Jan Kunigk and Paul Wilkinson show how to secure Solr collections:
The policy shown below establishes four Sentry roles based on the
admin
,operators
,users
, andtechusers
groups.
-
Administrators are entitled to all actions.
-
Operators are granted update and query privileges.
-
Users are granted query privileges.
-
Tech users are granted update privileges.
These are pretty straightforward role-based access controls. The authors also look at accessing the data via Flume and a couple other technologies.