Contrary to the documentation of `druid-basic-auth` Ranger does not automatically provision a highly privileged
system system user and you will need to do this yourself. This system user in case of `druid-basic-auth` is named
`druid_system` and for the escalator it is configurable as shown above. Make sure to take note of these user names and
configure `READ` access to `state:STATE` and to `config:security` in your ranger policies,
otherwise system services will not work properly.
---
#### Properties to configure the extension in Apache Druid
|Property|Description|Default|required|
|--------|-----------|-------|--------|
|`druid.auth.ranger.keytab`|Defines the keytab to be used while authenticating against Apache Ranger to obtain policies and provide auditing|null|No|
|`druid.auth.ranger.principal`|Defines the principal to be used while authenticating against Apache Ranger to obtain policies and provide auditing|null|No|
|`druid.auth.ranger.use_ugi`|Determines if groups that the authenticated user belongs to should be obtained from Hadoop's `UserGroupInformation`|null|No|
### Configuring the connection to Apache Ranger
The Apache Ranger authorization extension will read several configuration files. Discussing the
the contents of those files is beyond the scope of this document. Depending on your needs you will
need to create them. The minimum you will need to have is a `ranger-druid-security.xml` file
that you will need to put in the classpath (e.g. `_common`). For auditing, the configuration is
in `ranger-druid-audit.xml`.
### Adding the service definition for Apache Druid to Apache Ranger
At the time of writing of this document Apache Ranger (2.0) does not include a service and
service definition yet. You can add the service definition to Apache Ranger by entering the following
You should get back `json` describing the service definition you just added. You can now go to the web
interface of Apache Ranger which should now include a widget for "Druid". Click the plus sign an create
the new service. Ensure your service name is equal to what you configured in `ranger-druid-security.xml`.
#### Configuring Apache Ranger policies
When installing a new Druid service inside Apache Ranger for the first time, Ranger will provision the policies
to allow the administrative user `read/write` access to all properties and data sources. You might want to limit this.
Do not forget to add the correct policies for the `druid_system` user and the `internalClientUserName` of the escalator.
---
**NOTE**
Loading new data sources requires `write` access to the `datasource` prior to the loading itself. So if you
want to create a datasource `wikipedia` you are required to have an `allow` policy inside Apache Ranger before
trying to load the spec.
---
## Usage
### HTTP methods
For information on what HTTP methods are supported on a particular request endpoint, please refer to the [API documentation](../../operations/api-reference.md).
GET requires READ permission, while POST and DELETE require WRITE permission.
### SQL Permissions
Queries on Druid datasources require DATASOURCE READ permissions for the specified datasource.
Queries on the [INFORMATION_SCHEMA tables](../../querying/sql.html#information-schema) will
return information about datasources that the caller has DATASOURCE READ access to. Other
datasources will be omitted.
Queries on the [system schema tables](../../querying/sql.html#system-schema) require the following permissions:
-`segments`: Segments will be filtered based on DATASOURCE READ permissions.
-`servers`: The user requires STATE READ permissions.
-`server_segments`: The user requires STATE READ permissions and segments will be filtered based on DATASOURCE READ permissions.
-`tasks`: Tasks will be filtered based on DATASOURCE READ permissions.
### Debugging
If you face difficulty grasping why access is denied to certain elements and the `audit` section in
Apache Ranger does not give you any detail, you can enable debug logging for `org.apache.druid.security.ranger`.
To do so add the following in your `log4j2.xml`:
```xml
<!-- Set level="debug" to see access requests to Apache Ranger -->