[jira] [Commented] (SOLR-9324) Support Secure Impersonation / Proxy User for solr authentication

2017-01-19 Thread Hrishikesh Gadre (JIRA)

[ 
https://issues.apache.org/jira/browse/SOLR-9324?page=com.atlassian.jira.plugin.system.issuetabpanels:comment-tabpanel&focusedCommentId=15831212#comment-15831212
 ] 

Hrishikesh Gadre commented on SOLR-9324:


[~ichattopadhyaya] Ok let me take a look.

> Support Secure Impersonation / Proxy User for solr authentication
> -
>
> Key: SOLR-9324
> URL: https://issues.apache.org/jira/browse/SOLR-9324
> Project: Solr
>  Issue Type: Improvement
>  Security Level: Public(Default Security Level. Issues are Public) 
>  Components: SolrCloud
>Reporter: Gregory Chanan
>Assignee: Yonik Seeley
> Fix For: master (7.0), 6.4
>
> Attachments: build-6025.log, SOLR-9324_branch_6x.patch, 
> SOLR-9324.patch, SOLR-9324.patch, SOLR-9324.patch, SOLR-9324-tests.patch
>
>
> Solr should support Proxy User / Secure Impersonation for authentication, as 
> supported by hadoop 
> (http://hadoop.apache.org/docs/current/hadoop-project-dist/hadoop-common/Superusers.html)
>  and supported by the hadoop AuthenticationFilter (which we use for the 
> KerberosPlugin).
> There are a number of use cases, but a common one is this:
> There is a front end for searches (say, Hue http://gethue.com/) that supports 
> its own login mechanisms.  If the cluster uses kerberos for authentication, 
> hue must have kerberos credentials for each user, which is a pain to manage.  
> Instead, hue can be allowed to impersonate known users from known machines so 
> it only needs its own kerberos credentials.



--
This message was sent by Atlassian JIRA
(v6.3.4#6332)

-
To unsubscribe, e-mail: dev-unsubscr...@lucene.apache.org
For additional commands, e-mail: dev-h...@lucene.apache.org



[jira] [Commented] (SOLR-9324) Support Secure Impersonation / Proxy User for solr authentication

2017-01-19 Thread Ishan Chattopadhyaya (JIRA)

[ 
https://issues.apache.org/jira/browse/SOLR-9324?page=com.atlassian.jira.plugin.system.issuetabpanels:comment-tabpanel&focusedCommentId=15831152#comment-15831152
 ] 

Ishan Chattopadhyaya commented on SOLR-9324:


Could someone please take a stab at adding this to the ref guide? [~gchanan], 
[~hgadre]? I can volunteer to add, if someone can write up a brief description 
and example here.

> Support Secure Impersonation / Proxy User for solr authentication
> -
>
> Key: SOLR-9324
> URL: https://issues.apache.org/jira/browse/SOLR-9324
> Project: Solr
>  Issue Type: Improvement
>  Security Level: Public(Default Security Level. Issues are Public) 
>  Components: SolrCloud
>Reporter: Gregory Chanan
>Assignee: Yonik Seeley
> Fix For: master (7.0), 6.4
>
> Attachments: build-6025.log, SOLR-9324_branch_6x.patch, 
> SOLR-9324.patch, SOLR-9324.patch, SOLR-9324.patch, SOLR-9324-tests.patch
>
>
> Solr should support Proxy User / Secure Impersonation for authentication, as 
> supported by hadoop 
> (http://hadoop.apache.org/docs/current/hadoop-project-dist/hadoop-common/Superusers.html)
>  and supported by the hadoop AuthenticationFilter (which we use for the 
> KerberosPlugin).
> There are a number of use cases, but a common one is this:
> There is a front end for searches (say, Hue http://gethue.com/) that supports 
> its own login mechanisms.  If the cluster uses kerberos for authentication, 
> hue must have kerberos credentials for each user, which is a pain to manage.  
> Instead, hue can be allowed to impersonate known users from known machines so 
> it only needs its own kerberos credentials.



--
This message was sent by Atlassian JIRA
(v6.3.4#6332)

-
To unsubscribe, e-mail: dev-unsubscr...@lucene.apache.org
For additional commands, e-mail: dev-h...@lucene.apache.org



[jira] [Commented] (SOLR-9324) Support Secure Impersonation / Proxy User for solr authentication

2016-12-01 Thread ASF GitHub Bot (JIRA)

[ 
https://issues.apache.org/jira/browse/SOLR-9324?page=com.atlassian.jira.plugin.system.issuetabpanels:comment-tabpanel&focusedCommentId=15713576#comment-15713576
 ] 

ASF GitHub Bot commented on SOLR-9324:
--

Github user hgadre closed the pull request at:

https://github.com/apache/lucene-solr/pull/117


> Support Secure Impersonation / Proxy User for solr authentication
> -
>
> Key: SOLR-9324
> URL: https://issues.apache.org/jira/browse/SOLR-9324
> Project: Solr
>  Issue Type: Improvement
>  Security Level: Public(Default Security Level. Issues are Public) 
>  Components: SolrCloud
>Reporter: Gregory Chanan
>Assignee: Yonik Seeley
> Fix For: master (7.0), 6.4
>
> Attachments: SOLR-9324-tests.patch, SOLR-9324.patch, SOLR-9324.patch, 
> SOLR-9324.patch, SOLR-9324_branch_6x.patch, build-6025.log
>
>
> Solr should support Proxy User / Secure Impersonation for authentication, as 
> supported by hadoop 
> (http://hadoop.apache.org/docs/current/hadoop-project-dist/hadoop-common/Superusers.html)
>  and supported by the hadoop AuthenticationFilter (which we use for the 
> KerberosPlugin).
> There are a number of use cases, but a common one is this:
> There is a front end for searches (say, Hue http://gethue.com/) that supports 
> its own login mechanisms.  If the cluster uses kerberos for authentication, 
> hue must have kerberos credentials for each user, which is a pain to manage.  
> Instead, hue can be allowed to impersonate known users from known machines so 
> it only needs its own kerberos credentials.



