Configuration of the local security¶
What are the sudo authorizations?¶
When you install impersonation, DSS adds a sudoers rule in /etc/sudoers.d/dataiku-dss-THE_DSS_USER-RANDOM_STRING
Note
If DSS could not install this sudoers rule, the impersonation setup asks you to do it manually
This rule allows DSS to run, as root, a small wrapper which is used:
To execute user-submitted code as the end-user UNIX accounts
To change permissions and ownerships on various files required by user-submitted code
No user-submitted code runs as root. The wrapper (also called the security module) has a specific configuration to limit which users it may run as.
Configuration of the local security module¶
When DSS runs a command on behalf of an end-user, it consults the security module configuration in /etc/dataiku-security/INSTALL_ID/security/security-config.ini
.
This ini file contains two important information:
Which user groups it may change identity to. This is configured in
[users]
, in theallowed_user_groups
settings.Where DSS is located. DSS will not change any file permissions outside of this directory, unless explicitly allowed as stated below.
Splitted DSS datadirs¶
In some configurations, you might have “splitted” your DSS datadir, by using symbolic links.
To allow the security module to change file permissions in the additional locations, fill in the additional_allowed_file_dirs
in the dirs
section.