Security
Also available as:
PDF
loading table of contents...

Contents

1. Enabling Kerberos
Installing and Configuring the KDC
Use an Existing MIT KDC
Use an Existing Active Directory
Use Manual Kerberos Setup
(Optional) Install a new MIT KDC
Installing the JCE
Install the JCE
Enabling Kerberos on Ambari
Cluster Component Configuration Updates
2. NiFi Authentication
Enabling SSL with a NiFi Certificate Authority
Enabling SSL with Existing Certificates
(Optional) Setting Up Identity Mapping
Generating Client Certificates
Logging into NiFi After Enabling SSL
3. Configuring NiFi Authentication and Proxying with Apache Knox
Configuring NiFi for Knox Authentication
Configuring Knox for NiFi
Creating Knox Certificates using the TLS Toolkit
Creating Certificates for Knox
Verify the Knox NiFi Service Configuration
Creating an Advanced Topology
Configuring Knox SSO
Adding a NiFi Policy for Knox
Adding a Policy Using NiFi
Adding a Policy Using Ranger
Accessing NiFi Using Knox
4. SAM Authentication
Logging into SAM for the First Time
Logging In as a Different User
5. Installing Ranger
Ranger Installation Prerequisites
Setting up Databases for Ranger
Configuring MySQL for Ranger
Configuring PostgreSQL for Ranger
Configuring Oracle for Ranger
Installing Ranger
Start the Installation
Customize Services
Complete the Ranger Installation
Advanced Usersync Settings
Configuring Ranger for LDAP SSL
Setting up Database Users Without Sharing DBA Credentials
Updating Ranger Admin Passwords
Enabling Ranger Plugins
Configuring NiFi to Use Ranger for Managing Group Based Access Policies
Adding Users to Ranger
6. Authorization with Ranger
Creating Policies for NiFi Access
Creating Policies to View NiFi
Allowing Users Read and Write Access
Create a Kafka Policy
Create a Storm Policy
7. NiFi Authorization
Authorizer Configuration
Authorizers.xml Setup
Initial Admin Identity (New NiFi Instance)
Legacy Authorized Users (NiFi Instance Upgrade)
Cluster Node Identities
Configuring Users & Access Policies
Creating Users and Groups
Access Policies
Access Policy Configuration Examples
8. SAM Authorization
Roles and Permissions
Creating Users and Assigning Them to Roles
Sharing Resources
Sharing an Environment
Sharing an Application
SAM Authorization Limitations
9. Deploying SAM Applications in a Secure Cluster
Connecting to a Secure Service that Supports Delegation Tokens
Connecting to Secure Kafka
Securing SAM – An End-to-End Workflow
Understanding the End-to-End Workflow