[ 
https://issues.apache.org/jira/browse/CALCITE-2285?page=com.atlassian.jira.plugin.system.issuetabpanels:comment-tabpanel&focusedCommentId=16463201#comment-16463201
 ] 

Karan Mehta commented on CALCITE-2285:
--------------------------------------

{quote}
I'm familiar with two-way SSL/mutual authn, but I'm getting the impression that 
MTLS goes farther than that? Is this something that is generally implemented by 
all HTTP servers
{quote}
First level check for MTLS includes whether the client cert if verified by one 
of the trusted roots present in Server truststore or if no truststore is 
provided then it checks if both the server and client side certs have same 
roots.
Customized logic can be added to filter/authenticate users based on other 
fields present in the cert. For example, we can use CN field of the cert to 
whitelist certain hosts (since CN field usually contains hostname) or store 
client information in OU field and whitelist certain clients based on it.

{quote}
 Is this something that is generally implemented by all HTTP servers?
{quote}
Not necessarily, it just extra security measure. Generally used only in 
internal environments, for example, company servers, where all clients are 
well-known in advance.


> Support client cert keystore for Avatica Client
> -----------------------------------------------
>
>                 Key: CALCITE-2285
>                 URL: https://issues.apache.org/jira/browse/CALCITE-2285
>             Project: Calcite
>          Issue Type: Improvement
>          Components: avatica
>            Reporter: Karan Mehta
>            Assignee: Karan Mehta
>            Priority: Major
>
> Currently Avatica only supports adding trust-store in {{SSLContext}} in all 
> {{AvaticaHttpClient}} implementations. If keystore support it added, MTLS 
> connections can be established as well.



--
This message was sent by Atlassian JIRA
(v7.6.3#76005)

Reply via email to