Uploaded image for project: 'Apache Ozone'
  1. Apache Ozone
  2. HDDS-9218 S3 secret managment through HTTP
  3. HDDS-8050

Create HTTP endpoint to access S3 secret via Kerberos auth

    XMLWordPrintableJSON

Details

    • Sub-task
    • Status: Resolved
    • Major
    • Resolution: Fixed
    • 1.4.0
    • 1.4.0
    • S3

    Description

      There is currently only one way to generate an S3 secret for a user, and that is the S3 namespace in the ozone binary script.

      With this approach, the user must have access to the cluster/node directly or provide it to the cluster administrator. There are two problems here
      1. The user may not have access to the cluster machine, for example, in the case of a service cluster.
      2. If the administrator generates an S3 secret using the ozone script, then this secret will be completed and, as a result, all user data. Some environments and companies may have security restrictions on this sensitive information for certain third parties, such as the cluster administrator.

      Here we have no way to automatically and securely generate an S3 secret. 
      As solution I have option to create additional S3 secret HTTP server on S3 Gateway witch will have enable Kerberos HTTP authentication for two endpoint. First one is generate secret, and second one is revoke secret.

      These endpoint will generate S3 secret for user who authorized via Kerberos and provide kerberos token via REST call (for example via curl --negotiate) and return it. In this case no one except user may generate and revoke secret for itself, especially with correct combination with ozone.s3.administrators property settings.

       

      This S3 security server should have separate configuration properties and may be enabled only in case when node env has Kerberos. By default this server will be disable until configuration will be presented.

      Attachments

        Issue Links

          Activity

            People

              izlenko Ivan Zlenko
              PochatkinMikhail Mikhail Pochatkin
              Votes:
              0 Vote for this issue
              Watchers:
              2 Start watching this issue

              Dates

                Created:
                Updated:
                Resolved: