Configuring Cloudera Manager to Use LDAPS🔗
- Copy the CA certificate file to the Cloudera Manager Server host.
-
Import the CA certificate(s) from the CA certificate file to the local truststore.
The default truststore is located in the
$JAVA_HOME/jre/lib/security/cacertsfile.This contains the default CA information shipped with the JDK. Create an alternate default file calledjssecacertsin the same location as thecacertsfile. You can now safely append CA certificates for any private or public CAs not present in the defaultcacertsfile, while keeping the original file intact.For our example, we will follow this recommendation by copying the defaultcacertsfile into the newjssecacertsfile, and then importing the CA certificate to this alternate truststore.cp $JAVA_HOME/jre/lib/security/cacerts $JAVA_HOME/jre/lib/security/jssecacerts$ /usr/java/latest/bin/keytool -import -alias nt_domain_name -keystore /usr/java/latest/jre/lib/security/jssecacerts -file path_to_CA_cert
Alternatively, you can use the Java options:
javax.net.ssl.trustStoreandjavax.net.ssl.trustStorePassword. Open the/etc/default/cloudera-scm-serverfile and add the following options:export CMF_JAVA_OPTS="-Xmx2G -XX:MaxPermSize=256m -XX:+HeapDumpOnOutOfMemoryError -XX:HeapDumpPath=/tmp -Djavax.net.ssl.trustStore=/usr/java/default/jre/lib/security/jssecacerts -Djavax.net.ssl.trustStorePassword=changeit" -
Configure the LDAP URL property to use
ldaps://ldap_serverinstead ofldap://ldap_server - Restart the Cloudera Manager Server.
