Enabling Kerberos Authentication for CDH
Required Role: Cluster Administrator or Full Administrator
Cloudera Manager provides a wizard for integrating your organization's Kerberos instance with your cluster to provide authentication services.
Kerberos must already be deployed in your organization and the Kerberos key distribution center (KDC) must be ready to use, with a realm established. If you are using Red Hat Identity Management/FreeIPA, all of your cluster hosts must already be joined to the IPA domain. For Hue and Oozie, the Kerberos realm must support renewable tickets.
- For more information about MIT Kerberos, see MIT Kerberos home and MIT Kerberos 5 Release 1.8.6 documentation.
- For more information about Red Hat Identity Management (IdM), see Linux Domain Identity, Authentication, and Policy Guide in the RHEL 7 documentation or Identity Management Guide in the RHEL 6 documentation.
- For more information about using Active Directory as a KDC, see Using a Centralized Active Directory Service and Microsoft Active Directory documentation .
For Active Directory, you must have administrative privileges to the Active Directory instance for initial setup and for on-going management, or you will need to have the help of your AD administrator prior to and during the integration process. For example, administrative access is needed to access the Active Directory KDC, create principals, and troubleshoot Kerberos TGT/TGS-ticket-renewal and take care of any other issues that may arise.
For Red Hat IdM, make sure that all cluster hosts are joined to the IPA domain. You can join a host to the domain by installing the freeipa-client package and then running the ipa-client-install script.
OS | Packages Required |
---|---|
RHEL 7 Compatible, RHEL 6 Compatible |
|
SLES |
|
Ubuntu |
|
Windows |
|
Cloudera supports the Kerberos version that ships with each supported operating system listed in CDH and Cloudera Manager Supported Operating Systems.