[ 
https://issues.apache.org/jira/browse/HBASE-27320?page=com.atlassian.jira.plugin.system.issuetabpanels:all-tabpanel
 ]

Duo Zhang resolved HBASE-27320.
-------------------------------
    Fix Version/s: 2.6.0
                   2.5.1
                   2.4.15
     Hadoop Flags: Reviewed
       Resolution: Fixed

Pushed to branch-2.4+.

Thanks [~frostruan] for contributing!

Please fill the release note to mention the behavior change.

> hide some sensitive configuration information in the UI
> -------------------------------------------------------
>
>                 Key: HBASE-27320
>                 URL: https://issues.apache.org/jira/browse/HBASE-27320
>             Project: HBase
>          Issue Type: Improvement
>          Components: security, UI
>    Affects Versions: 3.0.0-alpha-3
>            Reporter: ruanhui
>            Assignee: ruanhui
>            Priority: Minor
>             Fix For: 2.6.0, 2.5.1, 3.0.0-alpha-4, 2.4.15
>
>
> In the discussion about how to store keystore/truststore password securely, 
> [~bbeaudreault]  mentioned and I quote here
> "I agree that it seems insecure to put it directly into the hbase-site.xml. 
> Another reason is due to the RS UI which (helpfully) can print the entire 
> site configuration. We’d need to make sure the password is excluded from 
> that, but better to remove it from site xml altogether".
> I also felt that some sensitive information was exposed in the UI, for 
> example, if we set superuser in the hbase-site.xml, the non-admin users can 
> obtain superuser information and simulate superuser to perform some 
> non-permitted operations on the cluster. So I think maybe we should hide 
> these sensitive information in the UI.



--
This message was sent by Atlassian Jira
(v8.20.10#820010)

Reply via email to