[ https://issues.apache.org/jira/browse/GEODE-2153?page=com.atlassian.jira.plugin.system.issuetabpanels:comment-tabpanel&focusedCommentId=15781396#comment-15781396 ]
Anthony Baker commented on GEODE-2153: -------------------------------------- Can this ticket be closed? I don't think that we can expect the {{PostProcessor}} to be used for field-level security. > PostProcessor security > ---------------------- > > Key: GEODE-2153 > URL: https://issues.apache.org/jira/browse/GEODE-2153 > Project: Geode > Issue Type: Improvement > Components: security > Reporter: Jared Stewart > > I have started a server and locator using the sample RedactingPostProcessor > implementation. I created a /customers region and inserted a Customer: > {code} > Region<String, Customer> region = connectToRegion("customers"); > Customer customer = new Customer(1L, "FirstName", "LastName", "123-456-7890"); > region.put("galen", customer); > {code} > The following query and get operation show our customer's SSN getting > redacted as expected: > {code} > Customer customerFromGet = region.get("galen"); > //{ type = com.jaredjstewart.Customer, customerId = 1, firstName = FirstName, > lastName = LastName, ssn = ********** } > Object customerFromQuery = queryService.newQuery("select * from > /customers").execute(); > //{ type = com.jaredjstewart.Customer, customerId = 1, firstName = FirstName, > lastName = LastName, ssn = ********** } > {code} > However, it is possible to leak information by accessing the field which is > supposed to be redacted in a where clause: > {code} > Object customer = queryService.newQuery("select c from /customers c > where c.socialSecurityNumber='123-456-7890'").execute(); > //this redacts but still leaks the vital information > {code} > It is also possible to query the field directly: > {code} > Object customerSSN = queryService.newQuery("select c.socialSecurityNumber > from /customers c").execute(); > //[123-456-7890] > {code} -- This message was sent by Atlassian JIRA (v6.3.4#6332)