--
This message was sent by Atlassian JIRA
(v6.3.4#6332)

-
To unsubscribe, e-mail: dev-unsubscr...@lucene.apache.org
For additional commands, e-mail: dev-h...@lucene.apache.org



[jira] [Commented] (SOLR-9324) Support Secure Impersonation / Proxy User for solr authentication

2016-11-17 Thread ASF subversion and git services (JIRA)

[ 
https://issues.apache.org/jira/browse/SOLR-9324?page=com.atlassian.jira.plugin.system.issuetabpanels:comment-tabpanel&focusedCommentId=15674918#comment-15674918
 ] 

ASF subversion and git services commented on SOLR-9324:
---

Commit 61a6072573f3c801b5d9dc5912ebbd1125f80c0b in lucene-solr's branch 
refs/heads/branch_6x from [~yo...@apache.org]
[ https://git-wip-us.apache.org/repos/asf?p=lucene-solr.git;h=61a6072 ]

SOLR-9324: move changes entry to 6.4


> Support Secure Impersonation / Proxy User for solr authentication
> -
>
> Key: SOLR-9324
> URL: https://issues.apache.org/jira/browse/SOLR-9324
> Project: Solr
>  Issue Type: Improvement
>  Security Level: Public(Default Security Level. Issues are Public) 
>  Components: SolrCloud
>Reporter: Gregory Chanan
>Assignee: Gregory Chanan
> Attachments: SOLR-9324-tests.patch, SOLR-9324.patch, SOLR-9324.patch, 
> SOLR-9324.patch, SOLR-9324_branch_6x.patch, build-6025.log
>
>
> Solr should support Proxy User / Secure Impersonation for authentication, as 
> supported by hadoop 
> (http://hadoop.apache.org/docs/current/hadoop-project-dist/hadoop-common/Superusers.html)
>  and supported by the hadoop AuthenticationFilter (which we use for the 
> KerberosPlugin).
> There are a number of use cases, but a common one is this:
> There is a front end for searches (say, Hue http://gethue.com/) that supports 
> its own login mechanisms.  If the cluster uses kerberos for authentication, 
> hue must have kerberos credentials for each user, which is a pain to manage.  
> Instead, hue can be allowed to impersonate known users from known machines so 
> it only needs its own kerberos credentials.



--
This message was sent by Atlassian JIRA
(v6.3.4#6332)

-
To unsubscribe, e-mail: dev-unsubscr...@lucene.apache.org
For additional commands, e-mail: dev-h...@lucene.apache.org



[jira] [Commented] (SOLR-9324) Support Secure Impersonation / Proxy User for solr authentication

2016-11-17 Thread ASF subversion and git services (JIRA)

[ 
https://issues.apache.org/jira/browse/SOLR-9324?page=com.atlassian.jira.plugin.system.issuetabpanels:comment-tabpanel&focusedCommentId=15674911#comment-15674911
 ] 

ASF subversion and git services commented on SOLR-9324:
---

Commit 46ce87c70070448149deedab52c0e4749db818d2 in lucene-solr's branch 
refs/heads/master from [~yo...@apache.org]
[ https://git-wip-us.apache.org/repos/asf?p=lucene-solr.git;h=46ce87c ]

SOLR-9324: move changes entry to 6.4


> Support Secure Impersonation / Proxy User for solr authentication
> -
>
> Key: SOLR-9324
> URL: https://issues.apache.org/jira/browse/SOLR-9324
> Project: Solr
>  Issue Type: Improvement
>  Security Level: Public(Default Security Level. Issues are Public) 
>  Components: SolrCloud
>Reporter: Gregory Chanan
>Assignee: Gregory Chanan
> Attachments: SOLR-9324-tests.patch, SOLR-9324.patch, SOLR-9324.patch, 
> SOLR-9324.patch, SOLR-9324_branch_6x.patch, build-6025.log
>
>
> Solr should support Proxy User / Secure Impersonation for authentication, as 
> supported by hadoop 
> (http://hadoop.apache.org/docs/current/hadoop-project-dist/hadoop-common/Superusers.html)
>  and supported by the hadoop AuthenticationFilter (which we use for the 
> KerberosPlugin).
> There are a number of use cases, but a common one is this:
> There is a front end for searches (say, Hue http://gethue.com/) that supports 
> its own login mechanisms.  If the cluster uses kerberos for authentication, 
> hue must have kerberos credentials for each user, which is a pain to manage.  
> Instead, hue can be allowed to impersonate known users from known machines so 
> it only needs its own kerberos credentials.



--
This message was sent by Atlassian JIRA
(v6.3.4#6332)

-
To unsubscribe, e-mail: dev-unsubscr...@lucene.apache.org
For additional commands, e-mail: dev-h...@lucene.apache.org



[jira] [Commented] (SOLR-9324) Support Secure Impersonation / Proxy User for solr authentication

2016-11-17 Thread Yonik Seeley (JIRA)

[ 
https://issues.apache.org/jira/browse/SOLR-9324?page=com.atlassian.jira.plugin.system.issuetabpanels:comment-tabpanel&focusedCommentId=15674893#comment-15674893
 ] 

Yonik Seeley commented on SOLR-9324:


OK, I've committed this.  Thanks Hrishikesh!
I'm going to move the CHANGES entry to 6.4 as well...

> Support Secure Impersonation / Proxy User for solr authentication
> -
>
> Key: SOLR-9324
> URL: https://issues.apache.org/jira/browse/SOLR-9324
> Project: Solr
>  Issue Type: Improvement
>  Security Level: Public(Default Security Level. Issues are Public) 
>  Components: SolrCloud
>Reporter: Gregory Chanan
>Assignee: Gregory Chanan
> Attachments: SOLR-9324-tests.patch, SOLR-9324.patch, SOLR-9324.patch, 
> SOLR-9324.patch, SOLR-9324_branch_6x.patch, build-6025.log
>
>
> Solr should support Proxy User / Secure Impersonation for authentication, as 
> supported by hadoop 
> (http://hadoop.apache.org/docs/current/hadoop-project-dist/hadoop-common/Superusers.html)
>  and supported by the hadoop AuthenticationFilter (which we use for the 
> KerberosPlugin).
> There are a number of use cases, but a common one is this:
> There is a front end for searches (say, Hue http://gethue.com/) that supports 
> its own login mechanisms.  If the cluster uses kerberos for authentication, 
> hue must have kerberos credentials for each user, which is a pain to manage.  
> Instead, hue can be allowed to impersonate known users from known machines so 
> it only needs its own kerberos credentials.



--
This message was sent by Atlassian JIRA
(v6.3.4#6332)

-
To unsubscribe, e-mail: dev-unsubscr...@lucene.apache.org
For additional commands, e-mail: dev-h...@lucene.apache.org



[jira] [Commented] (SOLR-9324) Support Secure Impersonation / Proxy User for solr authentication

2016-11-17 Thread ASF subversion and git services (JIRA)

[ 
https://issues.apache.org/jira/browse/SOLR-9324?page=com.atlassian.jira.plugin.system.issuetabpanels:comment-tabpanel&focusedCommentId=15674888#comment-15674888
 ] 

ASF subversion and git services commented on SOLR-9324:
---

Commit f084e658b77e1ec98021146318cc37772b73de51 in lucene-solr's branch 
refs/heads/branch_6x from [~hgadre]
[ https://git-wip-us.apache.org/repos/asf?p=lucene-solr.git;h=f084e65 ]

SOLR-9324 Fix TestSolrCloudWithSecureImpersonation#testForwarding


> Support Secure Impersonation / Proxy User for solr authentication
> -
>
> Key: SOLR-9324
> URL: https://issues.apache.org/jira/browse/SOLR-9324
> Project: Solr
>  Issue Type: Improvement
>  Security Level: Public(Default Security Level. Issues are Public) 
>  Components: SolrCloud
>Reporter: Gregory Chanan
>Assignee: Gregory Chanan
> Attachments: SOLR-9324-tests.patch, SOLR-9324.patch, SOLR-9324.patch, 
> SOLR-9324.patch, SOLR-9324_branch_6x.patch, build-6025.log
>
>
> Solr should support Proxy User / Secure Impersonation for authentication, as 
> supported by hadoop 
> (http://hadoop.apache.org/docs/current/hadoop-project-dist/hadoop-common/Superusers.html)
>  and supported by the hadoop AuthenticationFilter (which we use for the 
> KerberosPlugin).
> There are a number of use cases, but a common one is this:
> There is a front end for searches (say, Hue http://gethue.com/) that supports 
> its own login mechanisms.  If the cluster uses kerberos for authentication, 
> hue must have kerberos credentials for each user, which is a pain to manage.  
> Instead, hue can be allowed to impersonate known users from known machines so 
> it only needs its own kerberos credentials.



--
This message was sent by Atlassian JIRA
(v6.3.4#6332)

-
To unsubscribe, e-mail: dev-unsubscr...@lucene.apache.org
For additional commands, e-mail: dev-h...@lucene.apache.org



[jira] [Commented] (SOLR-9324) Support Secure Impersonation / Proxy User for solr authentication

2016-11-17 Thread ASF subversion and git services (JIRA)

[ 
https://issues.apache.org/jira/browse/SOLR-9324?page=com.atlassian.jira.plugin.system.issuetabpanels:comment-tabpanel&focusedCommentId=15674884#comment-15674884
 ] 

ASF subversion and git services commented on SOLR-9324:
---

Commit f78f698ab0a919e4923f0cbf061dfa254e177555 in lucene-solr's branch 
refs/heads/branch_6x from [~gchanan]
[ https://git-wip-us.apache.org/repos/asf?p=lucene-solr.git;h=f78f698 ]

SOLR-9324: Support Secure Impersonation / Proxy User for solr authentication

Conflicts:
solr/CHANGES.txt
solr/core/src/java/org/apache/solr/security/KerberosPlugin.java


> Support Secure Impersonation / Proxy User for solr authentication
> -
>
> Key: SOLR-9324
> URL: https://issues.apache.org/jira/browse/SOLR-9324
> Project: Solr
>  Issue Type: Improvement
>  Security Level: Public(Default Security Level. Issues are Public) 
>  Components: SolrCloud
>Reporter: Gregory Chanan
>Assignee: Gregory Chanan
> Attachments: SOLR-9324-tests.patch, SOLR-9324.patch, SOLR-9324.patch, 
> SOLR-9324.patch, SOLR-9324_branch_6x.patch, build-6025.log
>
>
> Solr should support Proxy User / Secure Impersonation for authentication, as 
> supported by hadoop 
> (http://hadoop.apache.org/docs/current/hadoop-project-dist/hadoop-common/Superusers.html)
>  and supported by the hadoop AuthenticationFilter (which we use for the 
> KerberosPlugin).
> There are a number of use cases, but a common one is this:
> There is a front end for searches (say, Hue http://gethue.com/) that supports 
> its own login mechanisms.  If the cluster uses kerberos for authentication, 
> hue must have kerberos credentials for each user, which is a pain to manage.  
> Instead, hue can be allowed to impersonate known users from known machines so 
> it only needs its own kerberos credentials.



--
This message was sent by Atlassian JIRA
(v6.3.4#6332)

-
To unsubscribe, e-mail: dev-unsubscr...@lucene.apache.org
For additional commands, e-mail: dev-h...@lucene.apache.org



[jira] [Commented] (SOLR-9324) Support Secure Impersonation / Proxy User for solr authentication

2016-11-17 Thread ASF subversion and git services (JIRA)

[ 
https://issues.apache.org/jira/browse/SOLR-9324?page=com.atlassian.jira.plugin.system.issuetabpanels:comment-tabpanel&focusedCommentId=15674885#comment-15674885
 ] 

ASF subversion and git services commented on SOLR-9324:
---

Commit 8659fe1cce3f49f37f50f9a74d0eb79ad8d1bf58 in lucene-solr's branch 
refs/heads/branch_6x from [~gchanan]
[ https://git-wip-us.apache.org/repos/asf?p=lucene-solr.git;h=8659fe1 ]

SOLR-9324: Fix local host test assumptions


> Support Secure Impersonation / Proxy User for solr authentication
> -
>
> Key: SOLR-9324
> URL: https://issues.apache.org/jira/browse/SOLR-9324
> Project: Solr
>  Issue Type: Improvement
>  Security Level: Public(Default Security Level. Issues are Public) 
>  Components: SolrCloud
>Reporter: Gregory Chanan
>Assignee: Gregory Chanan
> Attachments: SOLR-9324-tests.patch, SOLR-9324.patch, SOLR-9324.patch, 
> SOLR-9324.patch, SOLR-9324_branch_6x.patch, build-6025.log
>
>
> Solr should support Proxy User / Secure Impersonation for authentication, as 
> supported by hadoop 
> (http://hadoop.apache.org/docs/current/hadoop-project-dist/hadoop-common/Superusers.html)
>  and supported by the hadoop AuthenticationFilter (which we use for the 
> KerberosPlugin).
> There are a number of use cases, but a common one is this:
> There is a front end for searches (say, Hue http://gethue.com/) that supports 
> its own login mechanisms.  If the cluster uses kerberos for authentication, 
> hue must have kerberos credentials for each user, which is a pain to manage.  
> Instead, hue can be allowed to impersonate known users from known machines so 
> it only needs its own kerberos credentials.



--
This message was sent by Atlassian JIRA
(v6.3.4#6332)

-
To unsubscribe, e-mail: dev-unsubscr...@lucene.apache.org
For additional commands, e-mail: dev-h...@lucene.apache.org



[jira] [Commented] (SOLR-9324) Support Secure Impersonation / Proxy User for solr authentication

2016-11-17 Thread Yonik Seeley (JIRA)

[ 
https://issues.apache.org/jira/browse/SOLR-9324?page=com.atlassian.jira.plugin.system.issuetabpanels:comment-tabpanel&focusedCommentId=15674078#comment-15674078
 ] 

Yonik Seeley commented on SOLR-9324:


Although security really isn't my area, since this is just a backport to 6x I 
can probably handle the review if no one else is looking at it...

