Welcome Guest! Log in
Due to some maintenance operations, stambia.org will be switched to read-only mode during the 13th November. It will be possible to read and download, but impossible to post on the forums or create new accounts. For any question please contact the support team.


The Kerberos security can be used in Stambia through a dedicated Metadata offering the possibility to define all the necessary information.

This article details how to create and configure it, and what are the available properties.

Prerequisites:
  • Stambia DI Designer S18.3.6 or higher
This Metadata is only supported in Hadoop technologies for the moment.

 

Metadata

The Kerberos Metadata allows to define global server properties and a list of Principal nodes representing Kerberos accounts.

Below is an example of a Kerberos Metadata containing the Principals for some services on an Hadoop secured cluster:

Server node

MetadataServer

 

Principal node

MetadataPrincipal

 

Metadata creation

Create first the Kerberos Metadata, as usual, by selecting the technology in the Metadata Creation Wizard:

MetadataNew

Click next, choose a name and click on finish.

 

Configuration of the server properties

You can now start configuring the server properties, which represent the global Kerberos properties shared with all the Principals.

MetadataServer

The following properties are available:

Property Mandatory Description Example
Kerberos Configuration File Path Yes

Path to the Kerberos configuration file.

This is a file usually named krb5.conf and which contains the location of the Kerberos server and necessary information to perform the Kerberos connection.

Note that this is a system property that is global and unique on the Java Virtual Machine.

You can only use one Configuration file at a time and changing it requires to restart the Designer / Runtime.

D:/kerberos/krb5.conf
Enable Kerberos Debug No

Optional debug property that allows to print more information in the Runtime and Designer console when performing Kerberos connections.

This can help to debug connection issues, as Kerberos will return more details and logs about the connection operations.

To launch the Designer console, start the Designer with stambia.exe -console

 
Java Security Debug Properties No

Optional comma separated list of debug values that should be returned by Java.

This specifies the java.security.debug Java property, which defines the debug logs that should be returned.

When you are debugging Kerberos connection issues, we advise to set it to the example value to get precise log information.

gssloginconfig,configfile,configparser,logincontext

 

Configuration of the Principals

In Kerberos, an account in called a 'Principal'.

In the Kerberos Metadata, you can add as many principals as required, representing your different services, organizations, ...

MetadataPrincipalWithRemote

To add a new Principal, right click on the server node and choose new > Kerberos Principal:

MetadataNewPrincipal

 

The following properties are available:

Property Mandatory Description Example
Name Yes

Logical label (alias) to identify the Principal.

hbase
Kerberos Principal Yes

Kerberos Principal name.

The Kerberos Principal must meet the standard Kerberos Principal syntax, which is as follow:

primary/instance@REALM

hbase/quickstart.cloudera@CLOUDERA
Kerberos Local Keytab File Path Yes

Local Path to the Keytab file associated to the Principal.

It must be reachable by the Designer / Runtime.

 D:/kerberos/hbase.keytab
Kerberos Remote Keytab File Path No

Optional remote Path to the Keytab file associated to the Principal.

Templates and tools that are launching commands over SSH on servers secured with Kerberos requires to perform a Kerberos connection on the server, before operating.

This property specifies the path of the Keytab on the remote server.

/home/cloudera/stambia/kerberos/hbase.keytab

 

 

 

You have no rights to post comments

Articles

Suggest a new Article!