[
https://issues.apache.org/jira/browse/RANGER-973?page=com.atlassian.jira.plugin.system.issuetabpanels:all-tabpanel
]
Gautam Borad resolved RANGER-973.
---------------------------------
Resolution: Fixed
> Kerberos : Ranger Admin to perform Key operations using Principal / keytab of
> RangerAdmin from UI
> -------------------------------------------------------------------------------------------------
>
> Key: RANGER-973
> URL: https://issues.apache.org/jira/browse/RANGER-973
> Project: Ranger
> Issue Type: Bug
> Components: admin, kms
> Affects Versions: 0.6.0
> Reporter: Mehul Parikh
> Assignee: Ankita Sinha
> Fix For: 0.6.0
>
> Attachments: RANGER-973.patch
>
>
> +*Problem Statement :*+
> Currently even in kerberos environment Ranger admin sends request using repo
> config user. As now Ranger Admin and Ranger KMS are working in kerberos
> environment, request for key operations from UI needs to go using ranger
> admin credentials.
> +*Need to improve following features:*+
> 1. KMS to use rangeradmin credentials for test connection, resource lookup
> and for encrytpion key operation from Ranger admin UI Encryption tab.
> 2. Download Policy Session Log was created in every policy refresher call, so
> in x_auth_session it is getting bulk of downloadpolicy session log.
> 3. To add ambari service check user in default policy using service config
> custom property
--
This message was sent by Atlassian JIRA
(v6.3.4#6332)