> Support Secure Impersonation / Proxy User for solr authentication
> -
>
> Key: SOLR-9324
> URL: https://issues.apache.org/jira/browse/SOLR-9324
> Project: Solr
>  Issue Type: Improvement
>  Security Level: Public(Default Security Level. Issues are Public) 
>  Components: SolrCloud
>Reporter: Gregory Chanan
>Assignee: Gregory Chanan
> Attachments: SOLR-9324-tests.patch, SOLR-9324.patch, SOLR-9324.patch, 
> SOLR-9324.patch, SOLR-9324_branch_6x.patch, build-6025.log
>
>
> Solr should support Proxy User / Secure Impersonation for authentication, as 
> supported by hadoop 
> (http://hadoop.apache.org/docs/current/hadoop-project-dist/hadoop-common/Superusers.html)
>  and supported by the hadoop AuthenticationFilter (which we use for the 
> KerberosPlugin).
> There are a number of use cases, but a common one is this:
> There is a front end for searches (say, Hue http://gethue.com/) that supports 
> its own login mechanisms.  If the cluster uses kerberos for authentication, 
> hue must have kerberos credentials for each user, which is a pain to manage.  
> Instead, hue can be allowed to impersonate known users from known machines so 
> it only needs its own kerberos credentials.



--
This message was sent by Atlassian JIRA
(v6.3.4#6332)

-
To unsubscribe, e-mail: dev-unsubscr...@lucene.apache.org
For additional commands, e-mail: dev-h...@lucene.apache.org



[jira] [Commented] (SOLR-9324) Support Secure Impersonation / Proxy User for solr authentication

2016-11-15 Thread ASF GitHub Bot (JIRA)

[ 
https://issues.apache.org/jira/browse/SOLR-9324?page=com.atlassian.jira.plugin.system.issuetabpanels:comment-tabpanel&focusedCommentId=15668950#comment-15668950
 ] 

ASF GitHub Bot commented on SOLR-9324:
--

GitHub user hgadre opened a pull request:

https://github.com/apache/lucene-solr/pull/117

SOLR-9324: Support Secure Impersonation / Proxy User for solr authentication

A patch against branch_6x. It also includes unit test fixes applied on the 
master branch...

You can merge this pull request into a Git repository by running:

$ git pull https://github.com/hgadre/lucene-solr SOLR-9324_6x

Alternatively you can review and apply these changes as the patch at:

https://github.com/apache/lucene-solr/pull/117.patch

To close this pull request, make a commit to your master/trunk branch
with (at least) the following in the commit message:

This closes #117


commit d23d4a424d636b893b9075968ae21edcddb3500c
Author: Gregory Chanan 
Date:   2016-07-25T18:15:48Z

SOLR-9324: Support Secure Impersonation / Proxy User for solr authentication

Conflicts:
solr/CHANGES.txt
solr/core/src/java/org/apache/solr/security/KerberosPlugin.java

commit 74b05ba4e42272571eac33609bc15777d1358827
Author: Gregory Chanan 
Date:   2016-08-06T04:04:58Z

SOLR-9324: Fix local host test assumptions

commit 40ba331403f8e7201d823ab99edecbbda9c46250
Author: Uwe Schindler 
Date:   2016-09-03T08:48:01Z

SOLR-9460: Disable test that does not work with Windows

commit 2d5afdc98eadfa9cc6862f0fa881909c62938af0
Author: Uwe Schindler 
Date:   2016-09-03T18:30:30Z

SOLR-9460: Fully fix test setup

commit 32ccf9f62190f3e867fc7edaad198020635fcd4d
Author: Hrishikesh Gadre 
Date:   2016-11-16T00:32:21Z

SOLR-9324 Fix TestSolrCloudWithSecureImpersonation#testForwarding




> Support Secure Impersonation / Proxy User for solr authentication
> -
>
> Key: SOLR-9324
> URL: https://issues.apache.org/jira/browse/SOLR-9324
> Project: Solr
>  Issue Type: Improvement
>  Security Level: Public(Default Security Level. Issues are Public) 
>  Components: SolrCloud
>Reporter: Gregory Chanan
>Assignee: Gregory Chanan
> Attachments: SOLR-9324-tests.patch, SOLR-9324.patch, SOLR-9324.patch, 
> SOLR-9324.patch, SOLR-9324_branch_6x.patch, build-6025.log
>
>
> Solr should support Proxy User / Secure Impersonation for authentication, as 
> supported by hadoop 
> (http://hadoop.apache.org/docs/current/hadoop-project-dist/hadoop-common/Superusers.html)
>  and supported by the hadoop AuthenticationFilter (which we use for the 
> KerberosPlugin).
> There are a number of use cases, but a common one is this:
> There is a front end for searches (say, Hue http://gethue.com/) that supports 
> its own login mechanisms.  If the cluster uses kerberos for authentication, 
> hue must have kerberos credentials for each user, which is a pain to manage.  
> Instead, hue can be allowed to impersonate known users from known machines so 
> it only needs its own kerberos credentials.



--
This message was sent by Atlassian JIRA
(v6.3.4#6332)

-
To unsubscribe, e-mail: dev-unsubscr...@lucene.apache.org
For additional commands, e-mail: dev-h...@lucene.apache.org



[jira] [Commented] (SOLR-9324) Support Secure Impersonation / Proxy User for solr authentication

2016-08-11 Thread Steve Rowe (JIRA)

[ 
https://issues.apache.org/jira/browse/SOLR-9324?page=com.atlassian.jira.plugin.system.issuetabpanels:comment-tabpanel&focusedCommentId=15417335#comment-15417335
 ] 

Steve Rowe commented on SOLR-9324:
--

Policeman Jenkins found another {{TestSolrCloudWithSecureImpersonation}} NPE 
(doesn't reproduce for me on Linux) 
[http://jenkins.thetaphi.de/job/Lucene-Solr-master-Windows/6041/]:

