You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardexpand all lines: docs/admin-manual/auth/authentication-and-authorization.md
+2-2
Original file line number
Diff line number
Diff line change
@@ -73,7 +73,7 @@ Doris supports the following password policies to assist users in better passwor
73
73
74
74
1.`PASSWORD_HISTORY`
75
75
76
-
Determines whether a user can reuse a historical password when resetting their current password. For example, `PASSWORD_HISTORY 10` means the last 10 passwords cannot be reused as a new password. Setting `PASSWORD_HISTORY DEFAULT` will use the value from the global variable `password_history`. A setting of 0 disables this feature. The default is 0.
76
+
Determines whether a user can reuse a historical password when resetting their current password. For example, `PASSWORD_HISTORY 10` means the last 10 passwords cannot be reused as a new password. Setting `PASSWORD_HISTORY DEFAULT` will use the value from the global variable `PASSWORD_HISTORY`. A setting of 0 disables this feature. The default is 0.
77
77
78
78
Examples:
79
79
@@ -308,7 +308,7 @@ Please refer to [Authorization Scheme Based on Apache Ranger](./ranger.md).
308
308
309
309
3. SET PASSWORD
310
310
311
-
- Users with ADMIN privileges or GLOBAL level GRANT privileges can set passwords for non-ROOT users.
311
+
- Users with ADMIN privileges or GLOBAL level GRANT privileges can set passwords for non-root users.
312
312
- Ordinary users can set the password for their corresponding User Identity. Their corresponding User Identity can be viewed with the `SELECT CURRENT_USER()` command.
Copy file name to clipboardexpand all lines: docs/admin-manual/auth/authentication/federation.md
+3-2
Original file line number
Diff line number
Diff line change
@@ -1,3 +1,4 @@
1
+
1
2
---
2
3
{
3
4
"title": "Federated Authentication",
@@ -115,7 +116,7 @@ Assuming `jack` also belongs to LDAP groups `doris_qa` and `doris_pm`; and Doris
115
116
116
117
> Note:
117
118
>
118
-
>Which group a user belongs to is unrelated to the organizational structure of the LDAP tree. The user2in the example does not necessarily belong to group2.
119
+
>The group a user belongs to is unrelated to the organizational structure of the LDAP tree. User2in the example does not necessarily belong to group2.
119
120
120
121
### LDAP Example
121
122
#### Modify Doris Configuration
@@ -147,7 +148,7 @@ To avoid frequent access to the LDAP service, Doris caches LDAP information in m
147
148
148
149
- How to determine which roles an LDAP user has in Doris?
149
150
150
-
Log in to Doris using the LDAP user and execute `show grants;` to view the roles of the current user. Among them, ldapDefaultRole is the default role that each LDAP user has in Doris.
151
+
Log in to Doris using the LDAP user and execute `show grants;` to view the roles of the current user. `ldapDefaultRole` is the default role that each LDAP user has in Doris.
151
152
152
153
- Why does an LDAP user have fewer roles in Doris than expected?
Copy file name to clipboardexpand all lines: docs/admin-manual/auth/ldap.md
+3-3
Original file line number
Diff line number
Diff line change
@@ -34,7 +34,7 @@ LDAP group authorization, is to map the group in LDAP to the Role in Doris, if t
34
34
35
35
## Noun Interpretation
36
36
37
-
* LDAP: Lightweight directory access protocol that enables centralized management of account passwords.
37
+
* LDAP: Lightweight Directory Access Protocol that enables centralized management of account passwords.
38
38
* Privilege: Permissions act on nodes, databases or tables. Different permissions represent different permission to operate.
39
39
* Role: Doris can create custom named roles. A role can be thought of as a collection of permissions.
40
40
@@ -81,7 +81,7 @@ and the LDAP administrator password needs to be set using sql statements.
81
81
LDAP administrator account "Distinguished Name". When a user logs into Doris using LDAP authentication, Doris will bind the administrator account to search for user information in LDAP.
