[
https://issues.apache.org/jira/browse/HIVE-8705?page=com.atlassian.jira.plugin.system.issuetabpanels:comment-tabpanel&focusedCommentId=14197661#comment-14197661
]
Lefty Leverenz commented on HIVE-8705:
--------------------------------------
Documentation for this belongs in the HiveServer2 Clients doc.
* [HiveServer2 Clients |
https://cwiki.apache.org/confluence/display/Hive/HiveServer2+Clients]
As a reminder, the documentation for HIVE-6486 (secure Subject.doAs() in
HiveServer2 JDBC client) is here:
* [HiveServer2 Clients -- Multi-User Scenarios and Programmatic Login to
Kerberos KDC |
https://cwiki.apache.org/confluence/display/Hive/HiveServer2+Clients#HiveServer2Clients-Multi-UserScenariosandProgrammaticLogintoKerberosKDC]
> Support using pre-authenticated subject in kerberized HiveServer2 HTTP mode
> ----------------------------------------------------------------------------
>
> Key: HIVE-8705
> URL: https://issues.apache.org/jira/browse/HIVE-8705
> Project: Hive
> Issue Type: Bug
> Components: HiveServer2, JDBC
> Affects Versions: 0.13.0, 0.14.0
> Reporter: Vaibhav Gumashta
> Assignee: Vaibhav Gumashta
> Priority: Critical
> Labels: TODOC14
> Fix For: 0.14.0
>
> Attachments: HIVE-8705.1.patch, HIVE-8705.1.patch,
> TestPreAuthenticatedKerberosSubject.java
>
>
> HIVE-6486 provided a patch to utilize pre-authenticated subject (someone who
> has programmatically done a JAAS login and is not doing kinit before
> connecting to HiveServer2 using the JDBC driver). However, that feature was
> only for the binary mode code path. We need to have a similar feature when
> the driver-server communicate using http transport.
--
This message was sent by Atlassian JIRA
(v6.3.4#6332)