Can you explain your use case a bit please? I am attempting to enhance Ranger with my own ACLs which are currently > being used for encryption decryption operations performed in hadoop. >
I trust when you say hadoop you mean the HDFS DFS. Right? Where are you current ACLs? Are you looking to replicate the ACL that are used for encryption to also be used for access, too? Or are you trying to use Ranger policies to enforce encryption/decryption? On Tue, Jan 13, 2015 at 1:06 AM, Sridhar S <[email protected]> wrote: > Hi, > I am attempting to enhance Ranger with my own ACLs which are currently > being used for encryption decryption operations performed in hadoop. Any > help on pointers to which parts of the code should i be looking at would > be much appreciated. > Sridhar > -- "* ... there is nothing more secure then a computer which is not connected to the network --- and powered off!...*" - from Kerberos Introduction <http://web.mit.edu/Kerberos/www/#what_is> -- CONFIDENTIALITY NOTICE NOTICE: This message is intended for the use of the individual or entity to which it is addressed and may contain information that is confidential, privileged and exempt from disclosure under applicable law. If the reader of this message is not the intended recipient, you are hereby notified that any printing, copying, dissemination, distribution, disclosure or forwarding of this communication is strictly prohibited. If you have received this communication in error, please contact the sender immediately and delete it from your system. Thank You.