82
82
83
83
* ldap_user_basedn = ou=people,dc=domain,dc=com
84
-
Doris base dn when searching for user information in LDAP,For example, only user2 in the above example is allowed to log in to Doris, which is configured as ou=ou2, dc=example, dc=com. If user1, user2, and user3 in the above example are allowed to log in to Doris, which is configured as dc=example, dc=com
84
+
Doris base DN(Distinguished Name) when searching for user information in LDAP,For example, only user2 in the above example is allowed to log in to Doris, which is configured as ou=ou2, dc=example, dc=com. If user1, user2, and user3 in the above example are allowed to log in to Doris, which is configured as dc=example, dc=com
85
85
86
86
* ldap_user_filter = (&(uid={login}))
87
87
@@ -106,7 +106,7 @@ set ldap_admin_password = password('ldap_admin_password');
106
106
#### MySQL Client
107
107
Client-side LDAP authentication requires the mysql client-side explicit authentication plugin to be enabled. Logging into Doris using the command line enables the mysql explicit authentication plugin in one of two ways.
108
108
109
-
* Set the environment variable LIBMYSQL_ENABLE_CLEARTEXT_PLUGIN to value 1.
109
+
* Set the environment variable `LIBMYSQL_ENABLE_CLEARTEXT_PLUGIN` to value 1.
110
110
For example, in a linux or max environment you can use the command:
Copy file name to clipboardexpand all lines: docs/admin-manual/auth/user-privilege.md
+7-7
Original file line number
Diff line number
Diff line change
@@ -26,13 +26,13 @@ under the License.
26
26
27
27
# Authority Management
28
28
29
-
Doris's new privilege management system refers to Mysql's privilege management mechanism, achieves table-level fine-grained privilege control, role-based privilege access control, and supports whitelist mechanism.
29
+
Doris's new privilege management system refers to MySQL's privilege management mechanism, achieves table-level fine-grained privilege control, role-based privilege access control, and supports whitelist mechanism.
30
30
31
31
## Noun Interpretation
32
32
33
33
1. user_identity
34
34
35
-
In a permission system, a user is identified as a User Identity. User ID consists of two parts: username and userhost. Username is a user name, which is composed of English upper and lower case. Userhost represents the IP from which the user link comes. User_identity is presented as username@'userhost', representing the username from userhost.
35
+
In a permission system, a user is identified as a User Identity. User ID consists of two parts: username and userhost. Username is a user name, which is composed of English uppercase and lowercase. Userhost represents the IP from which the user link comes. User_identity is presented as username@'userhost', representing the username from userhost.
36
36
37
37
Another expression of user_identity is username@['domain'], where domain is the domain name, which can be resolved into a set of IPS by DNS . The final expression is a set of username@'userhost', so we use username@'userhost'to represent it.
38
38
@@ -42,7 +42,7 @@ Doris's new privilege management system refers to Mysql's privilege management m
42
42
43
43
3. Role
44
44
45
-
Doris can create custom named roles. Roles can be seen as a set of permissions. When a newly created user can be assigned a role, the role's permissions are automatically granted. Subsequent changes in the role's permissions will also be reflected in all user permissions that belong to the role.
45
+
Doris can create custom named roles. Roles can be seen as a set of permissions. When a newly created role can be assigned to a user, the role's permissions are automatically granted. Subsequent changes in the role's permissions will also be reflected in all user permissions that belong to the role.
46
46
47
47
4. user_property
48
48
@@ -172,7 +172,7 @@ The workload group has only one level:
172
172
173
173
## ADMIN /GRANT
174
174
175
-
ADMIN_PRIV and GRANT_PRIV have the authority of **"grant authority"** at the same time, which is more special. The operations related to these two privileges are described here one by one.
175
+
ADMIN_PRIV and GRANT_PRIV have the authority of **"grant authority"** at the same time, which is more special. The operations related to these two privileges are described here individually.
176
176
177
177
1. CREATE USER
178
178
@@ -247,7 +247,7 @@ ADMIN_PRIV and GRANT_PRIV have the authority of **"grant authority"** at the sam
247
247
248
248
5. Forget passwords
249
249
250
-
If you forget your password and cannot log in to Doris, you can add `skip_localhost_auth_check` in fe config and restart FE so that logging to Doris without a password in localhost.
