4.2. Configure the AD Domain on the KDC and Hadoop Cluster Hosts

Add the AD domain as a realm to the krb5.conf on the Hadoop cluster hosts. Optionally configure encryption types and UDP preferences.

  1. Open the krb5.conf file with a text editor and make the following changes:

    1. To libdefaults, add the following properties:

      Sets the Hadoop realm as default:

      [libdefaults]
      default_domain = $hadoop.realm

      Set the encryption type:

      [libdefaults]
      default_tkt_enctypes = $encryption_types
      default_tgs_enctypes = $encryption_types
      permitted_enctypes = $encryption_types

      where the $encryption_types match the type supported by your environment. For example:

      default_tkt_enctypes = aes256-cts aes128-cts rc4-hmac arcfour-hmac-md5 des-cbc-md5 des-cbc-crc
      default_tgs_enctypes = aes256-cts aes128-cts rc4-hmac arcfour-hmac-md5 des-cbc-md5 des-cbc-crc
      permitted_enctypes = aes256-cts aes128-cts rc4-hmac arcfour-hmac-md5 des-cbc-md5 des-cbc-crc

      If TCP is open on the KDC and AD Server:

      [libdefaults]
      udp_preference_limit = 1
    2. Add a realm for the AD domain:

      [realms]
      $AD.DOMAIN = {
        kdc = $AD-host-FQDN
        admin_server = $AD-host-FQDN
        default_domain = $AD-host-FQDN
      }
    3. Save the krb5.conf the changes to all Hadoop Cluster hosts.

  2. Add the trust principal for the AD domain to the Hadoop MIT KDC:

    kadmin
    kadmin:  addprinc krbtgt/$hadoop.realm@$AD.domain

    This command will prompt you for the trust password, use the same password as the earlier step.

    [Note]Note

    If the encryption type was defined, then use the following command to configure the AD principal:

    kadmin:  addprinc -e "$encryption_type"  krbtgt/$hadoop.realm@$AD.domain

loading table of contents...