Access Control
Ranger Policies
When a tenant is created, Ozone will create a set of Ranger policies on the tenant’s volume which allow the following:
- All users are able to create new buckets;
- Only the bucket owner (i.e. the user that creates the bucket) and tenant admins can access the bucket content.
- Note: For Ozone admins, typically there would be other Ranger policies that grants them full access to the cluster, if this is case they should be able to access the buckets as well. Though it is still possible to create new Ranger policies to explicitly deny them access to buckets.
Ranger admin is responsible for manually adding new policies to grant or deny any other access patterns. For example:
- Allow all users in a tenant read-only access to a bucket.
- Corresponding Ranger policy Allow Condition:
Roles = tenantName-UserRole, Permissions = READ,LIST
- Corresponding Ranger policy Allow Condition:
It is recommended to add new policies instead of editing the default tenant policies created by Ozone. DO NOT remove the Policy Label on those default tenant policies, or else the Ozone Manager might fail to sync with Ranger for those policies.
Ranger Roles
These new Ranger policies would have the corresponding Ranger roles added in their Allow Conditions.
Namely, tenantName-UserRole
and tenantName-AdminRole
Ranger roles are created when a tenant is created by an Ozone administrator under the CLI.
tenantName-UserRole
contains a list of all user names that are assigned to this tenant.
tenantName-AdminRole
contains a list of all tenant admins that are assigned to this tenant.
We leverage Ranger roles mainly for the advantage of easier user management in a tenant:
- When new users are assigned to a tenant, Ozone Manager simply adds the new user to
tenantName-UserRole
Ranger role. - When new tenant admins are assigned, Ozone Manager simply adds the user name to
tenantName-AdminRole
Ranger role. Delegated tenant admins will have the “Role Admin” checkbox checked, while non-delegated tenant admins won’t.- Role admins in a Ranger role has the permission to edit that Ranger role.
- And because
tenantName-AdminRole
is the “Role Admin” oftenantName-UserRole
, whichever user in thetenantName-AdminRole
automatically has the permission to add new users to the tenant, meaning all tenant admins (whether delegated or not) has the permission to assign and revoke users in this tenant.
- DO NOT manually edit any Ranger roles created by Ozone. Any changes to them will be overwritten by the Ozone Manager’s Ranger sync thread. Changes in tenant membership should be done using Multi-Tenancy CLI commands.
Ranger Sync
A Ranger Sync thread has been implemented to keep the Ranger policy and role states in-sync with Ozone Manager database in case of Ozone Manager crashes during tenant administrative operations.
The Ranger Sync thread does the following:
- Cleans up any default tenant policies if a tenant is already deleted.
- Checks if default tenant roles are out-of-sync (could be caused by OM crash during user assign/revoke operation). Overwrites them if this is the case.
- Performs all Ranger update (write) operations queued by Ozone tenant commands from the last sync, if any.
- This implies there will be a delay before Ranger policies and roles are updated for any tenant write operations (tenant create/delete, tenant user assign/revoke/assignadmin/revokeadmin, etc.).
Adding new bucket policies when sharing a bucket
By default, only the bucket owners have full access to the buckets they created. Other regular users won’t be able to access the content of buckets they don’t own.
So in order to share a bucket with other users without relaxing the default bucket policy (e.g. allow all tenant users LIST and READ access to all buckets), a cluster admin or tenant admin will needs to manually create a new Ozone policy in Ranger for that bucket.
Further, if a cluster admin or tenant admin wants the bucket owner (who is a regular tenant user without any superuser privileges) to be able to edit that bucket’s policy, when manually creating a new Ozone policy in Ranger for that bucket, an admin will need to explicitly grant the bucket owner user ALL permission on the bucket AND tick the bucket owner user’s “Delegated Admin” checkbox for that policy.
Note:
- An actual user name (e.g.
hive
) need to be specified here. The flexible{OWNER}
tag will not work with Ranger’s “Delegated Admin” checkbox. For more Technical details:
- The
{OWNER}
tag is only meaningful when Ozone Manager (OM) is performing a permission check. And in that permission check process OM fills in what this{OWNER}
tag actually stands for.- For example,
{OWNER}
will become userhive
during a bucket list permission check in OM, assuminghive
is the bucket owner;- Bonus: because of OM’s hierarchical permission check, right before the bucket permission check,
{OWNER}
will become userom
during a volume read permission check before this bucket permission check, assumingom
is the bucket’s parent volume’s owner.
- Bonus: because of OM’s hierarchical permission check, right before the bucket permission check,
- For example,
- Do not confuse the “Delegated Admin” checkbox in Ranger Web UI with tenant delegated admin. They are conceptually similar (have extra privilege), but different.
- With Ranger policies’ “Delegated Admin” checkbox in a policy rule. That user, or users in that group, or users in that role will be able to edit that policy as long as the user can log in to Ranger Web UI.
- Tenant delegated admin has the permission to assign and revoke tenant admins from a tenant.
With this new Ranger policy, as long as the bucket owners can log in to the Ranger Web UI, they could edit the bucket policies on their own, for example, to share the bucket with others without an administrator’s manual intervention.
Next >>