250
+
If you forget your password and cannot log in to Doris, you can add `skip_localhost_auth_check` in fe config and restart FE so that login to Doris without a password in localhost.
251
251
252
252
`skip_localhost_auth_check = true`
253
253
@@ -267,7 +267,7 @@ ADMIN_PRIV and GRANT_PRIV have the authority of **"grant authority"** at the sam
267
267
268
268
All privileges are given to a `current_user`, and the real user has all the privileges of the corresponding `current_user`.
269
269
270
-
`SELECT session_user()` is supported , which is having same behaviour as user() function.
270
+
`SELECT session_user()` is supported , which is having same behavior as user() function.
271
271
272
272
10. Password Validation
273
273
@@ -289,7 +289,7 @@ Here are some usage scenarios of Doris privilege system.
289
289
290
290
3. Blacklist
291
291
292
-
Doris itself does not support blacklist, only whitelist, but we can simulate blacklist in some way. Suppose you first create a user named `user@'192.%'`, which allows users from `192.*` to login. At this time, if you want to prohibit users from `192.168.10.1` from logging in, you can create another user with `cmy@'192.168.10.1'` and set a new password. Since `192.168.10.1` has a higher priority than `192.%`, user can no longer login by using the old password from `192.168.10.1`.
292
+
Doris itself does not support blacklist, only whitelist, but we can simulate blacklist in some way. Suppose you first create a user named `user@'192.%'`, which allows users from `192.*` to login. At this time, if you want to prohibit users from `192.168.10.1` from logging in, you can create another user with `user@'192.168.10.1'` and set a new password. Since `192.168.10.1` has a higher priority than `192.%`, user can no longer login by using the old password from `192.168.10.1`.
Copy file name to clipboardexpand all lines: docs/admin-manual/cluster-management/fqdn.md
+3-5
Original file line number
Diff line number
Diff line change
@@ -28,16 +28,14 @@ under the License.
28
28
29
29
This article introduces how to enable the use of Apache Doris based on FQDN (Fully Qualified Domain Name). FQDN is the complete domain name of a specific computer or host on the Internet.
30
30
31
-
After Doris supports FQDN, communication between nodes is entirely based on FQDN. When adding various types of nodes, the FQDN should be directly specified. For example, the command to add a BE node is' ALTER SYSTEM ADD BACKEND "be_host:heartbeat_service_port",
32
-
33
-
'be_host' was previously the IP address of the BE node. After starting the FQDN, be_host should specify the FQDN of the BE node.
31
+
After Doris supports FQDN, communication between nodes is entirely based on FQDN. When adding various types of nodes, the FQDN should be directly specified. For example, the command to add a BE node is' ALTER SYSTEM ADD BACKEND "be_host:heartbeat_service_port", 'be_host' was previously the IP address of the BE node. After starting the FQDN, be_host should specify the FQDN of the BE node.
34
32
35
33
## Preconditions
36
34
37
35
1. fe.conf file set `enable_fqdn_mode = true`.
38
36
2. All machines in the cluster must be configured with a host name.
39
37
3. The IP address and FQDN corresponding to other machines in the cluster must be specified in the '/etc/hosts' file for each machine in the cluster.
40
-
4./The etc/hosts file cannot have duplicate IP addresses.
38
+
4. The /etc/hosts file cannot have duplicate IP addresses.
41
39
42
40
## Best Practices
43
41
@@ -54,7 +52,7 @@ After Doris supports FQDN, communication between nodes is entirely based on FQDN
54
52
172.22.0.5 be2
55
53
172.22.0.6 be3
56
54
```
57
-
4. Verification: It can 'ping fe2' on FE1, and can resolve the correct IP address and ping it, indicating that the network environment is available.
55
+
4. Verification: you can 'ping fe2' on FE1, and can resolve the correct IP address and ping it, indicating that the network environment is available.
58
56
5. fe.conf settings for each FE node ` enable_ fqdn_ mode = true`.
0 commit comments