Larry McCay created KNOX-1051:
---------------------------------

             Summary: Provide Validation in Addition to the 
Authentication/Federation Provider 
                 Key: KNOX-1051
                 URL: https://issues.apache.org/jira/browse/KNOX-1051
             Project: Apache Knox
          Issue Type: Bug
          Components: Server
            Reporter: Larry McCay
             Fix For: 0.14.0


I have come across a number of deployment scenarios where it would be good to 
extend the capabilities of the authentication or federation provider with 
additional validation of the client doing the request.

Validation is currently an aspect of the PreAuth SSO Provider and is pretty 
powerful. This may be refactored to be available across other providers as well.

An example usecase could be:

* An application is leveraging KnoxSSO for authentication and as a result has 
an application SSO cookie with a JWT token issued by the KnoxSSO instance in 
their Knox deployment.
* The same application needs to make REST calls to a Knox gateway in another 
Hadoop cluster
* In order to federate the original authentication event, the backend of the 
application can exchange the KnoxSSO cookie token for a Hadoop cluster token 
using the KnoxToken service and the SSOCookieProvider
* We can lock down who the users are based on their groups and even the ip 
address of where to expect the calls to come from
* We cannot however provide real authentication of the calling entity

By adding a validation provider capability to any topology, regardless of 
provider selected, we can write a simple validator that ensures that a client 
cert has been provided - when used along with ClientCertWanted feature in 
KNOX-1050.

Another approach may be to allow for multiple authentication providers and we 
could add an X509 Cert Provider to chain together along with the 
SSOCookieProvider.



--
This message was sent by Atlassian JIRA
(v6.4.14#64029)

Reply via email to