Jonathan Maron created SLIDER-446:
-------------------------------------

             Summary: delegation token renewer identity may require definition 
of 'slider' user and principal
                 Key: SLIDER-446
                 URL: https://issues.apache.org/jira/browse/SLIDER-446
             Project: Slider
          Issue Type: Bug
          Components: appmaster, security
    Affects Versions: Slider 0.50
            Reporter: Jonathan Maron
            Assignee: Jonathan Maron


Currently the HDFS delegation token renewal framework needs to establish a 
user/subject using kerberos (not tokens) in order to perform the token renewal 
or replacement operations.  Given that it was HDFS, the current implementation 
leverages the namenode principal as the renewing identity.  However, this 
approach does not work if the node on which the AM is running doesn't actually 
have access to the namenode keytab.  So, as I see it, there are a number of 
alternatives:

1)  Looks for a datanode keytab if the namenode keytab is not available and use 
the DN service principal - probably not the best choice since, once again, 
there's no guarantee that a DN is running on the NM host.
2)  Use the NM principal/keytab - this may be appropriate.  Are there any 
permission issues in leveraging a yarn principal with HDFS?
3)  Create a slider-specific service principal and keytab - this would seem to 
be appropriate given the precedent set in Hadoop (most secure applications 
appear to manage their own set of principals).
4)  Others?

Given that this subject may engender multiple opinions, I could use option 2 as 
an interim (and possibly final) solution?
 



--
This message was sent by Atlassian JIRA
(v6.3.4#6332)

Reply via email to