Creating a Principal in Active Directory
Check the Microsoft documentation for specific details for your Active Directory KDC. The general process is as follows:
- Create an Organizational Unit (OU) in your Active Directory KDC service that will contain the principals for use by the Cloudera cluster.
-
Add a new user account to Active Directory, for example,
username@EXAMPLE.COM
. Set the password for the user to never expire. - Use the Delegate Control wizard in Active Directory to grant this new user permission to Create, Delete, and Manage User Accounts in the OU created in step 1. Make sure that these permissions are only applied to that specific OU, and nowhere else.
Creating a Principal in an MIT KDC
For MIT Kerberos, administrator principals are defined
in the /var/kerberos/krb5kdc/kadm5.acl
file on the KDC host. The
default entry
is:
*/admin@EXAMPLE.COM *
In
this example, principals that include the instance name admin
designate
a user account as an administrator, such as
jdoe/admin@EXAMPLE.COM
.
If
you modify the kadm5.acl
file, such as replacing
EXAMPLE.COM
with your realm name, make sure to restart the
kadmin
service:
- RHEL 7
Compatible:
systemctl restart kadmin
- All
Others:
service kadmin restart
Create the Cloudera Manager Server administrator principal as
shown below, using the admin
instance name and your realm name. If your
kadm5.acl
file defines a different pattern for administrators, make
sure that the principal you create matches that pattern.
For MIT Kerberos KDC on a remote host:
kadmin kadmin: addprinc -pw password cloudera-scm/admin@EXAMPLE.COMFor MIT Kerberos KDC on the local host:
kadmin.local kadmin.local: addprinc -pw password cloudera-scm/admin@EXAMPLE.COM