Github user rmetzger commented on a diff in the pull request:

    https://github.com/apache/flink/pull/2425#discussion_r77169187
  
    --- Diff: docs/setup/config.md ---
    @@ -107,6 +107,21 @@ Please make sure to set the maximum ticket life span 
high long running jobs. The
     
     If you are on YARN, then it is sufficient to authenticate the client with 
Kerberos. On a Flink standalone cluster you need to ensure that, initially, all 
nodes are authenticated with Kerberos using the `kinit` tool.
     
    +### Secure Cookie Authentication
    +
    +Flink supports hardening below cluster components through secure cookie 
implementation.
    +- Akka endpoints
    +- Blob Server/Client communication
    +- Web runtime communication
    +
    +Secure cookie authentication can be enabled by providing below 
configurations to Flink configuration file.
    +
    +- `security.enabled`: A boolean value (true|false) indicating security is 
enabled or not.
    +- `security.cookie` : Secure cookie value to be used for authentication. 
For standalone deployment mode, the secure cookie value is mandatory when 
security is enabled but for the Yarn mode it is optional (auto-generated if not 
provided).
    +
    +Alternatively, secure cookie value can be provided through Flink/Yarn CLI 
using "-k" or "--cookie" parameter option.
    +
    +The web runtime module prompts for secure cookie using standard basic HTTP 
authentication mechanism, where the user id field is noop and the password 
field will be used to capture the secure cookie.
    --- End diff --
    
    Much appreciated that your pull request also contains documentation 
updates! Thank you.


---
If your project is set up for it, you can reply to this email and have your
reply appear on GitHub as well. If your project does not have this feature
enabled and wishes so, or if the feature is enabled but not working, please
contact infrastructure at infrastruct...@apache.org or file a JIRA ticket
with INFRA.
---

Reply via email to