[ 
https://issues.apache.org/jira/browse/RANGER-973?page=com.atlassian.jira.plugin.system.issuetabpanels:all-tabpanel
 ]

Gautam Borad resolved RANGER-973.
---------------------------------
    Resolution: Fixed

> Kerberos : Ranger Admin to perform Key operations using Principal / keytab of 
> RangerAdmin from UI
> -------------------------------------------------------------------------------------------------
>
>                 Key: RANGER-973
>                 URL: https://issues.apache.org/jira/browse/RANGER-973
>             Project: Ranger
>          Issue Type: Bug
>          Components: admin, kms
>    Affects Versions: 0.6.0
>            Reporter: Mehul Parikh
>            Assignee: Ankita Sinha
>             Fix For: 0.6.0
>
>         Attachments: RANGER-973.patch
>
>
> +*Problem Statement :*+
> Currently even in kerberos environment Ranger admin sends request using repo 
> config user. As now Ranger Admin and Ranger KMS are working in kerberos 
> environment, request for key operations from UI needs to go using ranger 
> admin credentials. 
> +*Need to improve following features:*+
> 1. KMS to use rangeradmin credentials for test connection, resource lookup 
> and for encrytpion key operation from Ranger admin UI Encryption tab.
> 2. Download Policy Session Log was created in every policy refresher call, so 
> in x_auth_session it is getting bulk of downloadpolicy session log.
> 3. To add ambari service check user in default policy using service config 
> custom property



--
This message was sent by Atlassian JIRA
(v6.3.4#6332)

Reply via email to