[ 
https://issues.apache.org/jira/browse/HIVE-17187?page=com.atlassian.jira.plugin.system.issuetabpanels:comment-tabpanel&focusedCommentId=16103740#comment-16103740
 ] 

Eric Yang commented on HIVE-17187:
----------------------------------

See [the 
blog|https://developer.ibm.com/hadoop/2016/05/12/hbase-rest-gateway-security/] 
written by IBM about SPNEGO for HBase REST API.  This is a good source to 
implement SPNEGO properly with doAs calls with service principal instead of 
proxy user with SPNEGO credential.

> WebHCat SPNEGO support is incompleted
> -------------------------------------
>
>                 Key: HIVE-17187
>                 URL: https://issues.apache.org/jira/browse/HIVE-17187
>             Project: Hive
>          Issue Type: Bug
>          Components: WebHCat
>    Affects Versions: 1.2.1
>            Reporter: Eric Yang
>
> [Some online 
> document|https://docs.hortonworks.com/HDPDocuments/HDP2/HDP-2.6.1/bk_security/content/spnego_setup_for_webhcat.html]
>  describes how to setup WebHCat with SPNEGO support.  However, there could be 
> multiple services use SPNEGO on the same host.  For example, HBase REST API 
> can also setup to use HTTP principal for SPNEGO support.  When HTTP principal 
> is shared among other services, Hadoop proxy user settings can not identify 
> the origin of doAs call with HTTP principal, is invoked by HBase REST API or 
> WebHCat.  Ideally, WebHCat should keep track of its own service principal 
> independent of SPNEGO principal to ensure that SPNEGO principal is only given 
> authentication access.  SPNEGO principal should not be used in proxy user 
> setting to grant authorization access.



--
This message was sent by Atlassian JIRA
(v6.4.14#64029)

Reply via email to