[ 
https://issues.apache.org/jira/browse/ACCUMULO-4306?page=com.atlassian.jira.plugin.system.issuetabpanels:all-tabpanel
 ]

Christopher Tubbs resolved ACCUMULO-4306.
-----------------------------------------
    Resolution: Not A Problem

>From a secure deployment perspective, I think it wouldn't make sense to run 
>HDFS in an insecure mode, and Accumulo with Kerberos. However, I think there's 
>probably a lot of value in separating ourselves away from the Hadoop UGI 
>interfaces, so we're not so tightly coupled to Hadoop libraries for 
>authentication.

In any case, this ticket seems to have stalled 3 years ago, so I'm closing it. 
Please create a new issue at https://github.com/apache/accumulo/issues if there 
is still a need for work to be done here.

> Support Kerberos authentication terminating at Accumulo
> -------------------------------------------------------
>
>                 Key: ACCUMULO-4306
>                 URL: https://issues.apache.org/jira/browse/ACCUMULO-4306
>             Project: Accumulo
>          Issue Type: Improvement
>          Components: core, rpc
>            Reporter: William Slacum
>            Assignee: William Slacum
>            Priority: Major
>              Labels: authentication, kerberos
>
> We currently support Kerberos authentication via SASL+GSSAPI. Due to an 
> implementation detail, turning it on requires also enabling Kerberos for HDFS.
> This ticket proposes changing the implementation to avoid needing to turn on 
> Kerberos authentication for HDFS, but still (optionally) using it. Mostly, I 
> think this boils down to replacing uses of {{UserGroupInformation}} with 
> {{Subject}} references. There are couple places (specifically around creating 
> delegation tokens for use with a Kerberos-enabled Hadoop cluster) where 
> `UserGroupInformation` may need to stick around.



--
This message was sent by Atlassian JIRA
(v7.6.3#76005)

Reply via email to