Customizing Kerberos Principals

The custom Kerberos principals is an advanced optional feature that allows you to customize the Kerberos principals for the Accumulo service. Learn how to customize the Kerberos principals in the Cloudera Manager.

  • Cloudera Manager configures CDP services to use the default Kerberos principal names. Cloudera recommends not changing the default Kerberos principal. Do not change the Kerberos principal for existing clusters and services.
  • If your security policies require you to customize the Kerberos principals for services, contact Cloudera Professional Services for additional help. Configuring the recommended solution requires extra steps and automation outside CDP to succeed.
  • Use the following steps only when adding a new service to a new cluster created by enabling custom Kerberos principals using Cloudera Manager. Customizing a system username is not supported at the moment.
  • Ensure that you are using the latest version of Cloudera Manager. The minimum supported version is CM 7.11.3.0.
  • Before customizing the Kerberos principals in the Cloudera Manager, enable the feature flag for custom Kerberos principals before setting up the cluster. See Enabling feature flag for Custom Kerberos Principals and System Users.
  • Before adding a new service with custom Kerberos principal, you must use the Ranger UI and update the appropriate policies.
  • Add the following auth-to-local rule in the Additional Rules to Map Kerberos Principals to Short Names property in the HDFS service using Cloudera Manager.
    RULE:[2:$1/$2@$0](<custom_accumulo_princiapl>/.*@<realm_name>)s/.*/accumulo/

    Replace the <custom_accumulo_princiapl> and <realm_name> options with the actual values you plan to use during the Accumulo installation.

    For more information on adding the auth-to-local rule, see Using auth-to-local rules to isolate cluster users.

  1. Navigate to Custom Kerberos Principals and System Users after the Review Changes operation, for customizing the Kerberos principals.


  2. Select the Customize Kerberos Principals option as seen in the following figure.


  3. Update the Kerberos principal for services.
    You can change the names as required. You must use the same name for a Kerberos principal already set in the auth-to-local configuration. For example, use accumulo-2 as a principal value.
  4. Click Generate Dependent Configurations.
  5. Click Continue.