[ 
https://issues.apache.org/jira/browse/HBASE-27326?page=com.atlassian.jira.plugin.system.issuetabpanels:all-tabpanel
 ]

Nick Dimiduk updated HBASE-27326:
---------------------------------
        Fix Version/s:     (was: 2.6.1)
    Affects Version/s: 3.0.0-beta-1
                       2.6.0
                       4.0.0-alpha-1

> Add validation of request user and groups from TLS certificate
> --------------------------------------------------------------
>
>                 Key: HBASE-27326
>                 URL: https://issues.apache.org/jira/browse/HBASE-27326
>             Project: HBase
>          Issue Type: Improvement
>    Affects Versions: 2.6.0, 3.0.0-beta-1, 4.0.0-alpha-1
>            Reporter: Bryan Beaudreault
>            Assignee: Andor Molnar
>            Priority: Major
>              Labels: security, ssl, tls
>
> When using mTLS for client authentication, we can allow the user to configure 
> certain certificate fields as a means for validating the passed username on 
> the ConnectionHeader. We can further look to inject groups for the user into 
> the request context, which can be used for downstream authz in (for example) 
> AuthManager/AccessChecker/etc.
> I would propose two new configs:
> {code:java}
> <property>
>   <name>hbase.rpc.tls.certificate.username.oid</name>
>   <value></value>
>   <description>When specified and TLS enabled, the client's SSL certificate 
> will be inspected for an OID of this value. A value must be found and the 
> value must match the username passed in the ConnectionHeader. For example, 
> can be set to "CN" and we will use the CommonName of the certificate to 
> validate the username.</description>
> </property>
> <property>
>   <name>hbase.rpc.tls.certificate.group.oid</name>
>   <value></value>
>   <description>When specified and TLS enabled, the client's SSL certificate 
> will be inspected for OIDs of this value. If one or more values are found, 
> they will be used as the user's groups for use in hbase authz.</description>
> </property>{code}
> I think this would only apply when AuthenticationMethod is SIMPLE (no 
> kerberos).



--
This message was sent by Atlassian Jira
(v8.20.10#820010)

Reply via email to