[ 
https://issues.apache.org/jira/browse/FLINK-7860?page=com.atlassian.jira.plugin.system.issuetabpanels:comment-tabpanel&focusedCommentId=16300504#comment-16300504
 ] 

Eron Wright  commented on FLINK-7860:
-------------------------------------


Please elaborate on the scenario you hope to support.   From the description, 
seems you want to create a powerful service account (e.g. 'Flink') with an 
associated keytab, then launch jobs with that keytab that impersonate other 
users (e.g. 'Joe').  Reads and writes to HDFS would authenticate with the 
'Flink' keytab but would behave as though made by 'Joe'.   In addition, the 
HDFS service would be configured to allow 'Flink' to impersonate 'Joe'.   

If that's the scenario, I think it is a reasonable one.   But please consider 
two complications:
1. The job code has access to the keytab, since the code runs in-process.   The 
job code must be considered 'trusted', since it could steal the keytab and 
impersonate other users.
2. The Flink cluster doesn't protect the keytab very well; other processes 
could also steal it.   It seems unwise to give such a powerful keytab to Flink.

   

> Support YARN proxy user in Flink (impersonation)
> ------------------------------------------------
>
>                 Key: FLINK-7860
>                 URL: https://issues.apache.org/jira/browse/FLINK-7860
>             Project: Flink
>          Issue Type: New Feature
>          Components: YARN
>            Reporter: Shuyi Chen
>            Assignee: Shuyi Chen
>




--
This message was sent by Atlassian JIRA
(v6.4.14#64029)

Reply via email to