Permissions define which administrative users can create, view, and modify security policies. Administrators set the permissions on security policies through cluster-level and security policy-level ACLs.
Policy-Based Security supports cluster-level and policy-level permissions.
| Permission Level | Description |
|---|---|
| Cluster-level |
|
| Policy-level |
|
maprcli acl set|edit commandsmaprcli security policy create commandsroot user and the data-fabric
user (typically named mapr or hadoop on
each node) have cp permission. On an upgraded cluster, only the data-fabric
user user has cp permission.mapr or hadoop on
each node), has overriding permission on security policies, including the
administrative ACLs. The data-fabric user can create, view, and modify security
policies, regardless of the cluster-level and policy-level permission specified. cp (create security policy) permission to create security policies.
Administrators with cluster-level a (admin) permission can grant
cp permission to themselves or other administrators.Cluster-level and security policy-level permission codes, set through ACLs, grant security
policy access to administrators. An administrator (with cluster-level a
(admin) and cp (create security policy) permissions) that
creates a security policy has full control over the security policy unless they specifically
grant other administrators access to the security policy through policy-level
permissions.
The following sections describe the cluster-level and policy-level permission codes for security policy access:
| Cluster-level permission code | Description |
|---|---|
a (admin) |
|
cp (create security policy) |
Attention: Administrators need this permission to create security
policies.
|
fc (full control) |
|
There are separate read (r) and edit (fc)
permissions for policy owners, which allows some policy owners to view policy
information, while others can edit policy information. This allows most administrators
to administer the system without seeing the data and also prevents some policy owners
from adding their credentials to the administrative ACLs to manipulate the data access
ACEs.
Policy-level permissions are set on a per-policy basis. Permissions set on one security policy do not apply to other security policies.
| Policy-level permission code | Description |
|---|---|
a (admin) |
|
fc (full control) |
|
r (read) |
Can view all parts of a security policy, but cannot modify any part of the security policy. |
r, a, and
fc permission on the security policy.| Action | Cluster-Level | Policy-Level |
| Create a security policy | cp |
-- |
| View details of all security policies | fc |
-- |
| View details of a security policy | -- | r |
| View and edit permissions on a security policy (ACLs) | -- | a |
| View and edit the details of a security policy (ACEs, auditing, wire-level encryption) | -- | fc |
An administrator with cluster-level permissions can set security policy permissions during policy creation. Administrators with proper edit permissions on a security policy can modify security policy permissions.
Setting Permissions from the Control System
Setting Permissions from the CLI and REST API
cp) permission to a cluster administrator,
see acl./opt/mapr/bin/maprcli acl show -type cluster/opt/mapr/bin/maprcli security policy info -name <policy name> \
[-cluster cluster name ] [ -output terse|verbose ] \
[ -columns <comma-separated list of column names> ] \
[ -expandaces true|false ] -json