[ 
https://issues.apache.org/jira/browse/SOLR-7236?page=com.atlassian.jira.plugin.system.issuetabpanels:comment-tabpanel&focusedCommentId=14386883#comment-14386883
 ] 

Shawn Heisey commented on SOLR-7236:
------------------------------------

I admit that I do not know what is possible when the servlet container is 
external to Solr, but I've heard that there are many things that we cannot do.  
One of the big ones is that we don't even know the port the container is 
listening on for our webapp, until we actually receive a request.  SolrCloud 
needs this information before requests are received, so we have overrides we 
can use if the port is not 8983, Java doesn't detect the correct IP address, 
etc ... but they are separate config items from what actually configures the 
servlet container, so it's possible to get the config wrong.

Just taking the step of embedding Jetty into the application would give us far 
more capability and consistency than we currently have, but again I am ignorant 
of what kind of limitations we would face, and how that would compare to using 
Netty instead.


> Securing Solr (umbrella issue)
> ------------------------------
>
>                 Key: SOLR-7236
>                 URL: https://issues.apache.org/jira/browse/SOLR-7236
>             Project: Solr
>          Issue Type: New Feature
>            Reporter: Jan Høydahl
>              Labels: Security
>
> This is an umbrella issue for adding security to Solr. The discussion here 
> should discuss real user needs and high-level strategy, before deciding on 
> implementation details. All work will be done in sub tasks and linked issues.
> Solr has not traditionally concerned itself with security. And It has been a 
> general view among the committers that it may be better to stay out of it to 
> avoid "blood on our hands" in this mine-field. Still, Solr has lately seen 
> SSL support, securing of ZK, and signing of jars, and discussions have begun 
> about securing operations in Solr.
> Some of the topics to address are
> * User management (flat file, AD/LDAP etc)
> * Authentication (Admin UI, Admin and data/query operations. Tons of auth 
> protocols: basic, digest, oauth, pki..)
> * Authorization (who can do what with what API, collection, doc)
> * Pluggability (no user's needs are equal)
> * And we could go on and on but this is what we've seen the most demand for



--
This message was sent by Atlassian JIRA
(v6.3.4#6332)

---------------------------------------------------------------------
To unsubscribe, e-mail: dev-unsubscr...@lucene.apache.org
For additional commands, e-mail: dev-h...@lucene.apache.org

Reply via email to