Average Ratings 0 Ratings
Average Ratings 0 Ratings
Description
The Knox API Gateway functions as a reverse proxy, prioritizing flexibility in policy enforcement and backend service management for the requests it handles. It encompasses various aspects of policy enforcement, including authentication, federation, authorization, auditing, dispatch, host mapping, and content rewriting rules. A chain of providers, specified in the topology deployment descriptor associated with each Apache Hadoop cluster secured by Knox, facilitates this policy enforcement. Additionally, the cluster definition within the descriptor helps the Knox Gateway understand the structure of the cluster, enabling effective routing and translation from user-facing URLs to the internal workings of the cluster. Each secured Apache Hadoop cluster is equipped with its own REST APIs, consolidated under a unique application context path. Consequently, the Knox Gateway can safeguard numerous clusters while offering REST API consumers a unified endpoint for seamless access. This design enhances both security and usability by simplifying interactions with multiple backend services.
Description
Knox serves as a secret management platform designed for the secure storage and rotation of sensitive information such as secrets, keys, and passwords utilized by various services. Within Pinterest, a multitude of keys and secrets are employed for diverse functions, including signing cookies, encrypting sensitive data, securing the network through TLS, accessing AWS machines, and facilitating communication with third-party services, among others. The risk of these keys being compromised posed significant challenges, as the process of rotation typically required a deployment and often necessitated changes to the codebase. Previously, keys and secrets at Pinterest were stored in Git repositories, leading to their replication across the company's infrastructure and presence on numerous employee laptops, which made tracking access and auditing who had permission to use these keys virtually impossible. To address these issues, Knox was developed with the intention of simplifying the process for developers to securely access and utilize confidential secrets, keys, and credentials. It also ensures the confidentiality of these sensitive elements while providing robust mechanisms for key rotation in the event of a security breach, thereby enhancing overall security practices. By implementing Knox, Pinterest aims to streamline secret management processes while fortifying its defenses against potential vulnerabilities.
API Access
Has API
API Access
Has API
Integrations
Apache Flink
Apache HBase
Apache Hadoop YARN
Apache Hive
Apache Ranger
Apache Solr
Apache Storm
Cloudera
Docker
Hadoop
Integrations
Apache Flink
Apache HBase
Apache Hadoop YARN
Apache Hive
Apache Ranger
Apache Solr
Apache Storm
Cloudera
Docker
Hadoop
Pricing Details
No price information available.
Free Trial
Free Version
Pricing Details
No price information available.
Free Trial
Free Version
Deployment
Web-Based
On-Premises
iPhone App
iPad App
Android App
Windows
Mac
Linux
Chromebook
Deployment
Web-Based
On-Premises
iPhone App
iPad App
Android App
Windows
Mac
Linux
Chromebook
Customer Support
Business Hours
Live Rep (24/7)
Online Support
Customer Support
Business Hours
Live Rep (24/7)
Online Support
Types of Training
Training Docs
Webinars
Live Training (Online)
In Person
Types of Training
Training Docs
Webinars
Live Training (Online)
In Person
Vendor Details
Company Name
Apache Software Foundation
Founded
1999
Country
United States
Website
knox.apache.org
Vendor Details
Company Name
Founded
2009
Country
United States
Website
github.com/pinterest/knox
Product Features
API Management
API Design
API Lifecycle Management
Access Control
Analytics
Dashboard
Developer Portal
Testing Management
Threat Protection
Traffic Control
Version Control
Product Features
Privileged Access Management
Application Access Control
Behavioral Analytics
Credential Management
Endpoint Management
For MSPs
Granular Access Controls
Least Privilege
Multifactor Authentication
Password Management
Policy Management
Remote Access Management
Threat Intelligence
User Activity Monitoring