Step 2: Install JCE policy files for AES-256 encryption
How to install JCE policy files, if required.
By default, CentOS and Red Hat Enterprise Linux 5.5 (and higher) use AES-256 encryption for Kerberos tickets, so the Java Cryptography Extension (JCE) Unlimited Strength Jurisdiction Policy Files must be installed on all cluster hosts as detailed below. Alternatively, the Kerberos instance can be modified to not use AES-256.
- Download the
jce_policy-<version>.zipfile from the Oracle website.
- Unzip the file.
- Follow the steps in
README.txtto install it.
- Log in to the Cloudera Manager Admin Console.
- Navigate to .
- Click Install Java Unlimited Strength Encryption Policy Files.
- Specify the repository location for your version of Cloudera Manager, and click Continue.
- Check the box labeled Install Oracle Java SE Development Kit (JDK 8), and then check the box labeled Install Java Unlimited Strength Encryption Policy Files. Click Continue.
- Provide cluster host login credentials, and then click Continue.
- After the installation completes, click Finish. If the Upgrade Cloudera Manager page displays, you can exit by clicking the Cloudera Manager logo to return to the home page.
- Remove any
aes256entries from the
supported_enctypesfield of the
- Restart the Kerberos KDC and the kadmin server so the changes take effect.
The keys of relevant principals, such as Ticket Granting Ticket principal (krbtgt/REALM@REALM), might need to change.
To verify the type of encryption used in your cluster:
- For MIT KDC: On the local KDC host, type this command in the kadmin.local or kadmin
shell to create a test principal:
kadmin: addprinc test
For Active Directory: Create a new AD account with the name,
- On a cluster host, type this command to start a Kerberos session as test:
- On a cluster host, type this command to view the encryption type in use:
If AES is being used, output like the following is displayed after you type the
klistcommand (note that
AES-256is included in the output):
Ticket cache: FILE:/tmp/krb5cc_0 Default principal: test@Cloudera Manager Valid starting Expires Service principal 05/19/11 13:25:04 05/20/11 13:25:04 krbtgt/Cloudera Manager@Cloudera Manager Etype (skey, tkt): AES-256 CTS mode with 96-bit SHA-1 HMAC, AES-256 CTS mode with 96-bit SHA-1 HMAC