>From what I understand, there is not a historical reason for this not having been implemented. It was discussed, but never prioritized.
The doc looks great Mansehaj, thanks for putting this together. On Thu, Apr 17, 2025 at 3:14 PM Dmitri Bourlatchkov <di...@apache.org> wrote: > Thanks, Mansehaj! > > Very nice proposal! I added some comments to the doc. > > I think in general it is a valuable feature, but as you mentioned in the > doc there may be historical reasons why it was not implemented initially. I > hope people more knowledgeable in this area can comment on that. > > Cheers, > Dmitri. > > On Thu, Apr 17, 2025 at 2:59 PM Mansehaj Singh > <mansehaj.si...@snowflake.com.invalid> wrote: > > > Hi everyone! > > > > I've drafted a small proposal here: > > > > > https://docs.google.com/document/d/1uIJUp1BeAGm_mSO8OBjIZmeL5zY8dLzuYRP4Ah1U7X0/edit?usp=sharing > > > > > > In summary, this proposes adding a new resetCredentials functionality to > > Polaris to allow service_admin to be able to reset any principal's > > credentials. This is really useful for a number of different credential > > loss scenarios, eg. when someone leaves the company, an employee goes on > > temporary leave, forgotten passwords etc. Of course, we hope that users > > have no single point of failure for their critical workloads, but these > > kinds of issues often don't become apparent until credential loss > actually > > occurs, at which point remediation can become difficult in Polaris. > Having > > a root user with the ability to reset credentials is a decently common > > concept and I think it would add value. Currently, the only workaround is > > to create a new principal and reassign all of their principal roles. > > > > However, addressing the risks is also important. This proposal > introduces a > > path for service_admins to basically be able to assume any principal > within > > Polaris, which is a major security vulnerability if a principal with > > service_admin access ever did become compromised. However, this risk is > > already present because a service_admin can create principals and assign > > principal roles to assume the same level of privileges desired, it just > > can't actually impersonate as any other principal. > > > > It looks like there is existing appetite to add something like this to > > Polaris: https://github.com/apache/polaris/issues/624 > > > > I'm curious to hear what the community thinks we can do to address this > and > > whether introducing these risks is worth having functionality like this. > > > > Thanks for reading, > > Sehaj > > >