Hi John

Can you please elaborate on what you mean by authentication to the source
system is going to be wide open in Drill.

Drill is a query layer on data sources and will respect the underlying
storage permissions without having to manage centralized security
permissions at Drill layer through user impersonation. Users can use Drill
views if they need more granular access to the data.

I would be interested in learning more about your use case to secure the
storage plugin/connections.

thanks

On Mon, Oct 26, 2015 at 6:33 AM, John Omernik <[email protected]> wrote:

> Hey all -
>
> On file system based storage plugins, security is straight forward with
> filesystem permissions etc.  How do we secure storage plugins?  It would
> seem we would want a situation where people could not access certain
> storage plugins especially since authentication to the source system is
> going to be "wide open" (i.e. there is no pass through auth to a backend
> Mongo server, JDBC system, or Hbase setup)  thus how do we wrap security
> around these?
>
> Even basic security... i.e. only X user can use them, so we can use them to
> load parquet tables or something where we can apply security.
>
> Thoughts?
>
> John
>

Reply via email to