[ 
https://issues.apache.org/jira/browse/HAWQ-1089?page=com.atlassian.jira.plugin.system.issuetabpanels:all-tabpanel
 ]

Alastair "Bell" Turner updated HAWQ-1089:
-----------------------------------------
    Summary: Implement trustworthy user identity session variables  (was: 
Implement trustworthy user identity GUCs )

> Implement trustworthy user identity session variables
> -----------------------------------------------------
>
>                 Key: HAWQ-1089
>                 URL: https://issues.apache.org/jira/browse/HAWQ-1089
>             Project: Apache HAWQ
>          Issue Type: Sub-task
>          Components: Security
>            Reporter: Alastair "Bell" Turner
>            Assignee: Lei Chang
>             Fix For: backlog
>
>
>  HAWQ currently implements the Postgres SET ROLE and SET SESSION constructs 
> which can overwrite the session_user and current_user environment variables. 
> This allows the a superuser (gpadmin) to change the visible user identity.
> If these changeable identities are passed down for impersonation then it 
> invalidates some of the security benefits that user impersonation is supposed 
> to provide.
> Changing the current SET ROLE and SET SESSION behaviour would have knock on 
> effects for the security model for executing functions.
> The least intrusive route to having reliable user identity information to 
> pass down is exposing the oringially authorised user and authorisation method 
> (as defined in pg_hba) as read-only environment variables (maybe called 
> auth_user and auth_method?) in the session.



--
This message was sent by Atlassian JIRA
(v6.3.4#6332)

Reply via email to