[jira] [Work started] (KNOX-375) add functional test for KNOX-242 find client bind dn using ldapsearch

2014-05-17 Thread Dilli Arumugam (JIRA)

 [ 
https://issues.apache.org/jira/browse/KNOX-375?page=com.atlassian.jira.plugin.system.issuetabpanels:all-tabpanel
 ]

Work on KNOX-375 started by Dilli Arumugam.

 add functional test for KNOX-242 find client bind dn using ldapsearch
 -

 Key: KNOX-375
 URL: https://issues.apache.org/jira/browse/KNOX-375
 Project: Apache Knox
  Issue Type: Sub-task
  Components: Server
Reporter: Dilli Arumugam
Assignee: Dilli Arumugam





--
This message was sent by Atlassian JIRA
(v6.2#6252)


OAuth 2 Authentication in for REST and Apache Oltu

2014-05-17 Thread larry mccay
Here is a good article on using Oltu in JAX-RS to authenticate a google
user and acquire user profile information:

http://carminedimascio.com/2014/02/google-oauth2-and-jax-rs/

Note the use of JWT as well.


Re: Implementing full BASH shell access in Knox

2014-05-17 Thread larry mccay
Hi Ed -

I was just thinking about your idea and git project and am curious how you
are making out and whether you have any interesting insight for us.

Have you ever gotten this to work?

thanks,

--larry


On Wed, Mar 12, 2014 at 4:29 PM, Ed Kohlwey ekohl...@gmail.com wrote:

 I've begun work on a patch for this request here:
 https://github.com/ekohlwey/knox/tree/KNOX-250
 And I've also included some thoughts on the issue under its JIRA ticket:
 https://issues.apache.org/jira/browse/KNOX-250

 Any feedback is much appreciated!


 On Mon, Feb 10, 2014 at 11:55 AM, larry mccay larry.mc...@gmail.com
 wrote:

  Hi Ed -
 
  Absolutely, I would suggest that you discuss your intended approach on
 the
  Jira as you move forward.
  This will allow the community to:
 
  1. provide valuable insight into the best way forward
  2. aid in the review process when we go to merge if/when contribution is
  determined appropriate
 
  I would caution you up front that modifying the web app artifacts that
 are
  generated at topology deployment time as a way of integrating may be a
  dangerous approach.
 
  Those artifacts are recreated every time the topology is changed and
  redeployed and changes made to web.xml or gateway.xml will be lost.
 
  This is why using the provider mechanism is the preferred way to
 introduce
  (contribute) new artifacts and components into the system.
 
  Feel free to POC your idea in any manner that you wish and we will try
 and
  support you as needed.
  However, the final contribution will need to fit into the architecture of
  Knox properly.
 
  thanks,
 
  --larry
 
 
 
  On Mon, Feb 10, 2014 at 11:29 AM, Ed Kohlwey ekohl...@gmail.com wrote:
 
   Hi Larry,
   Thanks for the feedback. I think what makes sense is to open a
   Jira(KNOX-250), and proceed with an implementation that fits my teams
   immediate needs, targeting eventual integration in the overall
 framework.
   Hi Ed -
  
   While this is a usecase that is clearly outside of the primary REST API
   Gateway charter for Knox, it may provide value to a user population
 that
  is
   currently under-served by Knox. We would need to enumerate the value
 that
   we could add to CLI users with Knox as a bastion. You have already
   identified audit as a possible value-add.
  
   There are complexities involved here that we need to consider and I
  haven't
   had the cycles to really spend on them yet.
  
   I am not yet in a position to say whether we would want to include this
  in
   Knox but if we were to do so - I think the following would be worth
   considering:
  
   * Apache Mina SSHD Knox Provider (providers are great for introducing
   configuration, filters, listeners, etc.)
   * Each topology (which represents a managed Hadoop cluster) may
 configure
   an optional sshd-provider
   * The sshd-provider would likely require a ShellFactory that sets up a
   tunneling client into the target cluster (perhaps with the sshd client
   component)
   * The sshd-provider ShellFactory would need to resolve the appropriate
   Hadoop client configuration for it's intended Hadoop cluster
   * The sshd-provider would expose a separate ssh port per cluster for
  users
   to connect to
  
   I believe that this is a more natural approach (for Knox) than
 providing
  a
   single port that would have to multiplex clients to clusters.
  
   Feel free to file a Jira for this work - if you like.
   We can continue discussion there and - if/when appropriate - we can
   collaborate on patches as you contribute.
  
   Again, thank you for the interesting in contributing Knox!
  
   --larry
  
  
  
   On Wed, Feb 5, 2014 at 4:42 PM, Ed Kohlwey ekohl...@gmail.com wrote:
  
Hi Larry,
Thanks for the thoughts.
   
Yes, I realize this is somewhat outside of what may be outside of
  Knox's
main use case as a REST gateway, however I feel it is functionality
  that
could logically be part of the application. We plan to use Knox to
   satisfy
some other security requirements and bundling this functionality in
  Knox
makes sense to our team.
   
The users are system administrators who have sudo access and would
  like
to use a command terminal to do the usual job of system
 administrators
(changing configuration files, restarting services, chowning things
 in
   hdfs
and local disk, checking on the namenode and resource manager,
 etc.). I
have a requirement that all administrators who maintain the Hadoop
   cluster
have every action logged for audit purposes. One way to do this
  reliably
   is
to force them to tunnel through a bastion host that they do not
  control.
Presumably by making the bastion administrators different people than
  the
cluster administrators, a higher level of security is achieved.
   
Doing this within Knox makes sense as it will give us one 'pane of
  glass'
for our cluster security requirements.
   
For convenience sake, I would like them to be able to do 

[jira] [Commented] (KNOX-250) SSH Bastion Auditing Functionality

2014-05-17 Thread Larry McCay (JIRA)

[ 
https://issues.apache.org/jira/browse/KNOX-250?page=com.atlassian.jira.plugin.system.issuetabpanels:comment-tabpanelfocusedCommentId=14000919#comment-14000919
 ] 

Larry McCay commented on KNOX-250:
--

I was just thinking about your idea and git project and am curious how you are 
making out and whether you have any interesting insight for us. I have been 
really swamped for the last few months and haven't had much of a chance to dig 
into what you have.
I have seen that you were doing work in your github code though.
Have you ever gotten it to work?

 SSH Bastion Auditing Functionality
 --

 Key: KNOX-250
 URL: https://issues.apache.org/jira/browse/KNOX-250
 Project: Apache Knox
  Issue Type: New Feature
Reporter: Ed Kohlwey

 It would be nice for Knox to provide SSH tunneling and auditing functionality 
 in addition to the rest gateway services it provides. This would help Knox be 
 a single-stop for cluster audit logging requirements.
 Larry McCay provided the following design guidance via the mailing list 
 related to an implementation:
 * Apache Mina SSHD Knox Provider (providers are great for introducing
 configuration, filters, listeners, etc.)
 * Each topology (which represents a managed Hadoop cluster) may configure
 an optional sshd-provider
 * The sshd-provider would likely require a ShellFactory that sets up a
 tunneling client into the target cluster (perhaps with the sshd client
 component)
 * The sshd-provider ShellFactory would need to resolve the appropriate
 Hadoop client configuration for it's intended Hadoop cluster
 * The sshd-provider would expose a separate ssh port per cluster for users
 to connect to



--
This message was sent by Atlassian JIRA
(v6.2#6252)