[ 
https://issues.apache.org/jira/browse/RANGER-2379?page=com.atlassian.jira.plugin.system.issuetabpanels:comment-tabpanel&focusedCommentId=16806958#comment-16806958
 ] 

Abhay Kulkarni edited comment on RANGER-2379 at 4/1/19 4:32 PM:
----------------------------------------------------------------

Patch available at the review board:

[https://reviews.apache.org/r/70310/]

 

Commit details:

master:

[https://github.com/apache/ranger/commit/d4d4f655d76e902cc8ad611e5b56d66d4487218e]


was (Author: abhayk):
Commit details:

master:

[https://github.com/apache/ranger/commit/d4d4f655d76e902cc8ad611e5b56d66d4487218e]

> Support for associating a tag service with security zone and relevant 
> authorization logic 
> ------------------------------------------------------------------------------------------
>
>                 Key: RANGER-2379
>                 URL: https://issues.apache.org/jira/browse/RANGER-2379
>             Project: Ranger
>          Issue Type: Improvement
>          Components: Ranger
>    Affects Versions: master
>            Reporter: Abhay Kulkarni
>            Assignee: Abhay Kulkarni
>            Priority: Major
>             Fix For: master
>
>
> Currently, tag service is associated with a security zone if and only if any 
> service-resource (that is, a tuple <resource-service, resource> ) in the 
> Security Zone is contained in resource-service that is associated with the 
> tag service. However, consider the following use case:
> 1) No zone exists. Tag-based policies are in-place, say for PII, EXPIRES_ON, 
> etc.
> 2) Few tables in finance DB were tagged with EXPIRES_ON; few columns within 
> this DB were tagged with PII. So tag-based access enforcement/masking 
> policies are in effect for these objects.
> 3) An admin creates 'Finance' zone and moves 'finance' DB to this zone.
> 4) All tag-based policy enforcement is lost; as there is no tag-based policy 
> in 'finance' zone, as the policies still belong to “unzoned” zone. 
> Given this, it is a better design to not automatically create 
> tag-service->zone association. Instead, the association between 
> zone->tag-service needs to supported directly similar to how 
> zone->resource-service association is established, with one difference; when 
> a tag service is associated with a Security Zone, user should not be able to 
> include any resource (tag-name, to be specific). This requires GUI changes 
> for Security Zone CRUD, but no other changes, especially to tag service 
> browser as well as tag policy creation.
> On the access evaluation perspective, if accessed resource falls in a 
> Security Zone, then there are two cases:
> 1) Tag-service associated with the Resource-service is in the Security Zone.
>  2) Tag-service associated with the Resource-service is not in the Security 
> Zone.
> Tag policies in associated Tag-service in the default ("unzoned") Security 
> Zone need to be considered for evaluation in case 2.



--
This message was sent by Atlassian JIRA
(v7.6.3#76005)

Reply via email to