Skip to content

[Doc-17096] add the security model reqeust of Network Environment #17097

New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Merged
merged 2 commits into from
Apr 1, 2025
Merged
Show file tree
Hide file tree
Changes from all commits
Commits
File filter

Filter by extension

Filter by extension

Conversations
Failed to load comments.
Loading
Jump to
Jump to file
Failed to load files.
Loading
Diff view
Diff view
4 changes: 4 additions & 0 deletions docs/docs/en/contribute/join/security-model.md
Original file line number Diff line number Diff line change
Expand Up @@ -69,6 +69,10 @@ Apache DolphinScheduler supports four authentication methods: login with your ow

Administrator users can configure resources such as queues, tenants, users, alarm groups, worker groups, tokens, k8s clusters, k8s namespaces, etc. It is necessary to trust that the user's permission allocation, use, and maintenance of resources will not affect the platform and service itself.

## Network Environment

Apache DolphinScheduler's deployment and usage are based on the assumption that the user's network is secure and trustworthy. Apache DolphinScheduler does not address internal network cross-infiltration issues.

### Examples of Mistaken Security Vulnerabilities

The following are some erroneous vulnerabilities raised by users and developers in the past.
Expand Down
4 changes: 4 additions & 0 deletions docs/docs/zh/contribute/join/security-model.md
Original file line number Diff line number Diff line change
Expand Up @@ -67,6 +67,10 @@ Apache DolphinScheduler支持四种认证方式,自身账号密码登录,LDA

管理员用户可以配置队列、租户、用户、告警组、worker分组、令牌、k8s集群、k8s命名空间等资源,需要信用用户对资源的权限分配、使用、维护,都不会对平台和服务本身产生影响。

## 网络环境

Apache DolphinScheduler的部署和使用认为用户网络是安全和值得信任的,Apache DolphinScheduler不处理内网交叉渗透问题

### 误认为是安全漏洞的示例

以下是以往使用者和开发者提出的一些错误的漏洞情况。
Expand Down
Loading