Capabilities of User Isolation Framework¶
Feature |
Without UIF |
With UIF |
---|---|---|
Access control on projects |
Yes |
Yes |
Access control on connections |
Yes |
Yes |
Enforcement of permissions to execute code |
Yes |
Yes |
Per-user credentials on SQL connections. |
No |
Yes |
Impersonation on Oracle. |
No |
Yes |
Impersonation on Microsoft SQL Server |
No |
Yes |
Execution of “regular” code (Python, R) locally |
Not isolated |
Isolated |
Execution of “regular” code (Python, R) on Kubernetes |
Isolated |
Isolated |
Execution of Spark code (Python, R, Scala) on YARN |
Not isolated |
Isolated |
Execution of Spark code (Python, R, Scala) on Kubernetes |
Not isolated |
Isolated |
Connecting to secure Hadoop clusters (Kerberos). |
Yes |
Yes |
HDFS ACLs to enforce permissions even against code execution |
No |
Yes |
Authentication against LDAP directory |
Yes |
Yes |
Authentication with Single-Sign-On |
Yes |
Yes |
Traceability of all actions, including code execution |
Yes |
Yes |
Non-repudiable audit log |
No |
Yes |
Hadoop-level traceability of individual actions. (Cloudera Navigator, Atlas, …) |
No |
Yes |
See the comparison of Dataiku DSS editions to determine what levels of security apply to your installation.