Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Support SPNEGO/Kerberos auth to Elasticsearch #1175

Closed
jbaiera opened this issue Jul 17, 2018 · 6 comments
Closed

Support SPNEGO/Kerberos auth to Elasticsearch #1175

jbaiera opened this issue Jul 17, 2018 · 6 comments

Comments

@jbaiera
Copy link
Member

jbaiera commented Jul 17, 2018

Work is wrapping up on adding a Kerberos based authentication realm to Elasticsearch. The realm will secure the rest endpoints by means of SPNEGO. Since Kerberos is used heavily in the Big Data space, we should offer an integration that allows for ES-Hadoop to use the currently logged in user and their Kerberos Ticket to authenticate to Elasticsearch over SPNEGO. This should include token authentication and appropriate refreshing mechanisms to avoid the same pitfalls that Hadoop runs into with KDC spamming and token lifetime.

@jbaiera jbaiera changed the title Support SPNEGO auth to Elasticsearch Support SPNEGO/Kerberos auth to Elasticsearch Jul 17, 2018
@acchen97 acchen97 mentioned this issue Jul 23, 2018
3 tasks
@vamsi360
Copy link

@jbaiera
This is great to know. We can now integrate ES also into a centralised Kerberos cluster. Any estimate of when this is going to be released?

@jbaiera
Copy link
Member Author

jbaiera commented Aug 31, 2018

There is a substantial amount of work that is already completed for this feature, but there is quite a bit more to go, including the extensive testing that we will need to eventually run to ensure correctness.

Additionally, we are working out the best course of action for handling token authentication in worker tasks. The current token functionality in ES is based on OAuth username and password grants, which does not provide tokens that are useable in Hadoop/Spark/Storm (the tokens change between refreshes, last only an hour, can only be refreshed once, etc).

Hopefully soon I will be able to pull together a preliminary PR for the work, but until then, I have the work periodically checked into a feature branch located at master...jbaiera:feature-kerberos

@jbaiera
Copy link
Member Author

jbaiera commented Oct 4, 2018

This is currently waiting on #1183

@jbaiera jbaiera closed this as completed in f502852 Oct 4, 2018
jbaiera added a commit that referenced this issue Oct 4, 2018
We already had parsing code for this dating back to the 2.x era. Lucky us.

fixes #1175
@jbaiera jbaiera reopened this Oct 4, 2018
@jbaiera
Copy link
Member Author

jbaiera commented Oct 4, 2018

Closed in error.

@jbaiera
Copy link
Member Author

jbaiera commented Oct 12, 2018

This is currently waiting on elastic/elasticsearch#34383 for further development

@jbaiera
Copy link
Member Author

jbaiera commented Feb 5, 2019

#1244 is merged now.

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Projects
None yet
Development

No branches or pull requests

2 participants