Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

GCS / BigQuery user account impersonation support #1280

Open
cjac opened this issue Dec 16, 2024 · 0 comments
Open

GCS / BigQuery user account impersonation support #1280

cjac opened this issue Dec 16, 2024 · 0 comments

Comments

@cjac
Copy link
Contributor

cjac commented Dec 16, 2024

Please add test to exercise an authorization delegation use case

https://issuetracker.google.com/issues/384553523

500 data scientists
a lot of groups (100+)
cannot create 100 service accounts

When I create a cluster, it uses project service account

Instead, it should use my own credentials for interacting with GCS or BigQuery

The way it was working 1.5+ years ago

grant service account access to GCS bucket

when reads happen, read should be executed as my user, not the service account

authorization should be granted by groups

when I create a cluster, I should be able to access the next service using my own principal rather than granting the permissions to the service account.

for personal cluster, only I will have access to. Access will only come from my user. There is no shared concept in this personal cluster.

For general purpose (not personal cluster), access is determined at the time of request (GCS, BigQuery, whatever). The user who launched the job will be the user as whom the service requests are issued.

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

No branches or pull requests

1 participant