<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Looking for information on security design on how JDBC connections to clusters function in Data Engineering</title>
    <link>https://community.databricks.com/t5/data-engineering/looking-for-information-on-security-design-on-how-jdbc/m-p/21182#M14400</link>
    <description>&lt;P&gt;JDBC connections to the Spark clusters work using the Spark thrift server protocol.  The connections are secure because the authentication is performed from the control plane using the API gateway and the requests which are authenticated are passed to the Spark cluster to establish the thrift server connectivity. &lt;/P&gt;</description>
    <pubDate>Thu, 24 Jun 2021 00:05:38 GMT</pubDate>
    <dc:creator>brickster_2018</dc:creator>
    <dc:date>2021-06-24T00:05:38Z</dc:date>
    <item>
      <title>Looking for information on security design on how JDBC connections to clusters function</title>
      <link>https://community.databricks.com/t5/data-engineering/looking-for-information-on-security-design-on-how-jdbc/m-p/21181#M14399</link>
      <description>&lt;P&gt;I am looking for more information around the security design around how JDBC connections to clusters function:&lt;/P&gt;&lt;UL&gt;&lt;LI&gt;What security controls are in operation to safeguard the Databricks clusters?&lt;/LI&gt;&lt;LI&gt;Is the API gateway abstracted from the Databricks cluster in that interface for the cluster is not presented to internet?&lt;/LI&gt;&lt;/UL&gt;&lt;P&gt;&lt;/P&gt;</description>
      <pubDate>Wed, 23 Jun 2021 21:32:32 GMT</pubDate>
      <guid>https://community.databricks.com/t5/data-engineering/looking-for-information-on-security-design-on-how-jdbc/m-p/21181#M14399</guid>
      <dc:creator>User16826987838</dc:creator>
      <dc:date>2021-06-23T21:32:32Z</dc:date>
    </item>
    <item>
      <title>Re: Looking for information on security design on how JDBC connections to clusters function</title>
      <link>https://community.databricks.com/t5/data-engineering/looking-for-information-on-security-design-on-how-jdbc/m-p/21182#M14400</link>
      <description>&lt;P&gt;JDBC connections to the Spark clusters work using the Spark thrift server protocol.  The connections are secure because the authentication is performed from the control plane using the API gateway and the requests which are authenticated are passed to the Spark cluster to establish the thrift server connectivity. &lt;/P&gt;</description>
      <pubDate>Thu, 24 Jun 2021 00:05:38 GMT</pubDate>
      <guid>https://community.databricks.com/t5/data-engineering/looking-for-information-on-security-design-on-how-jdbc/m-p/21182#M14400</guid>
      <dc:creator>brickster_2018</dc:creator>
      <dc:date>2021-06-24T00:05:38Z</dc:date>
    </item>
    <item>
      <title>Re: Looking for information on security design on how JDBC connections to clusters function</title>
      <link>https://community.databricks.com/t5/data-engineering/looking-for-information-on-security-design-on-how-jdbc/m-p/21183#M14401</link>
      <description>&lt;P&gt;In fact, I have no idea what kind of design we are talking about, it causes associations with &lt;A href="https://openceilings.nl/product/" alt="https://openceilings.nl/product/" target="_blank"&gt;Cloud Ceilings&lt;/A&gt;&lt;/P&gt;</description>
      <pubDate>Tue, 19 Apr 2022 07:49:14 GMT</pubDate>
      <guid>https://community.databricks.com/t5/data-engineering/looking-for-information-on-security-design-on-how-jdbc/m-p/21183#M14401</guid>
      <dc:creator>Albina228</dc:creator>
      <dc:date>2022-04-19T07:49:14Z</dc:date>
    </item>
  </channel>
</rss>

