[ https://issues.apache.org/jira/browse/SOLR-4392?page=com.atlassian.jira.plugin.system.issuetabpanels:comment-tabpanel&focusedCommentId=13580403#comment-13580403 ]
Ken Geis commented on SOLR-4392: -------------------------------- I think that the ability to use a JNDI data source makes this a non-issue. > DIH - Need to externalize or encrypt username/password stored within > data-config.xml > ------------------------------------------------------------------------------------ > > Key: SOLR-4392 > URL: https://issues.apache.org/jira/browse/SOLR-4392 > Project: Solr > Issue Type: New Feature > Components: contrib - DataImportHandler > Affects Versions: 4.0, 4.1 > Reporter: Senthuran Sivananthan > Attachments: SOLR-4392.patch > > > Today, the connection (database or otherwise) credentials is wide open in > data-config.xml. Not really an issue until someone sends out the config file > outside of the server. > We should look into externalizing the database lookup or providing a way to > encrypt the username and password. > The needs are: > 1/ Some projects want to enable multi-tenancy where data for each core is > situated in different database servers w/ their own credentials. We need a > way to expose hooks that will allow implementations to be plugged in. It can > be done though the "type" attribute on the dataSource, but providing a > factory might work better. > 2/ Most orgs are very protective of their credentials and weary of > plain-text settings. -- This message is automatically generated by JIRA. If you think it was sent incorrectly, please contact your JIRA administrators For more information on JIRA, see: http://www.atlassian.com/software/jira --------------------------------------------------------------------- To unsubscribe, e-mail: dev-unsubscr...@lucene.apache.org For additional commands, e-mail: dev-h...@lucene.apache.org