Hello,
Let's say a user has the following rights on HDFS (which are constrained Apache Ranger):
/prd/a/b/c <- read right
/prd/a/b/d <- read/write right
I would like to get a broad picture of his/her complete access rights.
I could look at the general policies in Apache Ranger and try to figure out which apply to my user, but that's complicated.
I wonder if there is another way (which ideally could be automated with a script) roughly:
- impersonate the user as, say, admin, with kinit; e.g. kinit <user>
- scan all HDFS directories and try to read or write
Does anyone have suggestions?
PS I've asked similar questions on the Apache Ranger mailing list, but with no success.
Many thanks.
Philippe
________________________________________________--- Synchronet 3.21d-Linux NewsLink 1.2
Kerberos mailing list Kerberos@mit.edu https://mailman.mit.edu/mailman/listinfo/kerberos
- impersonate the user as, say, admin, with kinit; e.g. kinit <user>
- scan all HDFS directories and try to read or write
Does anyone have suggestions?
- Have access to to user's key/password and generate a ticket for that
user using kinit. As someone else already noted, this isn't really
impersonating a user.
- Have access to the TGS key and generate a TGT for that user (or any user).
This is generally referred to as "ticket printing". I don't _think_
the Kerberos distributions come with a utility to do that, but I
believe there are example programs floating around that do that. I
have to say that doing so would require access to the TGS key and
having that outside of your Kerberos database would be extremely
dangerous as if it was compromised your entire realm would be
compromised.
- impersonate the user as, say, admin, with kinit; e.g. kinit <user>
- scan all HDFS directories and try to read or write
Does anyone have suggestions?
In general, your options are:
- Have access to to user's key/password and generate a ticket for that -a-auser using kinit. As someone else already noted, this isn't really -a-aimpersonating a user.
- Have access to the TGS key and generate a TGT for that user (or any user). -a-aThis is generally referred to as "ticket printing". I don't _think_ -a-athe Kerberos distributions come with a utility to do that, but I -a-abelieve there are example programs floating around that do that. I -a-ahave to say that doing so would require access to the TGS key and -a-ahaving that outside of your Kerberos database would be extremely -a-adangerous as if it was compromised your entire realm would be -a-acompromised.
- Have access to the HDFS service key and print a service ticket for that -a-auser. Again, I don't know if the Kerberos distributions have such
-a-aa utility, but this would be less dangerous (you already have to have -a-athe HDFS key on disk somewhere). I don't know how Kerberos works with -a-aHDFS, but if there are multiple service tickets for a HDFS filesystem -a-aspread across multiple servers that might be complicated.
| Sysop: | Amessyroom |
|---|---|
| Location: | Fayetteville, NC |
| Users: | 64 |
| Nodes: | 6 (0 / 6) |
| Uptime: | 492944:09:48 |
| Calls: | 842 |
| Files: | 1,304 |
| D/L today: |
8 files (19,649K bytes) |
| Messages: | 261,765 |