Hi John Can you please elaborate on what you mean by authentication to the source system is going to be wide open in Drill.
Drill is a query layer on data sources and will respect the underlying storage permissions without having to manage centralized security permissions at Drill layer through user impersonation. Users can use Drill views if they need more granular access to the data. I would be interested in learning more about your use case to secure the storage plugin/connections. thanks On Mon, Oct 26, 2015 at 6:33 AM, John Omernik <[email protected]> wrote: > Hey all - > > On file system based storage plugins, security is straight forward with > filesystem permissions etc. How do we secure storage plugins? It would > seem we would want a situation where people could not access certain > storage plugins especially since authentication to the source system is > going to be "wide open" (i.e. there is no pass through auth to a backend > Mongo server, JDBC system, or Hbase setup) thus how do we wrap security > around these? > > Even basic security... i.e. only X user can use them, so we can use them to > load parquet tables or something where we can apply security. > > Thoughts? > > John >
