Securing Starburst Enterprise

Cast: Dain Sundstrom and Manfred Moser

Video date: August 26, 2020

Running time:

Abstract: This training session is geared towards helping Starburst Enterprise users securely deploy Starburst Enterprise at scale. We cover how to secure Starburst Enterprise as well as access to your underlying data.

Product: Starburst Enterprise

Description

This training session is geared towards helping Starburst Enterprise platform (SEP) users securely deploy SEP at scale. We cover how to secure SEP as well as access to your underlying data. Delivered by Dain Sundstrom, this session covers the following topics:

  • Authentication, including password & LDAP Authentication
  • Authorization to access your data sources
  • Encryption including client-to-coordinator communication
  • Secure communication in the cluster
  • Secrets usage for configuration files including catalogs

Detailed topics with timestamps

Clicking the timestamp links below will take you to YouTube, or you can scrub to that timestamp in the video player above.

  • Welcome - 0:00
  • Tips and Notes - 5:06
    • Process for securing SEP - 7:34
    • What to secure - 11:02
    • Verify HTTP with the Web UI - 13:23
    • Verify HTTP with the CLI - 14:48
    • Client to Server Encryption - 15:44
      • Approaches for HTTPS - 15:58
      • HTTPS proxy or load balancer - 17:33
      • Add the SSL/TLS certificate to the coordinator - 20:28
        • Inspect the PEM file - 22:40
        • Verify the PEM file certificate - 23:45
        • Verify the PEM private key - 26:08
        • Verify the JKS file - 26:38
        • Configure SEP - 27:59
      • Verify HTTPS with the Web UI - 28:51
      • Verify HTTPS with the CLI - 29:36
    • Authentication - 34:57
      • Password file authentication - 36:08
      • LDAP Authentication - 41:19
      • Kerberos Authentication - 50:24
      • Client certificate authentication - 53:53
      • JSON Web Token authentication - 55:03
      • Multiple authenticators - 56:01
      • User mapping - 58:14
    • Authorization - 1:00:08
      • File-based system access control - 1:02:54
    • Client to server summary - 1:07:23
    • Internal security and connector security - 1:18:14
    • Internal HTTPS - 1:23:58
    • Secrets Management - 1:27:53
    • Management Endpoints - 1:30:23
    • Hive Catalog Security - 1:33:29