[ 
https://issues.apache.org/jira/browse/HBASE-9929?page=com.atlassian.jira.plugin.system.issuetabpanels:comment-tabpanel&focusedCommentId=13817898#comment-13817898
 ] 

Mikhail Antonov commented on HBASE-9929:
----------------------------------------

Yes, I agree that's not really HBase feature, more like very custom requirement 
which has to be implemented as a custom solution.

> Trusted administration server
> -----------------------------
>
>                 Key: HBASE-9929
>                 URL: https://issues.apache.org/jira/browse/HBASE-9929
>             Project: HBase
>          Issue Type: New Feature
>            Reporter: Andrew Purtell
>
> Some deployments would like to avoid needing kerberos principals for taking 
> administrative actions with the HBase shell, substituting their own 
> authentication. The HBase shell is a regular HBase client, which could run 
> anywhere, and cannot be trusted with simple authentication or impersonation 
> of arbitrary users. 
> Other Hadoop ecosystem components have a service process registered in 
> cluster configuration afforded the elevated privilege of impersonation. For 
> HBase, this could be a trusted administration server that would reside at a 
> fixed location, could be trusted to impersonate, with the shell modified to 
> optionally proxy administrative commands through it.
> Carried over from HBASE-2016 without comment.



--
This message was sent by Atlassian JIRA
(v6.1#6144)

Reply via email to