Configuring Kerberos Authentication for Impala
Requirements for Using Impala with Kerberos
Impala supports the Cloudera ODBC driver and the Kerberos interface provided. To use Kerberos through the ODBC driver, the host type must be set depending on the level of the ODBD driver:
SecImpalafor the ODBC 1.0 driver.
SecBeeswaxfor the ODBC 1.2 driver.
- Blank for the ODBC 2.0 driver or higher, when connecting to a secure cluster.
HS2NoSaslfor the ODBC 2.0 driver or higher, when connecting to a non-secure cluster.
Enabling Kerberos in Impala-shell
To enable Kerberos in the Impala shell, start the
impala-shell command using the
Enabling Access to Internal Impala APIs for Kerberos Users
For applications that need direct access to Impala
APIs, without going through the HiveServer2 or Beeswax interfaces, you
can specify a list of Kerberos users who are allowed to call those APIs.
By default, the
are the only ones authorized for this kind of access. Any users not
explicitly authorized through the
internal_principals_whitelist configuration setting
are blocked from accessing the APIs. This setting applies to all the
Impala-related daemons, although currently it is primarily used for HDFS
to control the behavior of the catalog server.
Customizing Kerberos Principals for Impala
In Cloudera Manager, click Clusters > Impala to go to the Impala service.
Click the Configuration tab.
Select Scope > Impala (Service-Wide).
In the Kerberos Principal field, add the custom Kerberos principal name to be used by all roles of this service.
Click Save Changes.
After setting the new kerberos principal name, restart stale services.
Mapping Kerberos Principals to Short Names for Impala
Impala can support the additional mapping rules that will be inserted before rules generated from the list of trusted realms and before the default rule. The support is disabled by default in Impala.
To enable mapping Kerberos principals to short names:
- In Cloudera Manager, select the Impala service.
- In the Configuration tab, select Impala (Service-Wide) in Scope and Advanced in Category.
- Select the Use HDFS Rules to Map Kerberos Principals to Short Names field.
- Click Save Changes, and restart the Impala service.