending long-term credentials by default is too risky, I agree, why
would Polaris restrict that in controlled environments where the admin user
explicitly wants to enable that (e.g. via a deployment time config option
for the credentials max duration)?

Thanks,
Dmitri.

On Fri, Dec 6, 2024 at 6:16 PM Michael Collado <collado.m...@gmail.com>
wrote:

> Hey folks
>
> Someone pinged about https://github.com/apache/polaris/pull/389 yesterday
> and I thought it was worth bringing up for discussion.
>
> On-prem s3 compat sounds like a super useful feature and I'm fully on board
> with supporting it, but I think we need to make a decision about whether we
> support vending long-lived storage credentials in the REST endpoint. I
> think we generally favor compatibility and extensibility, but I am of the
> opinion that we should disallow obvious security risks, such as vending
> long-lived credentials. The blast radius of accidentally vending
> short-lived tokens is fairly contained, whereas the consequences of vending
> long-lived credentials can be unbounded.
>
> I think this is one of those areas where the project/community should be
> opinionated and say we should not sacrifice security for the sake of
> compatibility with specific environments. If some environments promote less
> secure credential handling by disallow session token generation, then we
> should simply not support those environments.
>
> What are your thoughts on that issue? Is that a suitable design tenet we
> can add to our project documentation? Or am I just being stubborn?
>
> Mike
>

Reply via email to