Hi Ron,

Thanks for the update.  I agree with all of these changes, except I think we 
should discuss this one further:

On Wed, Aug 26, 2020, at 14:59, Ron Dagostino wrote:
>
> 2. We added a restriction to not allow users who authenticated using
> delegation tokens to create or update user SCRAM credentials. We don't
> allow such authenticated users to create new tokens, and it would be odd if
> they could create a new user or change the password of the user for the
> token.
>

I don't think these two restrictions are comparable.  It seems to me that we 
forbid creating a new token based on an existing token in order to force users 
of delegation tokens to re-authenticate periodically through the regular auth 
system.  If they could just create a new token based on their old token, there 
would be an obvious "wishing for more wishes" problem and they could just 
sidestep the regular authentication system entirely once they had a token.

This issue doesn't exist here, since creating a new SCRAM user doesn't do 
anything to extend the life of the existing delegation token.  If the user has 
the permission to change SCRAM users, I don't see any reason why we should 
forbid them from doing just that.  Users of delegation tokens shouldn't be 
second-class citizens. A user with ALTER on CLUSTER should have all the 
permissions associated with ALTER on CLUSTER, regardless of if they logged in 
with Kerberos, delegation tokens, SCRAM, etc. etc.  I don't think the proposed 
restriction you mention here is consistent with that.

best,
Colin

Reply via email to