[ 
https://issues.apache.org/jira/browse/HBASE-6096?page=com.atlassian.jira.plugin.system.issuetabpanels:comment-tabpanel&focusedCommentId=13286445#comment-13286445
 ] 

Laxman commented on HBASE-6096:
-------------------------------

{quote}Matteo:
2) if you grant for 'A' you don't get RWC
so admin are not able to read but are able to perform actions 
(create/delete/modify) on all tables{quote}


{quote}Andrew:
IMO, it's preferable to conceptualize ADMIN permission as only an extra bit 
that allows you to interact with the Master on table management concerns.{quote}

@Matteo & Andy, thank you for your explanation.

Yes, I couldn't agree to the point "ADMIN can't READ/WRITE". 

Say, GLOBAL/TABLE ADMIN should NOT be able to READ/WRITE from/to a table. But, 
they should be able to do ADMIN operations (including grant, revoke, etc.) on 
the table. Then, ADMIN can grant themselves any permission(CRW).

*It's an unwanted backdoor (may be a vulnerability). No?*

IMO, its no use in restricting ADMIN from READ/WRITE.
                
> AccessController v2
> -------------------
>
>                 Key: HBASE-6096
>                 URL: https://issues.apache.org/jira/browse/HBASE-6096
>             Project: HBase
>          Issue Type: Umbrella
>          Components: security
>    Affects Versions: 0.96.0, 0.94.1
>            Reporter: Andrew Purtell
>
> Umbrella issue for iteration on the initial AccessController drop.

--
This message is automatically generated by JIRA.
If you think it was sent incorrectly, please contact your JIRA administrators: 
https://issues.apache.org/jira/secure/ContactAdministrators!default.jspa
For more information on JIRA, see: http://www.atlassian.com/software/jira

        

Reply via email to