-
Notifications
You must be signed in to change notification settings - Fork 601
Security
Cruise Control supports pluggable authentication methods via extending the
com.linkedin.kafka.cruisecontrol.servlet.security.SecurityProvider
interface. The implementation should be configured
with the webserver.security.provider
configuration. By default this is set to the
com.linkedin.kafka.cruisecontrol.servlet.security.BasicSecurityProvider
class which provides a HTTP Basic
authentication. The configured authentication then can be enabled with the webserver.security.enable=true
config in
the properties file.
By configuring Cruise Control with the BasicSecurityProvider
, the user will gain simple HTTP Basic
authentication where the users' credentials are stored in a file given by the webserver.auth.credentials.file
config.
This file is assumed to be stored in a safe, protected location and only accessible by Cruise Control. The format of the
file follows Jetty's HashLoginService
's file format:
username: password [,rolename ...]
Cruise Control can use token based authentication. To enable this, use the following configs:
-
webserver.security.enable
: This must be enabled to use the authentication features. -
webserver.security.provider
: This must be changed to com.linkedin.kafka.cruisecontrol.servlet.security.jwt.JwtSecurityProvider. -
webserver.auth.credentials.file
: It must point to a file in theHashLoginService
's file format introduced above but without the password part sousername: ,ROLE
. The possible roles are explained below. -
jwt.authentication.provider.url
: This must point to the token provider's endpoint. It can contain a{redirectUrl}
part which will be replaced by Cruise Control and points to the accessed Cruise Control endpoint. -
jwt.cookie.name
: This can be set to provide a cookie name that points to a cookie issued by the token provider and which contains the JSON web token. -
jwt.auth.certificate.location
: Tokens can be encrypted by the token provider and in this case there need to be a public key certificate that can be used for validating the token. This config points to a location that is assumed to be secured so that only Cruise Control can access it.
To set up an environment for demo purposes, please follow these instructions.
- Download Knox (http://www.apache.org/dyn/closer.cgi/knox or https://knox.apache.org/books/knox-1-3-0/user-guide.html#Quick+Start)
cd {KNOX_HOME}
bin/ldap.sh start
- Change
knoxsso.cookie.secure.only
tofalse
inconf/topologies/knoxsso.xml
to allow cookies over unsecured network bin/knoxcli.sh create-master
bin/gateway.sh start
- Create a credentials file containing this (for instance in
/tmp/test-roles.credentials
:
admin: ,ADMIN
sam: ,USER
-
bin/knoxcli.sh create-cert
to create a validation certificate -
bin/knoxcli.sh export-cert
to export it (by default as PEM) - Start Cruise Control with the following extra configs:
webserver.security.enable=true
webserver.security.provider=com.linkedin.kafka.cruisecontrol.servlet.security.jwt.JwtSecurityProvider
jwt.authentication.provider.url=https://localhost:8443/gateway/idp/api/v1/websso?originalUrl={redirectUrl}
webserver.auth.credentials.file=/tmp/test-roles.credentials
jwt.cookie.name=hadoop-jwt
jwt.auth.certificate.location=/tmp/knox-1.3.0/data/security/keystores/gateway-identity.pem
- Open http://localhost:9090/kafkacruisecontrol/state and see that it will redirect to the knox auth page (then log in
with the admin/admin-password username/password pair). It should redirect to the CC page. It is important to use the same
hostname (i.e.
localhost
) with CC otherwise Knox rejects the request.
For services using Cruise Control it is often easy to authenticate via SPNEGO as these programmatic users often use kerberos for authentication. Use the following configuration to set up SPNEGO authentication:
webserver.security.enable=true
webserver.security.provider=com.linkedin.kafka.cruisecontrol.servlet.security.spnego.SpnegoSecurityProvider
webserver.auth.credentials.file=/my/secure/location/to/roles.credentials
spnego.principal=HTTP/myhost@MYREALM
spnego.keytab.file=/my/path/to/my.keytab
In this configuration it is required to provide a credentials file which contains the kerberos shortname part of the principal ("shortname/host@REALM") of the allowed services and its privileges in the format of Jetty's HashLoginService's properties file, the principal of Cruise Control and a keytab file which contains the keys of this principal.
This is an addition on top of the SPNEGO authentication. In some cases Cruise Control can sit behind an authentication
proxy such as Apache Knox. The goal of this proxy is to centralize access to the system by providing a unified
interface for that. This service then accesses Cruise Control via SPNEGO authentication and forwards the real end-user's
principal in the doAs
HTTP parameter. For instance such a request will look like this:
http://localhost:9090/kafkacruisecontrol/state?doAs=bob
In this case Cruise Control will have to authenticate first the service that connects to it, decide if it's a trusted service, then it has to act on behalf of the forwarded user, so the request will have the same privileges as the user would have. Configuring this authentication method is very similar to SPNEGO:
webserver.security.enable=true
webserver.security.provider=com.linkedin.kafka.cruisecontrol.servlet.security.trustedproxy.TrustedProxySecurityProvider
webserver.auth.credentials.file=/my/secure/location/to/roles.credentials
spnego.principal=HTTP/myhost@MYREALM
spnego.keytab.file=/my/path/to/my.keytab
trusted.proxy.services=service1,service2
The difference in this case is that the webserver.auth.credentials.file
config stores the end-user credentials and
not the trusted proxy credentials. These are listed in the trusted.proxy.services
config.
HTTPS can be configured with the following configs:
-
webserver.ssl.enable
: Enables or disables the HTTPS configuration. -
webserver.ssl.keystore.location
: Sets the location of the keystore file. -
webserver.ssl.keystore.password
: Sets the password for accessing the keystore file. -
webserver.ssl.keystore.type
: Defines the type of the keystore (JKS, JCEKS, PKCS12, PKCS11 and DKS). It defaults to the Java version default. -
webserver.ssl.key.password
: This is the password of the key stored in the keystore. -
webserver.ssl.protocol
: The protocol to use for creating the SSL connection. By default it's "TLS".
By default Cruise Control defines three roles: VIEWER, USER and ADMIN.
- VIEWER role: has access to the most lightweight
kafka_cluster_state
,user_tasks
andreview_board
endpoints. - USER role: has access to all the GET endpoints except
bootstrap
andtrain
. - ADMIN role: has access to all endpoints.
It is possible to define custom roles too by extending the SecurityProvider
interface. Furthermore if the default
role structure is required then it is usually easier to implement the DefaultRoleSecurityProvider
class. With this
it is only required to define an authenticator and a login service.
Contents
- Cruise Control Wiki
- Overview
- Troubleshooting
- User Guide
- Python Client
- Developer Guide