[ 
https://issues.apache.org/jira/browse/HADOOP-19612?page=com.atlassian.jira.plugin.system.issuetabpanels:comment-tabpanel&focusedCommentId=18011006#comment-18011006
 ] 

ASF GitHub Bot commented on HADOOP-19612:
-----------------------------------------

mccormickt12 opened a new pull request, #7844:
URL: https://github.com/apache/hadoop/pull/7844

   Add a new auth header to the rpc header proto for access token support. This 
should support different access tokens within the same connection.
   
   Contributed-by: Tom McCormick <[email protected]>
   
   <!--
     Thanks for sending a pull request!
       1. If this is your first time, please read our contributor guidelines: 
https://cwiki.apache.org/confluence/display/HADOOP/How+To+Contribute
       2. Make sure your PR title starts with JIRA issue id, e.g., 
'HADOOP-17799. Your PR title ...'.
   -->
   
   ### Description of PR
   
   
   ### How was this patch tested?
   
   
   ### For code changes:
   
   - [ ] Does the title or this PR starts with the corresponding JIRA issue id 
(e.g. 'HADOOP-17799. Your PR title ...')?
   - [ ] Object storage: have the integration tests been executed and the 
endpoint declared according to the connector-specific documentation?
   - [ ] If adding new dependencies to the code, are these dependencies 
licensed in a way that is compatible for inclusion under [ASF 
2.0](http://www.apache.org/legal/resolved.html#category-a)?
   - [ ] If applicable, have you updated the `LICENSE`, `LICENSE-binary`, 
`NOTICE-binary` files?
   
   




> Add Support for Propagating Access Token via RPC Header in HDFS
> ---------------------------------------------------------------
>
>                 Key: HADOOP-19612
>                 URL: https://issues.apache.org/jira/browse/HADOOP-19612
>             Project: Hadoop Common
>          Issue Type: New Feature
>          Components: hadoop-common
>            Reporter: Tom McCormick
>            Assignee: Tom McCormick
>            Priority: Major
>              Labels: pull-request-available
>             Fix For: 3.5.0
>
>
> *Description:*
> To support modern authentication models (e.g., bearer tokens, OAuth2), we 
> propose adding support in HDFS to propagate an access token via the RPC 
> request header. This enables downstream services (e.g., NameNode, Router) to 
> validate access tokens in a secure and standardized way.
> The token will be passed in a dedicated field in the 
> {{{}RpcRequestHeaderProto{}}}, mimicking the behavior of an HTTP 
> {{Authorization: Bearer <token>}} header. The caller context or UGI may 
> extract this token and use it for authorization decisions or auditing.
> *Benefits:*
>  * Enables secure, token-based authentication in multi-tenant environments
>  * Lays the foundation for fine-grained, per-request authorization
> *Scope:*
>  * Add optional {{authorization_token}} field to RPC header
>  * Ensure token is thread-local or caller-context scoped
>  * Wire it through relevant client and server code paths
>  * Provide configuration to enable/disable this feature
> *Notes:*
> This feature is intended to be backward-compatible with existing HDFS 
> clients. If the token is not set, behavior will remain unchanged.
> At Linkedin, we plan to delegate auth to a custom enforcement point in RBF. 
> The workflow is the client will get an access token and pass that in the RPC. 
> The request and access token will be authorized in the custom authorizer. 
>  
>  
> *PR*
> [https://github.com/apache/hadoop/pull/7803/files#diff-55740268215623b4037dd1bd35200c383576bee23d444096eb9cee751e3728f3]
>  



--
This message was sent by Atlassian Jira
(v8.20.10#820010)

---------------------------------------------------------------------
To unsubscribe, e-mail: [email protected]
For additional commands, e-mail: [email protected]

Reply via email to