Step 4: Get or Create a Kerberos Principal and Keytab File for the Cloudera Manager Server
In order to create and deploy the host principals and keytabs on your cluster, the Cloudera Manager Server must have the correct Kerberos principal and keytab file. Specifically, the Cloudera Manager Server must have a Kerberos principal that has administrator privileges. Typically, principals with the second component of admin in the principal name (for example, username/admin@YOUR-LOCAL-REALM.com) have administrator privileges. This is why admin is shown in the following instructions and examples.
- Ask your Kerberos administrator to create a Kerberos administrator principal and keytab file for the Cloudera Manager Server. After you get the Cloudera Manager Server keytab file from your administrator, proceed to Step 5: Deploying the Cloudera Manager Server Keytab.
- Create the Kerberos principal and keytab file for the Cloudera Manager Server yourself by using the following instructions in this step.
The instructions in this section illustrate an example of creating the Cloudera Manager Server principal and keytab file for MIT Kerberos. (If you are using another version of Kerberos, refer to your Kerberos documentation for instructions.)
To create the Cloudera Manager Server principal and keytab:
- In the kadmin.local or kadmin shell, type the following command to create the Cloudera Manager Server principal, replacing YOUR-LOCAL-REALM.COM with the name of your realm:
kadmin: addprinc -randkey cloudera-scm/admin@YOUR-LOCAL-REALM.COM
- Create the Cloudera Manager Server cmf.keytab file:
kadmin: xst -k cmf.keytab cloudera-scm/admin@YOUR-LOCAL-REALM.COM
Important: The Cloudera Manager Server keytab file must be named cmf.keytab because that name is hard-coded in Cloudera Manager.
<< Step 3: If You are Using AES-256 Encryption, Install the JCE Policy File | Step 5: Deploying the Cloudera Manager Server Keytab >> | |