[ 
https://issues.apache.org/jira/browse/YARN-3053?page=com.atlassian.jira.plugin.system.issuetabpanels:comment-tabpanel&focusedCommentId=15969443#comment-15969443
 ] 

Robert Kanter commented on YARN-3053:
-------------------------------------

[~varun_saxena], thanks for posting the updated doc.  It sounds like Approach 2 
would be the best, right?  It's much simpler and more straightforward than 
Approach 1, which requires passing delegation tokens around everywhere.  The 
only downside to Approach 2 called out in the doc is that there's a potential 
ID clash, but it didn't seem like a big issue.  Why did you decide to go with 
Approach 1?

> [Security] Review and implement authentication in ATS v.2
> ---------------------------------------------------------
>
>                 Key: YARN-3053
>                 URL: https://issues.apache.org/jira/browse/YARN-3053
>             Project: Hadoop YARN
>          Issue Type: Sub-task
>          Components: timelineserver
>            Reporter: Sangjin Lee
>            Assignee: Varun Saxena
>              Labels: YARN-5355, yarn-5355-merge-blocker
>         Attachments: ATSv2Authentication(draft).pdf, 
> ATSv2Authentication.v01.pdf
>
>
> Per design in YARN-2928, we want to evaluate and review the system for 
> security, and ensure proper security in the system.
> This includes proper authentication, token management, access control, and 
> any other relevant security aspects.



--
This message was sent by Atlassian JIRA
(v6.3.15#6346)

---------------------------------------------------------------------
To unsubscribe, e-mail: [email protected]
For additional commands, e-mail: [email protected]

Reply via email to