Versions Compared

Key

  • This line was added.
  • This line was removed.
  • Formatting was changed.
Comment: Task marked complete

...

  1. Key Management

  2. Secure impersonation
  3. Authorization of dataset and stream access
  4. Authorization for listing and viewing entities
  5. Ability to map a namespace to user-provided storage provider namespaces
  6. Cross-namespace dataset access
  7. Support long-running programs in secure (kerberos) mode

Checklist

  •  User stories documented (Rohit/Ali/Bhooshan)
  •  User stories reviewed (Nitin)
  •  Design documented (Rohit/Ali/Bhooshan)
  •  Design reviewed (Andreas)
  •  Feature merged (Rohit/Ali/Bhooshan)
  •  Examples and guides (Rohit)
  •  Integration tests (Ali) 
  •  Documentation for feature (Bhooshan)
  •  Blog post 

...