[ https://issues.apache.org/jira/browse/BOOKKEEPER-391?page=com.atlassian.jira.plugin.system.issuetabpanels:comment-tabpanel&focusedCommentId=15664044#comment-15664044 ]
Enrico Olivelli commented on BOOKKEEPER-391: -------------------------------------------- thank you [~rakeshr]. The discussion went well and I hope the this feature will be pushed on 4.5.0 release. I see your point about the fact that the Auditor/AutoRecovery has been designed as an admin operation. My original idea was to implement something like your proposal, that is to make the clientLoginContext section configurable and pass a value to the BookKeeper instance created by the Auditor. This new value in turn could be another configuration property, which could default to "BookieAuditor". {code} saslClientLoginContextEntry=BookKeeper saslAuditorLoginContextEntry=BookieAuditor {code} When the Auditor creates a BookKeeper client it copies the value from saslAuditorLoginContextEntry overriding any other value for saslClientLoginContextEntry and the trink is done. For JAAS/SASL/Kerberos this would work fine, but it requires that special hack on the Auditor, that is to deal with a special configuration property which is used by the new "SASL Auth Plugin". Thinking about the general API for AuthProviders IMHO it would be useful to let any other AuthPlugin to know whether the client is going thru authentication as a "standard" client or as an "admin"/"system" client. The "this is the auditor" flag on BookKeeper client configuration will achieve this goal. > Support Kerberos authentication of bookkeeper > --------------------------------------------- > > Key: BOOKKEEPER-391 > URL: https://issues.apache.org/jira/browse/BOOKKEEPER-391 > Project: Bookkeeper > Issue Type: New Feature > Components: bookkeeper-client, bookkeeper-server > Reporter: Rakesh R > Assignee: Enrico Olivelli > > This JIRA to discuss authentication mechanism of bookie clients and server. > Assume ZK provides fully secured communication channel using Kerberos based > authentication and authorization model. We could also manage and renew users > authenticated to BK via Kerberos. There is currently no configuration or > hooks for the Bookie process to obtain Kerberos credentials. > Today an unauthenticated bookie client can easily establish connection with > the bookkeeper server. -- This message was sent by Atlassian JIRA (v6.3.4#6332)