[ 
https://issues.apache.org/jira/browse/HBASE-1697?page=com.atlassian.jira.plugin.system.issuetabpanels:comment-tabpanel&focusedCommentId=13241997#comment-13241997
 ] 

Gary Helmling commented on HBASE-1697:
--------------------------------------

@Laxman,

We probably need to do some JIRA housekeeping here.  There hasn't been much 
activity in this ticket because it's really just an umbrella issue tying 
together the individual efforts.

Initial security features are in place with HBASE-3025, HBASE-2418, and 
HBASE-2742.  These are released in 0.92.  Currently access control is performed 
by use of ACLs stored at the global (forthcoming), table, column family, or 
column qualifier level.

There are definitely additional features that can be built to contribute to our 
security solution:
* adding client authentication for thrift and REST clients
* proxying HBase access from thrift and REST servers as the authenticated 
clients (currently these server can simply be configured to authenticate and 
access HBase as their own principals)
* supporting or moving to alternate access control schemes (RBAC)
* row or key-value based access control
* supporting other authentication mechanisms than kerberos and authentication 
tokens
* probably many others

Anyone interested in working on these would certainly be welcomed.  But we do 
currently have a working security implementation that integrates nicely with 
HDFS and map reduce.
                
> Discretionary access control
> ----------------------------
>
>                 Key: HBASE-1697
>                 URL: https://issues.apache.org/jira/browse/HBASE-1697
>             Project: HBase
>          Issue Type: Improvement
>          Components: security
>            Reporter: Andrew Purtell
>            Assignee: Andrew Purtell
>
> Consider implementing discretionary access control for HBase.
> Access control has three aspects: authentication, authorization and audit.
> - Authentication: Access is controlled by insisting on an authentication 
> procedure to establish the identity of the user. The authentication procedure 
> should minimally require a non-plaintext authentication factor (e.g. 
> encrypted password with salt) and should ideally or at least optionally 
> provide cryptographically strong confidence via public key certification.
> - Authorization: Access is controlled by specifying rights to resources via 
> an access control list (ACL). An ACL is a list of permissions attached to an 
> object. The list specifies who or what is allowed to access the object and 
> what operations are allowed to be performed on the object, f.e. create, 
> update, read, or delete.
> - Audit: Important actions taken by subjects should be logged for 
> accountability, a chronological record which  enables the full reconstruction 
> and examination of a sequence of events, e.g. schema changes or data 
> mutations. Logging activity should be protected from all subjects except for 
> a restricted set with administrative privilege, perhaps to only a single 
> super-user. 
> Discretionary access control means the access policy for an object is 
> determined by the owner of the object. Every object in the system must have a 
> valid owner. Owners can assign access rights and permissions to other users. 
> The initial owner of an object is the subject who created it. If subjects are 
> deleted from a system, ownership of objects owned by them should revert to 
> some super-user or otherwise valid default. 
> HBase can enforce access policy at table, column family, or cell granularity. 
> Cell granularity does not make much sense. An implementation which controls 
> access at both the table and column family levels is recommended, though a 
> first cut could consider control at the table level only. The initial set of 
> permissions can be: Create (table schema or column family), update (table 
> schema or column family), read (column family), delete (table or column 
> family), execute (filters), and transfer ownership. The subject identities 
> and access tokens could be stored in a new administrative table. ACLs on 
> tables and column families can be stored in META. 
> Access other than read access to catalog and administrative tables should be 
> restricted to a set of administrative users or perhaps a single super-user. A 
> data mutation on a user table by a subject without administrative or 
> superuser privilege which results in a table split is an implicit temporary 
> privilege elevation where the regionserver or master updates the catalog 
> tables as necessary to support the split. 
> Audit logging should be configurable on a per-table basis to avoid this 
> overhead where it is not wanted.
> Consider supporting external authentication and subject identification 
> mechanisms with Java library support: RADIUS/TACACS, Kerberos, LDAP.
> Consider logging audit trails to an HBase table (bigtable type schemas are 
> natural for this) and optionally external logging options with Java library 
> support -- syslog, etc., or maybe commons-logging is sufficient and punt to 
> administrator to set up appropriate commons-logging/log4j configurations for 
> their needs. 
> If HBASE-1002 is considered, and the option to support filtering via upload 
> of (perhaps complex) bytecode produced by some little language compiler is 
> implemented, the execute privilege could be extended in a manner similar to 
> how stored procedures in SQL land execute either with the privilege of the 
> current user or the (table/procedure) creator.

--
This message is automatically generated by JIRA.
If you think it was sent incorrectly, please contact your JIRA administrators: 
https://issues.apache.org/jira/secure/ContactAdministrators!default.jspa
For more information on JIRA, see: http://www.atlassian.com/software/jira

        

Reply via email to