Securing Drill
An administrator can install Drill with the default security configuration or manually configure custom security for Drill.
Drill supports several security features that secure the communication paths between Drill clients (such as ODBC/JDBC) and Drillbits and also between Drillbits. The following sections briefly describe the security configuration options for Drill and provide links to additional information and instructions.
Default Security Configuration
- Installing Drill, which describes some Drill installation security scenarios.
- Data Fabric Drill Drivers, where you can access the JDBC and ODBC driver information and downloads required to connect to Drill when using the default security configuration.
Security Features Supported in a Custom Configuration
Drill supports several security features that an administrator can manually configure to secure the communication paths between the Drill client and Drillbit and also between Drillbits.
Security Features | Supported Mechanisms | Communication Paths Secured |
---|---|---|
Authentication | MapR Security (data-fabric-SASL/Tickets) |
|
Kerberos |
|
|
Plain (username and password) |
|
|
Form-based |
|
|
SPNEGO for HTTP |
NOTE You can configure SSL/TLS for encryption. |
|
Encryption | MapR Security (data-fabric/Tickets) |
|
Kerberos |
|
|
SSL/TLS |
|
|
Authorization | Based on filesystem permissions. |
|
Impersonation | User Impersonation |
NOTE Drill supports user impersonation, inbound impersonation, and user
impersonation with Hive authorization. |
Inbound impersonation |
NOTE Supports setting inbound impersonation policies, which are used to verify
whether the user (set as the DelegationUID parameter passed in the client
connection URL) can be impersonated by the connection user or not. |
Views and File ACEs
In addition to the listed security features, you can create views on data to limit access to the data. You can also create file ACEs on the view definition files to protect the views.