[
https://issues.apache.org/jira/browse/FLINK-3930?page=com.atlassian.jira.plugin.system.issuetabpanels:comment-tabpanel&focusedCommentId=15455319#comment-15455319
]
ASF GitHub Bot commented on FLINK-3930:
---------------------------------------
Github user rmetzger commented on a diff in the pull request:
https://github.com/apache/flink/pull/2425#discussion_r77169187
--- Diff: docs/setup/config.md ---
@@ -107,6 +107,21 @@ Please make sure to set the maximum ticket life span
high long running jobs. The
If you are on YARN, then it is sufficient to authenticate the client with
Kerberos. On a Flink standalone cluster you need to ensure that, initially, all
nodes are authenticated with Kerberos using the `kinit` tool.
+### Secure Cookie Authentication
+
+Flink supports hardening below cluster components through secure cookie
implementation.
+- Akka endpoints
+- Blob Server/Client communication
+- Web runtime communication
+
+Secure cookie authentication can be enabled by providing below
configurations to Flink configuration file.
+
+- `security.enabled`: A boolean value (true|false) indicating security is
enabled or not.
+- `security.cookie` : Secure cookie value to be used for authentication.
For standalone deployment mode, the secure cookie value is mandatory when
security is enabled but for the Yarn mode it is optional (auto-generated if not
provided).
+
+Alternatively, secure cookie value can be provided through Flink/Yarn CLI
using "-k" or "--cookie" parameter option.
+
+The web runtime module prompts for secure cookie using standard basic HTTP
authentication mechanism, where the user id field is noop and the password
field will be used to capture the secure cookie.
--- End diff --
Much appreciated that your pull request also contains documentation
updates! Thank you.
> Implement Service-Level Authorization
> -------------------------------------
>
> Key: FLINK-3930
> URL: https://issues.apache.org/jira/browse/FLINK-3930
> Project: Flink
> Issue Type: New Feature
> Components: Security
> Reporter: Eron Wright
> Assignee: Vijay Srinivasaraghavan
> Labels: security
> Original Estimate: 672h
> Remaining Estimate: 672h
>
> _This issue is part of a series of improvements detailed in the [Secure Data
> Access|https://docs.google.com/document/d/1-GQB6uVOyoaXGwtqwqLV8BHDxWiMO2WnVzBoJ8oPaAs/edit?usp=sharing]
> design doc._
> Service-level authorization is the initial authorization mechanism to ensure
> clients (or servers) connecting to the Flink cluster are authorized to do so.
> The purpose is to prevent a cluster from being used by an unauthorized
> user, whether to execute jobs, disrupt cluster functionality, or gain access
> to secrets stored within the cluster.
> Implement service-level authorization as described in the design doc.
> - Introduce a shared secret cookie
> - Enable Akka security cookie
> - Implement data transfer authentication
> - Secure the web dashboard
--
This message was sent by Atlassian JIRA
(v6.3.4#6332)