Github user vanzin commented on a diff in the pull request:

    https://github.com/apache/spark/pull/5664#discussion_r29177281
  
    --- Diff: docs/security.md ---
    @@ -11,12 +11,83 @@ Spark currently supports authentication via a shared 
secret. Authentication can
     
     ## Web UI
     
    -The Spark UI can also be secured by using [javax servlet 
filters](http://docs.oracle.com/javaee/6/api/javax/servlet/Filter.html) via the 
`spark.ui.filters` setting. A user may want to secure the UI if it has data 
that other users should not be allowed to see. The javax servlet filter 
specified by the user can authenticate the user and then once the user is 
logged in, Spark can compare that user versus the view ACLs to make sure they 
are authorized to view the UI. The configs `spark.acls.enable` and 
`spark.ui.view.acls` control the behavior of the ACLs. Note that the user who 
started the application always has view access to the UI.  On YARN, the Spark 
UI uses the standard YARN web application proxy mechanism and will authenticate 
via any installed Hadoop filters.
    +The Spark UI can be secured by using [javax servlet 
filters](http://docs.oracle.com/javaee/6/api/javax/servlet/Filter.html) via the 
`spark.ui.filters` setting and by using [Jetty 
https/SSL](http://www.eclipse.org/jetty/documentation/current/configuring-ssl.html)
 via the `spark.ui.https.enabled` setting.
    +
    +### Authentication
    +
    +A user may want to secure the UI if it has data that other users should 
not be allowed to see. The javax servlet filter specified by the user can 
authenticate the user and then once the user is logged in, Spark can compare 
that user versus the view ACLs to make sure they are authorized to view the UI. 
The configs `spark.acls.enable` and `spark.ui.view.acls` control the behavior 
of the ACLs. Note that the user who started the application always has view 
access to the UI.  On YARN, the Spark UI uses the standard YARN web application 
proxy mechanism and will authenticate via any installed Hadoop filters.
     
     Spark also supports modify ACLs to control who has access to modify a 
running Spark application.  This includes things like killing the application 
or a task. This is controlled by the configs `spark.acls.enable` and 
`spark.modify.acls`. Note that if you are authenticating the web UI, in order 
to use the kill button on the web UI it might be necessary to add the users in 
the modify acls to the view acls also. On YARN, the modify acls are passed in 
and control who has modify access via YARN interfaces.
     
     Spark allows for a set of administrators to be specified in the acls who 
always have view and modify permissions to all the applications. is controlled 
by the config `spark.admin.acls`. This is useful on a shared cluster where you 
might have administrators or support staff who help users debug applications.
     
    +### Encryption
    +
    +Spark use SSL(Secure Sockets Layer) to establish an encrypted link between 
UI server and browser client. The config `spark.ui.https.enabled` open switch 
for encryption, other configs of SSL encryption is as follows
    +
    +<table class="table">
    +  <tr><th>Property Name</th><th>Default</th><th>Meaning</th></tr>
    +  <tr>
    +    <td>spark.ui.https.enabled</td>
    --- End diff --
    
    These are already documented more generically in `docs/configuration.md`. 
Should this section just point the user to that document? Then just say the 
subsystem-specific namespace for the UI is `ui`, since the rest is explained 
there.



---
If your project is set up for it, you can reply to this email and have your
reply appear on GitHub as well. If your project does not have this feature
enabled and wishes so, or if the feature is enabled but not working, please
contact infrastructure at [email protected] or file a JIRA ticket
with INFRA.
---

---------------------------------------------------------------------
To unsubscribe, e-mail: [email protected]
For additional commands, e-mail: [email protected]

Reply via email to