[ 
https://issues.apache.org/jira/browse/SOLR-4392?page=com.atlassian.jira.plugin.system.issuetabpanels:comment-tabpanel&focusedCommentId=13580403#comment-13580403
 ] 

Ken Geis commented on SOLR-4392:
--------------------------------

I think that the ability to use a JNDI data source makes this a non-issue.
                
> DIH - Need to externalize or encrypt username/password stored within 
> data-config.xml
> ------------------------------------------------------------------------------------
>
>                 Key: SOLR-4392
>                 URL: https://issues.apache.org/jira/browse/SOLR-4392
>             Project: Solr
>          Issue Type: New Feature
>          Components: contrib - DataImportHandler
>    Affects Versions: 4.0, 4.1
>            Reporter: Senthuran Sivananthan
>         Attachments: SOLR-4392.patch
>
>
> Today, the connection (database or otherwise) credentials is wide open in 
> data-config.xml.  Not really an issue until someone sends out the config file 
> outside of the server.
> We should look into externalizing the database lookup or providing a way to 
> encrypt the username and password.
> The needs are:
> 1/  Some projects want to enable multi-tenancy where data for each core is 
> situated in different database servers w/ their own credentials.  We need a 
> way to expose hooks that will allow implementations to be plugged in.  It can 
> be done though the "type" attribute on the dataSource, but providing a 
> factory might work better.
> 2/  Most orgs are very protective of their credentials and weary of 
> plain-text settings.

--
This message is automatically generated by JIRA.
If you think it was sent incorrectly, please contact your JIRA administrators
For more information on JIRA, see: http://www.atlassian.com/software/jira

---------------------------------------------------------------------
To unsubscribe, e-mail: dev-unsubscr...@lucene.apache.org
For additional commands, e-mail: dev-h...@lucene.apache.org

Reply via email to