Github user HeartSaVioR commented on a diff in the pull request:

    https://github.com/apache/storm/pull/2562#discussion_r169179737
  
    --- Diff: docs/SECURITY.md ---
    @@ -17,6 +17,9 @@ Authentication and Authorization. But to do so usually 
requires
     configuring your Operating System to restrict the operations that can be 
done.
     This is generally a good idea even if you plan on running your cluster 
with Auth.
     
    +Meaning to say, Storm's OS level security is based on running Storm 
processes with proper OS account,
    --- End diff --
    
    Updated.


---

Reply via email to