[ 
https://issues.apache.org/jira/browse/RANGER-861?page=com.atlassian.jira.plugin.system.issuetabpanels:all-tabpanel
 ]

Bolke de Bruin updated RANGER-861:
----------------------------------
    Description: 
When using Ranger hive queries are executed under a superuser account instead 
of the users' own account . This means that in the UIs one is unable to 
distinguish who is running what job because they all reside under the same 
user. This is a usability issue.

Also "What this means is that Hiveserver2 will run MR jobs in HDFS as the 
original user" mentioned in 
http://hortonworks.com/blog/best-practices-for-hive-authorization-using-apache-ranger-in-hdp-2-2/
 does not seem to be the case. The screenshots also support this as the files 
are being owned by the hive user and permissions are only set for the hive user.

For HDFS access can be granted by Ranger. It (ranger) however expects the files 
to be owned by the 'hive' user otherwise they won't be accessible by services 
that do not integrate with ranger, although the proper permissions/acls are in 
place.

Moreover, logging for the different services now also doesn't include the user 
ids anymore making it easier for someone to manipulate the logs. We consider 
this a security issue.

We would like to see the option of:

1. Execution of (hive etc) jobs under the original user id
2. Making sure Ranger's hdfs policies are complementary to HDFS permissions (or 
setting the right permissions on HDFS?), again making sure access is done under 
the original account, not requiring file ownership by the hive user. 


  was:
When using Ranger hive queries are executed under a superuser account instead 
of the users' own account . This means that in the UIs one is unable to 
distinguish who is running what job because they all reside under the same 
user. This is a usability issue.

Also "What this means is that Hiveserver2 will run MR jobs in HDFS as the 
original user" mentioned in 
http://hortonworks.com/blog/best-practices-for-hive-authorization-using-apache-ranger-in-hdp-2-2/
 does not seem to be the case. The screenshots also support this as the files 
are being owned by the hive user and permissions are only set for the hive user.

For HDFS access can be granted by Ranger. It (ranger) however expects the files 
to be owned by the 'hive' user otherwise they won't be accessible by services 
that integrate with ranger, although the proper permissions/acls are in place.

Moreover, logging for the different services now also doesn't include the user 
ids anymore making it easier for someone to manipulate the logs. We consider 
this a security issue.

We would like to see the option of:

1. Execution of (hive etc) jobs under the original user id
2. Making sure Ranger's hdfs policies are complementary to HDFS permissions (or 
setting the right permissions on HDFS?), again making sure access is done under 
the original account, not requiring file ownership by the hive user. 



> Ranger does not execute jobs under original user
> ------------------------------------------------
>
>                 Key: RANGER-861
>                 URL: https://issues.apache.org/jira/browse/RANGER-861
>             Project: Ranger
>          Issue Type: Improvement
>    Affects Versions: 0.5.2, 0.6.0
>            Reporter: Bolke de Bruin
>
> When using Ranger hive queries are executed under a superuser account instead 
> of the users' own account . This means that in the UIs one is unable to 
> distinguish who is running what job because they all reside under the same 
> user. This is a usability issue.
> Also "What this means is that Hiveserver2 will run MR jobs in HDFS as the 
> original user" mentioned in 
> http://hortonworks.com/blog/best-practices-for-hive-authorization-using-apache-ranger-in-hdp-2-2/
>  does not seem to be the case. The screenshots also support this as the files 
> are being owned by the hive user and permissions are only set for the hive 
> user.
> For HDFS access can be granted by Ranger. It (ranger) however expects the 
> files to be owned by the 'hive' user otherwise they won't be accessible by 
> services that do not integrate with ranger, although the proper 
> permissions/acls are in place.
> Moreover, logging for the different services now also doesn't include the 
> user ids anymore making it easier for someone to manipulate the logs. We 
> consider this a security issue.
> We would like to see the option of:
> 1. Execution of (hive etc) jobs under the original user id
> 2. Making sure Ranger's hdfs policies are complementary to HDFS permissions 
> (or setting the right permissions on HDFS?), again making sure access is done 
> under the original account, not requiring file ownership by the hive user. 



--
This message was sent by Atlassian JIRA
(v6.3.4#6332)

Reply via email to