Return-Path: X-Original-To: archive-asf-public-internal@cust-asf2.ponee.io Delivered-To: archive-asf-public-internal@cust-asf2.ponee.io Received: from cust-asf.ponee.io (cust-asf.ponee.io [163.172.22.183]) by cust-asf2.ponee.io (Postfix) with ESMTP id BE260200AE4 for ; Wed, 11 May 2016 02:01:29 +0200 (CEST) Received: by cust-asf.ponee.io (Postfix) id BCFEA160A11; Wed, 11 May 2016 00:01:29 +0000 (UTC) Delivered-To: archive-asf-public@cust-asf.ponee.io Received: from mail.apache.org (hermes.apache.org [140.211.11.3]) by cust-asf.ponee.io (Postfix) with SMTP id 12C5716098A for ; Wed, 11 May 2016 02:01:28 +0200 (CEST) Received: (qmail 50973 invoked by uid 500); 11 May 2016 00:01:28 -0000 Mailing-List: contact dev-help@falcon.apache.org; run by ezmlm Precedence: bulk List-Help: List-Unsubscribe: List-Post: List-Id: Reply-To: dev@falcon.apache.org Delivered-To: mailing list dev@falcon.apache.org Received: (qmail 50962 invoked by uid 99); 11 May 2016 00:01:28 -0000 Received: from pnap-us-west-generic-nat.apache.org (HELO spamd3-us-west.apache.org) (209.188.14.142) by apache.org (qpsmtpd/0.29) with ESMTP; Wed, 11 May 2016 00:01:28 +0000 Received: from localhost (localhost [127.0.0.1]) by spamd3-us-west.apache.org (ASF Mail Server at spamd3-us-west.apache.org) with ESMTP id D8FE0180183 for ; Wed, 11 May 2016 00:01:27 +0000 (UTC) X-Virus-Scanned: Debian amavisd-new at spamd3-us-west.apache.org X-Spam-Flag: NO X-Spam-Score: -3.221 X-Spam-Level: X-Spam-Status: No, score=-3.221 tagged_above=-999 required=6.31 tests=[KAM_ASCII_DIVIDERS=0.8, KAM_LAZY_DOMAIN_SECURITY=1, RCVD_IN_DNSWL_HI=-5, RCVD_IN_MSPIKE_H3=-0.01, RCVD_IN_MSPIKE_WL=-0.01, RP_MATCHES_RCVD=-0.001] autolearn=disabled Received: from mx2-lw-us.apache.org ([10.40.0.8]) by localhost (spamd3-us-west.apache.org [10.40.0.10]) (amavisd-new, port 10024) with ESMTP id LJ0AhmsJCwit for ; Wed, 11 May 2016 00:01:27 +0000 (UTC) Received: from mail.apache.org (hermes.apache.org [140.211.11.3]) by mx2-lw-us.apache.org (ASF Mail Server at mx2-lw-us.apache.org) with SMTP id C46555FBC5 for ; Wed, 11 May 2016 00:01:26 +0000 (UTC) Received: (qmail 49168 invoked by uid 99); 11 May 2016 00:01:26 -0000 Received: from arcas.apache.org (HELO arcas) (140.211.11.28) by apache.org (qpsmtpd/0.29) with ESMTP; Wed, 11 May 2016 00:01:25 +0000 Received: from arcas.apache.org (localhost [127.0.0.1]) by arcas (Postfix) with ESMTP id DD2192C14F8 for ; Wed, 11 May 2016 00:01:25 +0000 (UTC) Date: Wed, 11 May 2016 00:01:25 +0000 (UTC) From: "Ying Zheng (JIRA)" To: dev@falcon.incubator.apache.org Message-ID: In-Reply-To: References: Subject: [jira] [Updated] (FALCON-1919) Provide user the option to store sensitive information with Hadoop credential provider MIME-Version: 1.0 Content-Type: text/plain; charset=utf-8 Content-Transfer-Encoding: 7bit X-JIRA-FingerPrint: 30527f35849b9dde25b450d4833f0394 archived-at: Wed, 11 May 2016 00:01:29 -0000 [ https://issues.apache.org/jira/browse/FALCON-1919?page=com.atlassian.jira.plugin.system.issuetabpanels:all-tabpanel ] Ying Zheng updated FALCON-1919: ------------------------------- Description: Sensitive data, e.g. SSL keystore password, SMTP user name and password, Azure service bus SAS key, ActiveMQ server password, etc., are stored as plain text in startup.properties. This jira is to provide the user an option to store these sensitive data with Hadoop credential provider for better security. Note that if startup.properties and Hadoop credential provider contain the same alias, Falcon will take the one in startup.properties. was: Sensitive data, e.g. SSL keystore password, SMTP user name and password, Azure service bus SAS key, ActiveMQ server password, etc., are stored as plain text in startup.properties. This jira is to provide the user an option to store these sensitive data with Hadoop credential provider for better security. > Provide user the option to store sensitive information with Hadoop credential provider > -------------------------------------------------------------------------------------- > > Key: FALCON-1919 > URL: https://issues.apache.org/jira/browse/FALCON-1919 > Project: Falcon > Issue Type: Improvement > Reporter: Ying Zheng > Assignee: Ying Zheng > > Sensitive data, e.g. SSL keystore password, SMTP user name and password, Azure service bus SAS key, ActiveMQ server password, etc., are stored as plain text in startup.properties. This jira is to provide the user an option to store these sensitive data with Hadoop credential provider for better security. > Note that if startup.properties and Hadoop credential provider contain the same alias, Falcon will take the one in startup.properties. -- This message was sent by Atlassian JIRA (v6.3.4#6332)