{noformat}
  [junit4] Suite: org.apache.solr.cloud.TestSolrCloudWithSecureImpersonation
  [junit4]   2> Creating dataDir: 
C:\Users\jenkins\workspace\Lucene-Solr-master-Windows\solr\build\solr-core\test\J1\temp\solr.cloud.TestSolrCloudWithSecureImpersonation_D908C925ECB64765-001\init-core-data-001
  [junit4]   2> 2677891 INFO  
(SUITE-TestSolrCloudWithSecureImpersonation-seed#[D908C925ECB64765]-worker) [   
 ] o.a.s.SolrTestCaseJ4 Randomized ssl (false) and clientAuth (false) via: 
@org.apache.solr.util.RandomizeSSL(reason=, value=NaN, ssl=NaN, clientAuth=NaN)
  [junit4]   2> 2678039 WARN  
(SUITE-TestSolrCloudWithSecureImpersonation-seed#[D908C925ECB64765]-worker) [   
 ] o.a.h.u.NativeCodeLoader Unable to load native-hadoop library for your 
platform... using builtin-java classes where applicable
  [junit4]   2> 2678060 INFO  
(SUITE-TestSolrCloudWithSecureImpersonation-seed#[D908C925ECB64765]-worker) [   
 ] o.a.s.SolrTestCaseJ4 ###deleteCore
  [junit4]   2> NOTE: test params are: 
codec=FastCompressingStoredFields(storedFieldsFormat=CompressingStoredFieldsFormat(compressionMode=FAST,
 chunkSize=5, maxDocsPerChunk=799, blockSize=4), 
termVectorsFormat=CompressingTermVectorsFormat(compressionMode=FAST, 
chunkSize=5, blockSize=4)), sim=ClassicSimilarity, locale=sr-Latn-BA, 
timezone=America/Guayaquil
  [junit4]   2> NOTE: Windows 10 10.0 x86/Oracle Corporation 1.8.0_102 
(32-bit)/cpus=3,threads=1,free=134681328,total=359464960
  [junit4]   2> NOTE: All tests run in this JVM: [AnalyticsQueryTest, 
SortSpecParsingTest, TestReload, ChaosMonkeySafeLeaderTest, TestCoreDiscovery, 
DebugComponentTest, TestSha256AuthenticationProvider, StatsComponentTest, 
TestImplicitCoreProperties, BlockJoinFacetDistribTest, 
DistributedFacetPivotSmallAdvancedTest, TestCSVResponseWriter, 
TestReloadDeadlock, DirectUpdateHandlerOptimizeTest, 
TestReversedWildcardFilterFactory, HdfsChaosMonkeySafeLeaderTest, 
ShardSplitTest, ZkNodePropsTest, TestSSLRandomization, TestRandomFlRTGCloud, 
TestBinaryField, TestUninvertingReader, TestZkChroot, TestQueryTypes, 
TestBackupRepositoryFactory, HLLSerializationTest, SpellingQueryConverterTest, 
TolerantUpdateProcessorTest, BasicFunctionalityTest, 
ShowFileRequestHandlerTest, TestSolr4Spatial, 
DistributedFacetPivotWhiteBoxTest, TestManagedResourceStorage, 
SearchHandlerTest, TestSolrQueryParser, HdfsBasicDistributedZkTest, 
TestSchemaSimilarityResource, TestQuerySenderListener, SynonymTokenizerTest, 
MigrateRouteKeyTest, TestFieldCache, TestIndexSearcher, 
SuggestComponentContextFilterQueryTest, TestBulkSchemaAPI, 
TestSimpleTrackingShardHandler, ConjunctionSolrSpellCheckerTest, 
ZkSolrClientTest, BasicZkTest, DocValuesMissingTest, TestBinaryResponseWriter, 
TestCollectionAPI, TestConfigSetsAPIExclusivity, 
TestSubQueryTransformerDistrib, DateFieldTest, TestScoreJoinQPNoScore, 
DistributedQueryComponentOptimizationTest, TestWriterPerf, ZkStateWriterTest, 
SuggesterTSTTest, TestExceedMaxTermLength, TestReRankQParserPlugin, 
TlogReplayBufferedWhileIndexingTest, CdcrReplicationDistributedZkTest, 
TestSerializedLuceneMatchVersion, TestSchemaManager, 
TestSuggestSpellingConverter, DateMathParserTest, TestSimpleQParserPlugin, 
TestPHPSerializedResponseWriter, BlobRepositoryCloudTest, TestQueryUtils, 
TestSolrConfigHandlerCloud, JavabinLoaderTest, AutoCommitTest, 
FacetPivotSmallTest, SolrInfoMBeanTest, TestValueSourceCache, 
TestCloudManagedSchema, ConnectionReuseTest, CheckHdfsIndexTest, 
TestMiniSolrCloudClusterSSL, TestCustomDocTransformer, TestRawTransformer, 
BasicDistributedZk2Test, RequestLoggingTest, EchoParamsTest, DeleteShardTest, 
OpenExchangeRatesOrgProviderTest, LoggingHandlerTest, TestDFISimilarityFactory, 
TestNumericTerms32, TestFieldCollectionResource, HdfsSyncSliceTest, 
TestPerFieldSimilarityWithDefaultOverride, DistributedFacetPivotLargeTest, 
IgnoreCommitOptimizeUpdateProcessorFactoryTest, 
DefaultValueUpdateProcessorTest, FileUtilsTest, SecurityConfHandlerTest, 
CSVRequestHandlerTest, TestRealTimeGet, ConnectionManagerTest, TestRTimerTree, 
TestSolrCloudWithKerberosAlt, LeaderInitiatedRecoveryOnCommitTest, 
TestRecovery, DistributedMLTComponentTest, TestTolerantUpdateProcessorCloud, 
TestExactSharedStatsCache, TermVectorComponentDistributedTest, 
CoreAdminCreateDiscoverTest, PluginInfoTest, AtomicUpdatesTest, 
TestSlowCompositeReaderWrapper, DistributedDebugComponentTest, BlockCacheTest, 
CustomCollectionTest, CoreAdminHandlerTest, BlockJoinFacetSimpleTest, 
TestFieldCacheSanityChecker, WordBreakSolrSpellCheckerTest, 
OverseerTaskQueueTest, TestInitQParse

[jira] [Commented] (SOLR-9324) Support Secure Impersonation / Proxy User for solr authentication

2016-08-06 Thread Gregory Chanan (JIRA)

[ 
https://issues.apache.org/jira/browse/SOLR-9324?page=com.atlassian.jira.plugin.system.issuetabpanels:comment-tabpanel&focusedCommentId=15410761#comment-15410761
 ] 

Gregory Chanan commented on SOLR-9324:
--

I'm not going to have a chance to backport this to 6x in the short 
term...[~hgadre] do you want to take a look?

> Support Secure Impersonation / Proxy User for solr authentication
> -
>
> Key: SOLR-9324
> URL: https://issues.apache.org/jira/browse/SOLR-9324
> Project: Solr
>  Issue Type: Improvement
>  Security Level: Public(Default Security Level. Issues are Public) 
>  Components: SolrCloud
>Reporter: Gregory Chanan
>Assignee: Gregory Chanan
> Attachments: SOLR-9324-tests.patch, SOLR-9324.patch, SOLR-9324.patch, 
> SOLR-9324.patch, SOLR-9324_branch_6x.patch, build-6025.log
>
>
> Solr should support Proxy User / Secure Impersonation for authentication, as 
> supported by hadoop 
> (http://hadoop.apache.org/docs/current/hadoop-project-dist/hadoop-common/Superusers.html)
>  and supported by the hadoop AuthenticationFilter (which we use for the 
> KerberosPlugin).
> There are a number of use cases, but a common one is this:
> There is a front end for searches (say, Hue http://gethue.com/) that supports 
> its own login mechanisms.  If the cluster uses kerberos for authentication, 
> hue must have kerberos credentials for each user, which is a pain to manage.  
> Instead, hue can be allowed to impersonate known users from known machines so 
> it only needs its own kerberos credentials.



