[ 
https://issues.apache.org/jira/browse/PHOENIX-5006?page=com.atlassian.jira.plugin.system.issuetabpanels:comment-tabpanel&focusedCommentId=16678819#comment-16678819
 ] 

Biju Nair edited comment on PHOENIX-5006 at 11/7/18 9:45 PM:
-------------------------------------------------------------

In the current {{Phoenix}} 
[code|https://github.com/apache/phoenix/blob/6195f8e7b5efeecd5c736ba0ef121b706c875d8d/phoenix-core/src/main/java/org/apache/phoenix/jdbc/PhoenixEmbeddedDriver.java#L377],
 a cluster is determined to be secure if the jdbc string includes {{Principal}} 
/ {{Keytab}} and it does a UGI login. Can this be changed to also include 
whether the property {{hadoop.security.authentication}} set to {{true}} for e.g 
in the properties passed to create the connection. If set to {{true}} and 
{{principal/keytab}} is not passed in the connection string then try to use the 
logged in user's Kerberos ticket to create the connection.
 BTW. If one creates a {{site.xml}} with this property alone and include it in 
the classpath of the code making the jdbc connection to Phoenix, the connection 
is successful which satisfies this requirement in a indirect way. But would be 
good to accept this property setting through the props to the connection so 
that no {{site.xml}} need to be maintained by the user.


was (Author: gsbiju):
In the current {{Phoenix}} 
[code|https://github.com/apache/phoenix/blob/6195f8e7b5efeecd5c736ba0ef121b706c875d8d/phoenix-core/src/main/java/org/apache/phoenix/jdbc/PhoenixEmbeddedDriver.java#L377],
 a cluster is determined to be secure if the jdbc string includes {{Principal}} 
/ {{Keytab}} and it does a UGI login. Can this be changed to also include 
whether the property {{hadoop.security.authentication}} set to {{true}} for e.g 
in the properties passed to create the connection. If set to {{true}} and 
{{principal/keytab}} is not passed in the connection string then try to use the 
logged in user's Kerberos ticket.
BTW. If one creates a {{site.xml}} with this property alone and include it in 
the classpath of the code making the jdbc connection to Phoenix, the connection 
is successful which satisfies this requirement in a indirect way. But would be 
good to accept this property setting through the props to the connection so 
that no {{site.xml}} need to be maintained by the user.

> jdbc connection to secure cluster should be able to use Kerberos ticket of 
> user
> -------------------------------------------------------------------------------
>
>                 Key: PHOENIX-5006
>                 URL: https://issues.apache.org/jira/browse/PHOENIX-5006
>             Project: Phoenix
>          Issue Type: Bug
>            Reporter: Biju Nair
>            Priority: Minor
>
> Currently JDBC connection against a secure Phoenix cluster requires a 
> Kerberos principal and keytab to be passed in as part of the connection 
> string. But in many instances users may not have a {{Keytab}} especially 
> during development. It would be good to support using the logged users 
> Kerberos ticket. 
>  



--
This message was sent by Atlassian JIRA
(v7.6.3#76005)

Reply via email to