[ https://issues.apache.org/jira/browse/HBASE-7357?page=com.atlassian.jira.plugin.system.issuetabpanels:comment-tabpanel&focusedCommentId=13532950#comment-13532950 ]
Lars Hofhansl commented on HBASE-7357: -------------------------------------- Looks good. This does not seem to be needed in the context of this patch: {code} - private boolean isSecurityEnabled; + protected boolean isSecurityEnabled; {code} > HBaseClient and HBaseServer should use hbase.security.authentication when > negotiating authentication > ---------------------------------------------------------------------------------------------------- > > Key: HBASE-7357 > URL: https://issues.apache.org/jira/browse/HBASE-7357 > Project: HBase > Issue Type: Bug > Components: security > Reporter: Gary Helmling > Assignee: Gary Helmling > Attachments: HBASE-7357_0.94.patch, HBASE-7357.patch > > > This came up in the context of testing HBASE-6788. Currently HBaseClient and > HBaseServer call UserGroupInformation.isSecurityEnabled() when determining > whether or not to use SASL to negotiate connections. This means they are > using the hadoop.security.authentication configuration value. Since this is > in the context of HBase RPC connections, it seems more correct to use the > hbase.security.authentication configuration value by calling > User.isHBaseSecurityEnabled(). -- This message is automatically generated by JIRA. If you think it was sent incorrectly, please contact your JIRA administrators For more information on JIRA, see: http://www.atlassian.com/software/jira