Enabling Kerberos Authentication Without the Wizard
Required Role: Full Administrator (for some steps), Configurator, or Cluster Manager
Whether you integrate Cloudera Manager cluster with Kerberos using the wizard or by following the manual steps below, the same requirements and pre-requisites apply. See Enabling Kerberos Authentication Using the Wizard for details. Also see Step 4: Enabling Kerberos Using the Wizard for Kerberos version information.
The following are the general steps for integrating Kerberos with Cloudera Manager:
- Step 1: Install Cloudera Manager and CDH
- Step 2: If You are Using AES-256 Encryption, Install the JCE Policy File
- Step 3: Get or Create a Kerberos Principal for the Cloudera Manager Server
- Step 4: Import KDC Account Manager Credentials
- Step 5: Configure the Kerberos Default Realm in the Cloudera Manager Admin Console
- Step 6: Stop All Services
- Step 7: Enable Hadoop Security
- Step 8: Wait for the Generate Credentials Command to Finish
- Step 9: Enable Hue to Work with Hadoop Security using Cloudera Manager
- Step 10: (Flume Only) Use Substitution Variables for the Kerberos Principal and Keytab
- Step 11: Start All Services
- Step 12: Deploy Client Configurations
- Step 13: Create the HDFS Superuser Principal
- Step 14: Get or Create a Kerberos Principal for Each User Account
- Step 15: Prepare the Cluster for Each User
- Step 16: Verify that Kerberos Security is Working
- Step 17: (Optional) Enable Authentication for HTTP Web Consoles for Hadoop Roles