--
This message was sent by Atlassian JIRA
(v6.3.4#6332)

-
To unsubscribe, e-mail: dev-unsubscr...@lucene.apache.org
For additional commands, e-mail: dev-h...@lucene.apache.org



[jira] [Commented] (SOLR-9324) Support Secure Impersonation / Proxy User for solr authentication

2016-08-05 Thread ASF subversion and git services (JIRA)

[ 
https://issues.apache.org/jira/browse/SOLR-9324?page=com.atlassian.jira.plugin.system.issuetabpanels:comment-tabpanel&focusedCommentId=15410465#comment-15410465
 ] 

ASF subversion and git services commented on SOLR-9324:
---

Commit 678d3f007a492e1bd82833ce35986dce1460c9a8 in lucene-solr's branch 
refs/heads/master from [~gchanan]
[ https://git-wip-us.apache.org/repos/asf?p=lucene-solr.git;h=678d3f0 ]

SOLR-9324: Fix local host test assumptions


> Support Secure Impersonation / Proxy User for solr authentication
> -
>
> Key: SOLR-9324
> URL: https://issues.apache.org/jira/browse/SOLR-9324
> Project: Solr
>  Issue Type: Improvement
>  Security Level: Public(Default Security Level. Issues are Public) 
>  Components: SolrCloud
>Reporter: Gregory Chanan
>Assignee: Gregory Chanan
> Attachments: SOLR-9324-tests.patch, SOLR-9324.patch, SOLR-9324.patch, 
> SOLR-9324.patch, SOLR-9324_branch_6x.patch, build-6025.log
>
>
> Solr should support Proxy User / Secure Impersonation for authentication, as 
> supported by hadoop 
> (http://hadoop.apache.org/docs/current/hadoop-project-dist/hadoop-common/Superusers.html)
>  and supported by the hadoop AuthenticationFilter (which we use for the 
> KerberosPlugin).
> There are a number of use cases, but a common one is this:
> There is a front end for searches (say, Hue http://gethue.com/) that supports 
> its own login mechanisms.  If the cluster uses kerberos for authentication, 
> hue must have kerberos credentials for each user, which is a pain to manage.  
> Instead, hue can be allowed to impersonate known users from known machines so 
> it only needs its own kerberos credentials.



--
This message was sent by Atlassian JIRA
(v6.3.4#6332)

-
To unsubscribe, e-mail: dev-unsubscr...@lucene.apache.org
For additional commands, e-mail: dev-h...@lucene.apache.org



[jira] [Commented] (SOLR-9324) Support Secure Impersonation / Proxy User for solr authentication

2016-08-05 Thread Gregory Chanan (JIRA)

[ 
https://issues.apache.org/jira/browse/SOLR-9324?page=com.atlassian.jira.plugin.system.issuetabpanels:comment-tabpanel&focusedCommentId=15410451#comment-15410451
 ] 

Gregory Chanan commented on SOLR-9324:
--

I believe these are related to the assumptions the test makes about the local 
box.  In the case Varun points to, the assumption is that the user running the 
process belongs to at least one group.  In the cases Steve points to, I believe 
I assumption is that the loopback device is 127.0.0.1.

> Support Secure Impersonation / Proxy User for solr authentication
> -
>
> Key: SOLR-9324
> URL: https://issues.apache.org/jira/browse/SOLR-9324
> Project: Solr
>  Issue Type: Improvement
>  Security Level: Public(Default Security Level. Issues are Public) 
>  Components: SolrCloud
>Reporter: Gregory Chanan
>Assignee: Gregory Chanan
> Attachments: SOLR-9324.patch, SOLR-9324.patch, SOLR-9324.patch, 
> SOLR-9324_branch_6x.patch, build-6025.log
>
>
> Solr should support Proxy User / Secure Impersonation for authentication, as 
> supported by hadoop 
> (http://hadoop.apache.org/docs/current/hadoop-project-dist/hadoop-common/Superusers.html)
>  and supported by the hadoop AuthenticationFilter (which we use for the 
> KerberosPlugin).
> There are a number of use cases, but a common one is this:
> There is a front end for searches (say, Hue http://gethue.com/) that supports 
> its own login mechanisms.  If the cluster uses kerberos for authentication, 
> hue must have kerberos credentials for each user, which is a pain to manage.  
> Instead, hue can be allowed to impersonate known users from known machines so 
> it only needs its own kerberos credentials.



--
This message was sent by Atlassian JIRA
(v6.3.4#6332)

-
To unsubscribe, e-mail: dev-unsubscr...@lucene.apache.org
For additional commands, e-mail: dev-h...@lucene.apache.org



[jira] [Commented] (SOLR-9324) Support Secure Impersonation / Proxy User for solr authentication

2016-08-05 Thread Gregory Chanan (JIRA)

[ 
https://issues.apache.org/jira/browse/SOLR-9324?page=com.atlassian.jira.plugin.system.issuetabpanels:comment-tabpanel&focusedCommentId=15410429#comment-15410429
 ] 

Gregory Chanan commented on SOLR-9324:
--

Interesting, I wasn't able to reproduce any of those failures on my Mac.

> Support Secure Impersonation / Proxy User for solr authentication
> -
>
> Key: SOLR-9324
> URL: https://issues.apache.org/jira/browse/SOLR-9324
> Project: Solr
>  Issue Type: Improvement
>  Security Level: Public(Default Security Level. Issues are Public) 
>  Components: SolrCloud
>Reporter: Gregory Chanan
>Assignee: Gregory Chanan
> Attachments: SOLR-9324.patch, SOLR-9324.patch, SOLR-9324.patch, 
> SOLR-9324_branch_6x.patch, build-6025.log
>
>
> Solr should support Proxy User / Secure Impersonation for authentication, as 
> supported by hadoop 
> (http://hadoop.apache.org/docs/current/hadoop-project-dist/hadoop-common/Superusers.html)
>  and supported by the hadoop AuthenticationFilter (which we use for the 
> KerberosPlugin).
> There are a number of use cases, but a common one is this:
> There is a front end for searches (say, Hue http://gethue.com/) that supports 
> its own login mechanisms.  If the cluster uses kerberos for authentication, 
> hue must have kerberos credentials for each user, which is a pain to manage.  
> Instead, hue can be allowed to impersonate known users from known machines so 
> it only needs its own kerberos credentials.



