[ 
https://issues.apache.org/jira/browse/RANGER-973?page=com.atlassian.jira.plugin.system.issuetabpanels:comment-tabpanel&focusedCommentId=15277849#comment-15277849
 ] 

Gautam Borad commented on RANGER-973:
-------------------------------------

Committed to master : 
https://github.com/apache/incubator-ranger/commit/2bd65f7bc9fa5eff9cc33d17c1218571ca756cf6

> Kerberos : Ranger Admin to perform Key operations using Principal / keytab of 
> RangerAdmin from UI
> -------------------------------------------------------------------------------------------------
>
>                 Key: RANGER-973
>                 URL: https://issues.apache.org/jira/browse/RANGER-973
>             Project: Ranger
>          Issue Type: Bug
>          Components: admin, kms
>    Affects Versions: 0.6.0
>            Reporter: Mehul Parikh
>            Assignee: Ankita Sinha
>             Fix For: 0.6.0
>
>         Attachments: RANGER-973.patch
>
>
> +*Problem Statement :*+
> Currently even in kerberos environment Ranger admin sends request using repo 
> config user. As now Ranger Admin and Ranger KMS are working in kerberos 
> environment, request for key operations from UI needs to go using ranger 
> admin credentials. 
> +*Need to improve following features:*+
> 1. KMS to use rangeradmin credentials for test connection, resource lookup 
> and for encrytpion key operation from Ranger admin UI Encryption tab.
> 2. Download Policy Session Log was created in every policy refresher call, so 
> in x_auth_session it is getting bulk of downloadpolicy session log.
> 3. To add ambari service check user in default policy using service config 
> custom property



--
This message was sent by Atlassian JIRA
(v6.3.4#6332)

Reply via email to