Description
Problem Statement :
Currently even in kerberos environment Ranger admin sends request using repo config user. As now Ranger Admin and Ranger KMS are working in kerberos environment, request for key operations from UI needs to go using ranger admin credentials.
Need to improve following features:
1. KMS to use rangeradmin credentials for test connection, resource lookup and for encrytpion key operation from Ranger admin UI Encryption tab.
2. Download Policy Session Log was created in every policy refresher call, so in x_auth_session it is getting bulk of downloadpolicy session log.
3. To add ambari service check user in default policy using service config custom property