--
This message was sent by Atlassian JIRA
(v6.3.4#6332)

-
To unsubscribe, e-mail: dev-unsubscr...@lucene.apache.org
For additional commands, e-mail: dev-h...@lucene.apache.org



[jira] [Commented] (SOLR-9324) Support Secure Impersonation / Proxy User for solr authentication

2016-08-05 Thread Steve Rowe (JIRA)

[ 
https://issues.apache.org/jira/browse/SOLR-9324?page=com.atlassian.jira.plugin.system.issuetabpanels:comment-tabpanel&focusedCommentId=15409459#comment-15409459
 ] 

Steve Rowe commented on SOLR-9324:
--

Another {{TestSolrCloudWithSecureImpersonation.testProxyValidateHost()}} 
failure from Policeman Jenkins 
[http://jenkins.thetaphi.de/job/Lucene-Solr-master-Linux/17468/]:

{noformat}
   [junit4]   2> NOTE: reproduce with: ant test  
-Dtestcase=TestSolrCloudWithSecureImpersonation 
-Dtests.method=testProxyValidateHost -Dtests.seed=B596175E77DFB007 
-Dtests.multiplier=3 -Dtests.slow=true -Dtests.locale=so-DJ 
-Dtests.timezone=Europe/Guernsey -Dtests.asserts=true 
-Dtests.file.encoding=US-ASCII
   [junit4] ERROR   0.02s J2 | 
TestSolrCloudWithSecureImpersonation.testProxyValidateHost <<<
   [junit4]> Throwable #1: 
org.apache.solr.client.solrj.impl.HttpSolrClient$RemoteSolrException: Error 
from server at https://127.0.0.1:37485/solr: Expected mime type 
application/octet-stream but got application/json. {
   [junit4]>   "RemoteException" : {
   [junit4]> "message" : "Unauthorized connection for super-user: 
localHostAnyGroup from IP localhost.localdomain",
   [junit4]> "exception" : "AuthorizationException",
   [junit4]> "javaClassName" : 
"org.apache.hadoop.security.authorize.AuthorizationException"
   [junit4]>   }
   [junit4]> }
   [junit4]>at 
__randomizedtesting.SeedInfo.seed([B596175E77DFB007:5068D7AF7298E4B0]:0)
   [junit4]>at 
org.apache.solr.client.solrj.impl.HttpSolrClient.executeMethod(HttpSolrClient.java:576)
   [junit4]>at 
org.apache.solr.client.solrj.impl.HttpSolrClient.request(HttpSolrClient.java:261)
   [junit4]>at 
org.apache.solr.client.solrj.impl.HttpSolrClient.request(HttpSolrClient.java:250)
   [junit4]>at 
org.apache.solr.client.solrj.SolrClient.request(SolrClient.java:1219)
   [junit4]>at 
org.apache.solr.cloud.TestSolrCloudWithSecureImpersonation.testProxyValidateHost(TestSolrCloudWithSecureImpersonation.java:260)
   [junit4]>at 
jdk.internal.reflect.NativeMethodAccessorImpl.invoke0(java.base@9-ea/Native 
Method)
   [junit4]>at 
jdk.internal.reflect.NativeMethodAccessorImpl.invoke(java.base@9-ea/NativeMethodAccessorImpl.java:62)
   [junit4]>at 
jdk.internal.reflect.DelegatingMethodAccessorImpl.invoke(java.base@9-ea/DelegatingMethodAccessorImpl.java:43)
   [junit4]>at java.lang.Thread.run(java.base@9-ea/Thread.java:843)
{noformat}

> Support Secure Impersonation / Proxy User for solr authentication
> -
>
> Key: SOLR-9324
> URL: https://issues.apache.org/jira/browse/SOLR-9324
> Project: Solr
>  Issue Type: Improvement
>  Security Level: Public(Default Security Level. Issues are Public) 
>  Components: SolrCloud
>Reporter: Gregory Chanan
>Assignee: Gregory Chanan
> Attachments: SOLR-9324.patch, SOLR-9324.patch, SOLR-9324.patch, 
> SOLR-9324_branch_6x.patch, build-6025.log
>
>
> Solr should support Proxy User / Secure Impersonation for authentication, as 
> supported by hadoop 
> (http://hadoop.apache.org/docs/current/hadoop-project-dist/hadoop-common/Superusers.html)
>  and supported by the hadoop AuthenticationFilter (which we use for the 
> KerberosPlugin).
> There are a number of use cases, but a common one is this:
> There is a front end for searches (say, Hue http://gethue.com/) that supports 
> its own login mechanisms.  If the cluster uses kerberos for authentication, 
> hue must have kerberos credentials for each user, which is a pain to manage.  
> Instead, hue can be allowed to impersonate known users from known machines so 
> it only needs its own kerberos credentials.



--
This message was sent by Atlassian JIRA
(v6.3.4#6332)

-
To unsubscribe, e-mail: dev-unsubscr...@lucene.apache.org
For additional commands, e-mail: dev-h...@lucene.apache.org



[jira] [Commented] (SOLR-9324) Support Secure Impersonation / Proxy User for solr authentication

2016-08-05 Thread Steve Rowe (JIRA)

[ 
https://issues.apache.org/jira/browse/SOLR-9324?page=com.atlassian.jira.plugin.system.issuetabpanels:comment-tabpanel&focusedCommentId=15409444#comment-15409444
 ] 

Steve Rowe commented on SOLR-9324:
--

I've seen the same error Varun reported above, and also this one, which 
reproduces for me:

{noformat}
   [junit4]   2> NOTE: reproduce with: ant test  
-Dtestcase=TestSolrCloudWithSecureImpersonation 
-Dtests.method=testProxyValidateHost -Dtests.seed=3258EAE5741811E7 
-Dtests.multiplier=2 -Dtests.nightly=true -Dtests.slow=true 
-Dtests.linedocsfile=/x1/jenkins/lucene-data/enwiki.random.lines.txt 
-Dtests.locale=fr-CA -Dtests.timezone=Pacific/Chuuk -Dtests.asserts=true 
-Dtests.file.encoding=ISO-8859-1
   [junit4] ERROR   0.03s J2 | 
TestSolrCloudWithSecureImpersonation.testProxyValidateHost <<<
   [junit4]> Throwable #1: 
org.apache.solr.client.solrj.impl.HttpSolrClient$RemoteSolrException: Error 
from server at https://127.0.0.1:39539/solr: Expected mime type 
application/octet-stream but got application/json. {
   [junit4]>   "RemoteException" : {
   [junit4]> "message" : "Unauthorized connection for super-user: 
localHostAnyGroup from IP localhost",
   [junit4]> "exception" : "AuthorizationException",
   [junit4]> "javaClassName" : 
"org.apache.hadoop.security.authorize.AuthorizationException"
   [junit4]>   }
   [junit4]> }
   [junit4]>at 
__randomizedtesting.SeedInfo.seed([3258EAE5741811E7:D7A62A14715F4550]:0)
   [junit4]>at 
org.apache.solr.client.solrj.impl.HttpSolrClient.executeMethod(HttpSolrClient.java:576)
   [junit4]>at 
org.apache.solr.client.solrj.impl.HttpSolrClient.request(HttpSolrClient.java:261)
   [junit4]>at 
org.apache.solr.client.solrj.impl.HttpSolrClient.request(HttpSolrClient.java:250)
   [junit4]>at 
org.apache.solr.client.solrj.SolrClient.request(SolrClient.java:1219)
   [junit4]>at 
org.apache.solr.cloud.TestSolrCloudWithSecureImpersonation.testProxyValidateHost(TestSolrCloudWithSecureImpersonation.java:260)
   [junit4]>at java.lang.Thread.run(Thread.java:745)
{noformat}

> Support Secure Impersonation / Proxy User for solr authentication
> -
>
> Key: SOLR-9324
> URL: https://issues.apache.org/jira/browse/SOLR-9324
> Project: Solr
>  Issue Type: Improvement
>  Security Level: Public(Default Security Level. Issues are Public) 
>  Components: SolrCloud
>Reporter: Gregory Chanan
>Assignee: Gregory Chanan
> Attachments: SOLR-9324.patch, SOLR-9324.patch, SOLR-9324.patch, 
> SOLR-9324_branch_6x.patch, build-6025.log
>
>
> Solr should support Proxy User / Secure Impersonation for authentication, as 
> supported by hadoop 
> (http://hadoop.apache.org/docs/current/hadoop-project-dist/hadoop-common/Superusers.html)
>  and supported by the hadoop AuthenticationFilter (which we use for the 
> KerberosPlugin).
> There are a number of use cases, but a common one is this:
> There is a front end for searches (say, Hue http://gethue.com/) that supports 
> its own login mechanisms.  If the cluster uses kerberos for authentication, 
> hue must have kerberos credentials for each user, which is a pain to manage.  
> Instead, hue can be allowed to impersonate known users from known machines so 
> it only needs its own kerberos credentials.



--
This message was sent by Atlassian JIRA
(v6.3.4#6332)

-
To unsubscribe, e-mail: dev-unsubscr...@lucene.apache.org
For additional commands, e-mail: dev-h...@lucene.apache.org



[jira] [Commented] (SOLR-9324) Support Secure Impersonation / Proxy User for solr authentication

2016-08-02 Thread ASF subversion and git services (JIRA)

[ 
https://issues.apache.org/jira/browse/SOLR-9324?page=com.atlassian.jira.plugin.system.issuetabpanels:comment-tabpanel&focusedCommentId=15405040#comment-15405040
 ] 

ASF subversion and git services commented on SOLR-9324:
---

Commit a07425a4e1856aa301e7125863a9ad7a606eeb02 in lucene-solr's branch 
refs/heads/master from [~gchanan]
[ https://git-wip-us.apache.org/repos/asf?p=lucene-solr.git;h=a07425a ]

SOLR-9324: Fix jira number in CHANGES.txt


> Support Secure Impersonation / Proxy User for solr authentication
> -
>
> Key: SOLR-9324
> URL: https://issues.apache.org/jira/browse/SOLR-9324
> Project: Solr
>  Issue Type: Improvement
>  Security Level: Public(Default Security Level. Issues are Public) 
>  Components: SolrCloud
>Reporter: Gregory Chanan
>Assignee: Gregory Chanan
> Attachments: SOLR-9324.patch, SOLR-9324.patch, SOLR-9324.patch, 
> SOLR-9324_branch_6x.patch
>
>
> Solr should support Proxy User / Secure Impersonation for authentication, as 
> supported by hadoop 
> (http://hadoop.apache.org/docs/current/hadoop-project-dist/hadoop-common/Superusers.html)
>  and supported by the hadoop AuthenticationFilter (which we use for the 
> KerberosPlugin).
> There are a number of use cases, but a common one is this:
> There is a front end for searches (say, Hue http://gethue.com/) that supports 
> its own login mechanisms.  If the cluster uses kerberos for authentication, 
> hue must have kerberos credentials for each user, which is a pain to manage.  
> Instead, hue can be allowed to impersonate known users from known machines so 
> it only needs its own kerberos credentials.



--
This message was sent by Atlassian JIRA
(v6.3.4#6332)

-
To unsubscribe, e-mail: dev-unsubscr...@lucene.apache.org
For additional commands, e-mail: dev-h...@lucene.apache.org



[jira] [Commented] (SOLR-9324) Support Secure Impersonation / Proxy User for solr authentication

2016-08-02 Thread ASF subversion and git services (JIRA)

[ 
https://issues.apache.org/jira/browse/SOLR-9324?page=com.atlassian.jira.plugin.system.issuetabpanels:comment-tabpanel&focusedCommentId=15405032#comment-15405032
 ] 

ASF subversion and git services commented on SOLR-9324:
---

Commit e50858c314a138e2c2ced50bee9a5c2754929f8b in lucene-solr's branch 
refs/heads/master from [~gchanan]
[ https://git-wip-us.apache.org/repos/asf?p=lucene-solr.git;h=e50858c ]

SOLR-9324: Support Secure Impersonation / Proxy User for solr authentication


> Support Secure Impersonation / Proxy User for solr authentication
> -
>
> Key: SOLR-9324
> URL: https://issues.apache.org/jira/browse/SOLR-9324
> Project: Solr
>  Issue Type: Improvement
>  Security Level: Public(Default Security Level. Issues are Public) 
>  Components: SolrCloud
>Reporter: Gregory Chanan
>Assignee: Gregory Chanan
> Attachments: SOLR-9324.patch, SOLR-9324.patch, SOLR-9324.patch, 
> SOLR-9324_branch_6x.patch
>
>
> Solr should support Proxy User / Secure Impersonation for authentication, as 
> supported by hadoop 
> (http://hadoop.apache.org/docs/current/hadoop-project-dist/hadoop-common/Superusers.html)
>  and supported by the hadoop AuthenticationFilter (which we use for the 
> KerberosPlugin).
> There are a number of use cases, but a common one is this:
> There is a front end for searches (say, Hue http://gethue.com/) that supports 
> its own login mechanisms.  If the cluster uses kerberos for authentication, 
> hue must have kerberos credentials for each user, which is a pain to manage.  
> Instead, hue can be allowed to impersonate known users from known machines so 
> it only needs its own kerberos credentials.



--
This message was sent by Atlassian JIRA
(v6.3.4#6332)

-
To unsubscribe, e-mail: dev-unsubscr...@lucene.apache.org
For additional commands, e-mail: dev-h...@lucene.apache.org