Configuring Cloudera Manager to Use LDAPS🔗
- Copy the CA certificate file to the Cloudera Manager Server host.
-
Import the CA certificate(s) from the CA certificate file to the local truststore.
The default truststore is located in the
$JAVA_HOME/jre/lib/security/cacerts
file.This contains the default CA information shipped with the JDK. Create an alternate default file calledjssecacerts
in the same location as thecacerts
file. You can now safely append CA certificates for any private or public CAs not present in the defaultcacerts
file, while keeping the original file intact.For our example, we will follow this recommendation by copying the defaultcacerts
file into the newjssecacerts
file, and then importing the CA certificate to this alternate truststore.cp $JAVA_HOME/jre/lib/security/cacerts $JAVA_HOME/jre/lib/security/jssecacerts
$ /usr/java/latest/bin/keytool -import -alias nt_domain_name -keystore /usr/java/latest/jre/lib/security/jssecacerts -file path_to_CA_cert
Alternatively, you can use the Java options:
javax.net.ssl.trustStore
andjavax.net.ssl.trustStorePassword
. Open the/etc/default/cloudera-scm-server
file and add the following options:export CMF_JAVA_OPTS="-Xmx2G -XX:MaxPermSize=256m -XX:+HeapDumpOnOutOfMemoryError -XX:HeapDumpPath=/tmp -Djavax.net.ssl.trustStore=/usr/java/default/jre/lib/security/jssecacerts -Djavax.net.ssl.trustStorePassword=changeit"
-
Configure the LDAP URL property to use
ldaps://ldap_server
instead ofldap://ldap_server
- Restart the Cloudera Manager Server.