[ 
https://issues.apache.org/jira/browse/HDFS-5126?page=com.atlassian.jira.plugin.system.issuetabpanels:comment-tabpanel&focusedCommentId=13747332#comment-13747332
 ] 

Erik.fang commented on HDFS-5126:
---------------------------------

I will submit a patch for prototype later
                
> implement authorized HDFS user impersonation
> --------------------------------------------
>
>                 Key: HDFS-5126
>                 URL: https://issues.apache.org/jira/browse/HDFS-5126
>             Project: Hadoop HDFS
>          Issue Type: New Feature
>          Components: security
>            Reporter: Erik.fang
>            Priority: Minor
>              Labels: features, security
>
> I propose a authorized user impersonate mechanism for fine grain (path level) 
> access control in HDFS.
> In short, owner of data encrypt the path with a shared secret, and other user 
> use the encrypted path to call namenode service (create/read/delete file). 
> Namenode decrypt the path to validate the access and execute the operation as 
> owner of the data if valid. It consists of:
> 1. a ACLFileSystem extends DistributedFileSystem, which wrap the 
> create/open/delete/etc. RPC calls, and send the encrypted path to namenode
> 2. authenticator(embedded in namenode), which decrypt the path and execute 
> the call as owner of the data
> With authorized user impersonate, we can develop a authorization manager to 
> check whether a path level access is permitted.
> A detailed explanation can be found in maillist:
> http://mail-archives.apache.org/mod_mbox/hive-dev/201308.mbox/%3CCACkoVCxm+=44kB_4eWtepHe_knkdm0Uzyh=0q-vfybyu8el...@mail.gmail.com%3E

--
This message is automatically generated by JIRA.
If you think it was sent incorrectly, please contact your JIRA administrators
For more information on JIRA, see: http://www.atlassian.com/software/jira

Reply via email to