[ 
https://issues.apache.org/jira/browse/STORM-446?page=com.atlassian.jira.plugin.system.issuetabpanels:comment-tabpanel&focusedCommentId=14335105#comment-14335105
 ] 

Parth Brahmbhatt commented on STORM-446:
----------------------------------------

Thanks [~revans2], that would be helpful. I knew about ReqContext and 
TransportPlugin. I actually tested the doAs behavior with API changes by adding 
a method addProxyUser to ReqContext which adds a ProxyUser principal to 
reqContext's subject , overriding the principal added during the topLevel 
process which is obtained by calling *saslServer.getAuthorizationID()* and 
returns that principal when reqContext.principal() is called. The missing part 
right now is how does the client send this principal to server in our thrift 
setup. 



> secure Impersonation in storm
> -----------------------------
>
>                 Key: STORM-446
>                 URL: https://issues.apache.org/jira/browse/STORM-446
>             Project: Apache Storm
>          Issue Type: Improvement
>            Reporter: Sriharsha Chintalapani
>            Assignee: Parth Brahmbhatt
>              Labels: Security
>
> Storm security adds features of authenticating with kerberos and than uses 
> that principal and TGT as way to authorize user operations, topology 
> operation. Currently Storm UI user needs to be part of nimbus.admins to get 
> details on user submitted topologies. Ideally storm ui needs to take 
> authenticated user  principal to submit requests to nimbus which will than 
> authorize the user rather than storm UI user. This feature will also benefit 
> superusers to impersonate other users to submit topologies in a secured way.



--
This message was sent by Atlassian JIRA
(v6.3.4#6332)

Reply via email to