Hadoop Authentication with Kerberos for Cloudera Data Science Workbench
Cloudera Data Science Workbench users can authenticate themselves using Kerberos
against the cluster KDC defined in the host's /etc/krb5.conf
file.
Cloudera Data Science Workbench does not assume that your Kerberos principal is always the same as your login information. Therefore, you will need to make sure Cloudera Data Science Workbench knows your Kerberos identity when you sign in.
To authenticate against your cluster’s Kerberos KDC, go to the top-right dropdown menu, click Upload Keytab to upload the keytab file directly to Cloudera Data Science Workbench. Once successfully authenticated, Cloudera Data Science Workbench uses your stored credentials to ensure that you are secure when running your workloads.
, and enter your Kerberos principal. To authenticate, either enter your password or clickWhen you authenticate with Kerberos, Cloudera Data Science Workbench will store your keytab in an internal database. When you subsequently run an engine, the keytab is used by a Cloudera Data Science Workbench sidecar container to generate ticket-granting tickets for use by your code. Ticket-granting tickets allow you to access resources such as Spark, Hive, and Impala, on Kerberized CDH clusters.
While you can view your current ticket-granting ticket by typing
klist
in an engine terminal, there is no way for you or
your code to view your keytab. This prevents malicious code and users from
stealing your keytab.