----------------------------------------------------------- This is an automatically generated e-mail. To reply, visit: https://reviews.apache.org/r/74014/ -----------------------------------------------------------
Review request for ranger, Dhaval Shah, Dineshkumar Yadav, Abhay Kulkarni, Mehul Parikh, Pradeep Agrawal, Ramesh Mani, Sailaja Polavarapu, Vishal Suvagia, and Velmurugan Periasamy. Repository: ranger Description ------- Add JWT auth filter in Ranger Admin, which authenticates browser & non-browser JWT requests without altering existing authentication filters. The existing authorization process must be alter to incorporate following cases Token SSO Enabled First Authorizer / Filter Present Yes RangerSSOAuthenticationFilter Absent Yes RangerSSOAuthenticationFilter Present No RangerJwtAuthFilter (NEW) Absent No RangerJwtAuthFilter (NEW) Enabled JWT filter by default. Diffs ----- security-admin/src/main/resources/conf.dist/security-applicationContext.xml 7db9c3850 Diff: https://reviews.apache.org/r/74014/diff/1/ Testing ------- 1. mvn clean compile package install -U 2. Login ModHeader (chrome plugin): invalid JWT 3. Login ModHeader (chrome plugin): expired JWT 4. Login ModHeader (chrome plugin): tampered JWT 5. Login ModHeader (chrome plugin): valid JWT 6. Curl Access API: invalid JWT 7. Curl Access API: expired JWT 8. Curl Access API: tampered JWT 9. Curl Access API: valid JWT Thanks, Kishor Gollapalliwar
