[ 
https://issues.apache.org/jira/browse/HBASE-7357?page=com.atlassian.jira.plugin.system.issuetabpanels:comment-tabpanel&focusedCommentId=14021554#comment-14021554
 ] 

Hudson commented on HBASE-7357:
-------------------------------

FAILURE: Integrated in HBase-TRUNK #5187 (See 
[https://builds.apache.org/job/HBase-TRUNK/5187/])
HBASE-7394 Document security config requirements from HBASE-7357 (Misty 
Stanley-Jones) (stack: rev 8c43acfd45967f39f8a2bfc4be2814f9eef0992c)
* src/main/docbkx/security.xml


> HBaseClient and HBaseServer should use hbase.security.authentication when 
> negotiating authentication
> ----------------------------------------------------------------------------------------------------
>
>                 Key: HBASE-7357
>                 URL: https://issues.apache.org/jira/browse/HBASE-7357
>             Project: HBase
>          Issue Type: Bug
>          Components: security
>            Reporter: Gary Helmling
>            Assignee: Gary Helmling
>             Fix For: 0.94.4, 0.95.0
>
>         Attachments: HBASE-7357.patch, HBASE-7357_0.94.patch, 
> HBASE-7357_0.94_2.patch
>
>
> This came up in the context of testing HBASE-6788.  Currently HBaseClient and 
> HBaseServer call UserGroupInformation.isSecurityEnabled() when determining 
> whether or not to use SASL to negotiate connections.  This means they are 
> using the hadoop.security.authentication configuration value.  Since this is 
> in the context of HBase RPC connections, it seems more correct to use the 
> hbase.security.authentication configuration value by calling 
> User.isHBaseSecurityEnabled().



--
This message was sent by Atlassian JIRA
(v6.2#6252)

Reply via email to