-
Notifications
You must be signed in to change notification settings - Fork 17
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
[FEATURE][ODBC] Support SIGV4 along with Basic Auth #5
Comments
Related bug: #20 |
@joshuali925 do JDBC driver or other clients support using both SIGv4 and FGAC at the same time? |
@MaxKsyunz i don't think so, according to its readme |
@joshuali925 do you think there's value in supporting this scenario across more clients? |
@MaxKsyunz I'm assuming that for a cluster that uses IAM and FGAC, clients needs to get both information from the user in order to connect. If this is true, then i think yes because otherwise the clients using either SIGV4 or FGAC won't be able to connect to the cluster. |
@joshuali925 I'd like to understand this use case better. Here's what I got so far:
Is the problem that
|
@MaxKsyunz The use case is that there is a domain which needs both AWS credentials and username password to access, and we cannot use ODBC to connect to it For the problem i'm also not sure. i put my assumptions in the description but I felt my understanding of how auth works in this case is probably not accurate |
@MaxKsyunz doesn't look like all clients support SIGv4 yet. opensearch-project/opensearch-clients#22 |
Is your feature request related to a problem?
Currently there are three auth types in ODBC driver: basic, sigv4, none.
Users can provide their FGAC credentials (username and password) using basic auth, and sigv4 will read
opensearchodbc
aws profile which contains IAM credentials.There is a domain that uses both types of authentication. opensearch.log shows 401 authn error for basic and none auth types, and 403 authz error for sigv4 auth type. Looks like sigv4 got passed the aws validation, but since there were no username and password send, it did not go through the FGAC validation.
Feel free to edit/comment if the above assumption is wrong.
What solution would you like?
Provide an option in ODBC driver to allow user use their aws credentials with basic auth (username and password).
What alternatives have you considered?
A clear and concise description of any alternative solutions or features you've considered.
Do you have any additional context?
Add any other context or screenshots about the feature request here.
The text was updated successfully, but these errors were encountered: