Hi, Udit

Unfortunately, users need the write permission to the folder to create
external tables. Some current administrators may rely on the specification.
It was discussed in HIVE-12231 and HIVE-12232. But in my opinion, it makes
sense to let users create external tables if they have the read permisson.

Thanks,
Takanobu

2016-04-13 7:42 GMT+09:00 Udit Mehta <ume...@groupon.com>:

> Hi all,
>
> I wanted to understand what authorization model is most suitable for a
> production environment where most of the data is shared between multiple
> teams and users.
> I know this is would depend more on the use case but I cant seem to figure
> out the best model for our use:
>
> We have data that is owned by a certain process (R/W access for that user)
> while other users only have Read access to that data. We have a lot of
> instances when users would want to create external tables pointing to this
> data. We tried the following 3 auth models:
>
> 1. *Default Authorization model*: This we think is less secure and any
> user can grant himself access to create/modify tables and databases even
> where they are not supposed to. We would want to have much tighter security
> than this model provides.
>
> 2. *Storage Based Authorization*: While this helps us by preventing users
> from modifying metadata by checking the HDFS permissions of the underlying
> directories, it prevents our most important use case of letting users
> create *external *tables on data they dont have write access to. I would
> assume external tables wont actually delete the data when dropping
> tables/partitions so this operation should be allowed. But because it is
> not, even this authorization model does not meet our use case.
>
> 3. *Sql Standard Based Authorization: *This does give us fine-grained
> control over which users can perform specific commands, but when it comes
> to creating external tables, even this authorization scheme seems to use
> the filesystem's permissions.
>
> So overall all 3 models didnt seem to fulfill our requirement here which I
> think would be a fairly common one. I want to know how other users manage
> security on Hive or If i am missing something.
>
> Thanks in advance,
> Udit
>

Reply via email to