Configuring Kerberos Authentication for Active Directory
Configure Kerberos authentication for Active Directory on Big Data Service clusters.
Prerequisites
Before you configure an Active Directory as a KDC for the ODH cluster, the following prerequisites must be met:
- The ODH cluster host must have network access to and can resolve the DNS names of the domain controllers.
- Active Directory secure LDAP or LDAPS connectivity has been configured.
- Active Directory bind user and bind password.
The following is required for configuring Kerberos authentication using the Active Directory only approach.
- The Active Directory user container for the service principles has been created and is available. For example,
OU=Hadoop,OU=People,DC=apache,DC=org
. Active Directory administrative credentials with delegated control to create, delete, and manage user accounts on the user container are available.
Importing the Active Directory Certificate
.crt
file, key stores, and so on that are used by individual services. For example, Hue, Ranger, and Ambari. Manually Obtain Certificate from Active Directory (Windows)
- Login to the Active Directory server.
-
Run
mmc
. - Click File, and then select Add/Remove snapin.
- Click Certificates, and then select Service Account.
- Click Next.
- Click Local Computer, and then click Next.
- Click Active Directory Domain Services, and then click OK.
-
To locate the certificate corresponding to the root certificate:
-
Export the certificate located in the previous step:
-
The
.cer
file created in the previous step can be opened in Textpad to copy the base 64 encoded certificate content. Or, the.cer
file itself can be copied.