Yes, I said about it at 07.19.
http://apache-ignite-developers.2346864.n4.nabble.com/Improvements-for-new-security-approach-td42698.html#a42708
And in my solution, I just transmitted security subjects for rest requests.

If you remove ATTR_SECURITY_SUBJECT_V2, it breaks compatibility between old
versions and new.

чт, 20 февр. 2020 г. в 15:56, Denis Garus <garus....@gmail.com>:

> Hi, Igniters!
>
>
> At present, a security subject id is assumed to be node id.
>
> But when we are dealing with thin client, JDBC or REST subject id is random
> UUID. In this case, we cannot get the subject information on a remote node,
> and we get problems like these [1], [2].
>
> To fix the problem, we should spread the client session to the whole
> cluster.
>
>
> I want to suggest a solution to the problem.
>
>
> First, we should get subject information using GridSecurityProcessor.
>
> How GridSecurityProcessor will retrieve a subject data, it is up to plugin
> developers.
>
>
> Second, we should get rid of the assumption that a subject id is a node id
> and remove the ATTR_SECURITY_SUBJECT_V2 attribute.
>
>
> I have prepared PoC PR [3] that:
>
> - places the existing logic of spreading security context to
> GridSecurityProcessor;
>
> - uses GridSecurityProcessor to get SecurityContext.
>
>
>
>    1.
>
> http://apache-ignite-developers.2346864.n4.nabble.com/JDBC-thin-client-incorrect-security-context-td45929.html
>    2. https://issues.apache.org/jira/browse/IGNITE-12589
>    3. https://github.com/apache/ignite/pull/7375
>

Reply via email to