<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>question Re: kerberos MIT kdc with active directory one way trust working in Support Questions</title>
    <link>https://community.cloudera.com/t5/Support-Questions/kerberos-MIT-kdc-with-active-directory-one-way-trust-working/m-p/208206#M170165</link>
    <description>&lt;P&gt;&lt;A rel="user" href="https://community.cloudera.com/users/70414/sparshsinghal.html" nodeid="70414"&gt;@Sparsh Singhal&lt;/A&gt; &lt;/P&gt;&lt;P&gt;Thanks for response and clear the point.&lt;/P&gt;&lt;P&gt;Let me test. Will get back to you.&lt;/P&gt;&lt;P&gt;Thanks&lt;/P&gt;</description>
    <pubDate>Tue, 05 Jun 2018 16:13:23 GMT</pubDate>
    <dc:creator>vinayk</dc:creator>
    <dc:date>2018-06-05T16:13:23Z</dc:date>
    <item>
      <title>kerberos MIT kdc with active directory one way trust working</title>
      <link>https://community.cloudera.com/t5/Support-Questions/kerberos-MIT-kdc-with-active-directory-one-way-trust-working/m-p/208200#M170159</link>
      <description>&lt;P&gt;Hi Folks,&lt;/P&gt;&lt;P&gt;I have configured MIT kdc which is integrated with Active directory according to referred link:&lt;/P&gt;&lt;P&gt;&lt;A href="https://community.hortonworks.com/articles/59635/one-way-trust-mit-kdc-to-active-directory.html" target="_blank"&gt;https://community.hortonworks.com/articles/59635/one-way-trust-mit-kdc-to-active-directory.html&lt;/A&gt;&lt;/P&gt;&lt;P&gt;My question is:&lt;/P&gt;&lt;P&gt;1. How can i test one way trust is successfully created or not?&lt;/P&gt;&lt;P&gt;2. Users will persist on AD server and services will persist on hadoop cluster. Should i have to create user principal in kerberos database?&lt;/P&gt;&lt;P&gt;3. If yes, Should be have to add principal in kerberos manually whenever new user created in AD server?&lt;/P&gt;&lt;P&gt;Regards,&lt;/P&gt;&lt;P&gt;Vinay&lt;/P&gt;</description>
      <pubDate>Fri, 16 Sep 2022 13:17:49 GMT</pubDate>
      <guid>https://community.cloudera.com/t5/Support-Questions/kerberos-MIT-kdc-with-active-directory-one-way-trust-working/m-p/208200#M170159</guid>
      <dc:creator>vinayk</dc:creator>
      <dc:date>2022-09-16T13:17:49Z</dc:date>
    </item>
    <item>
      <title>Re: kerberos MIT kdc with active directory one way trust working</title>
      <link>https://community.cloudera.com/t5/Support-Questions/kerberos-MIT-kdc-with-active-directory-one-way-trust-working/m-p/208201#M170160</link>
      <description>&lt;P&gt;&lt;A rel="user" href="https://community.cloudera.com/users/69412/testtest12p.html" nodeid="69412"&gt;@Vinay K&lt;/A&gt; &lt;/P&gt;&lt;P&gt;1. How can i test one way trust is successfully created or not?&lt;/P&gt;&lt;P&gt; &amp;gt; Try to access any kerberized services on your cluster with ticket from your AD. For example&lt;/P&gt;&lt;PRE&gt;kinit user@AD.REALM
hdfs dfs -ls /
# cluster is using mit kerberos in MIT.REAM wich is different thatn AD.REALM, only if one way trust is correctly configured the above will work&lt;/PRE&gt;&lt;P&gt;2. Users will persist on AD server and services will persist on hadoop cluster. Should i have to create user principal in kerberos database?&lt;/P&gt;&lt;P&gt;&amp;gt; No need to create user principals in kerberos database since you have them in AD&lt;/P&gt;&lt;P&gt;3. If yes, Should be have to add principal in kerberos manually whenever new user created in AD server?&lt;/P&gt;&lt;P&gt;&amp;gt; No, this will lead to duplicate users and will be very hard to maintain. Keep users in AD only.&lt;/P&gt;&lt;P&gt;HTH&lt;/P&gt;&lt;P&gt;*** If you found this answer addressed your question, please take a moment to login and click the "accept" link on the answer.&lt;/P&gt;</description>
      <pubDate>Mon, 04 Jun 2018 21:58:06 GMT</pubDate>
      <guid>https://community.cloudera.com/t5/Support-Questions/kerberos-MIT-kdc-with-active-directory-one-way-trust-working/m-p/208201#M170160</guid>
      <dc:creator>falbani</dc:creator>
      <dc:date>2018-06-04T21:58:06Z</dc:date>
    </item>
    <item>
      <title>Re: kerberos MIT kdc with active directory one way trust working</title>
      <link>https://community.cloudera.com/t5/Support-Questions/kerberos-MIT-kdc-with-active-directory-one-way-trust-working/m-p/208202#M170161</link>
      <description>&lt;A rel="user" href="https://community.cloudera.com/users/11048/falbani.html" nodeid="11048"&gt;@Felix Albani&lt;/A&gt;&lt;P&gt;I agree with 2nd and 3rd answer.&lt;/P&gt;&lt;P&gt;If we use user@AD.REALM for access kerberized service on cluster, how we define service access to user@AD.REALM?&lt;/P&gt;&lt;P&gt;As i know, We don't need to create any service principal at AD server. Just we have to create trust with AD servers.&lt;/P&gt;&lt;P&gt;Can you please help me to understand the concept?&lt;/P&gt;&lt;P&gt;Regards,&lt;/P&gt;&lt;P&gt;Vinay&lt;/P&gt;</description>
      <pubDate>Tue, 05 Jun 2018 00:05:29 GMT</pubDate>
      <guid>https://community.cloudera.com/t5/Support-Questions/kerberos-MIT-kdc-with-active-directory-one-way-trust-working/m-p/208202#M170161</guid>
      <dc:creator>vinayk</dc:creator>
      <dc:date>2018-06-05T00:05:29Z</dc:date>
    </item>
    <item>
      <title>Re: kerberos MIT kdc with active directory one way trust working</title>
      <link>https://community.cloudera.com/t5/Support-Questions/kerberos-MIT-kdc-with-active-directory-one-way-trust-working/m-p/208203#M170162</link>
      <description>&lt;P&gt;&lt;A rel="user" href="https://community.cloudera.com/users/69412/testtest12p.html" nodeid="69412"&gt;@Vinay K&lt;/A&gt; if one way trust is correctly configured user principals will be able to authenticate using user@AD.REALM. My understanding is now you are asking how then those UPN (user principals names) are going to be authorized by Hadoop services. For this you need to update the auth_to_local rules (in core-site.xml) and add rules for &lt;B&gt;user&lt;/B&gt;@AD.REALM to map to &lt;B&gt;user&lt;/B&gt;. Then you can set posix/authorization rules for this user (no longer UPN because it has been mapped using auth_to_local) using Ranger or regular hdfs posix permissions/service acl. &lt;/P&gt;&lt;P&gt;More here: &lt;A href="https://community.hortonworks.com/articles/14463/auth-to-local-rules-syntax.html" target="_blank"&gt;https://community.hortonworks.com/articles/14463/auth-to-local-rules-syntax.html&lt;/A&gt;&lt;/P&gt;&lt;P&gt;Note: Please comment on this post rather than creating a new answer thanks!&lt;/P&gt;</description>
      <pubDate>Tue, 05 Jun 2018 00:28:09 GMT</pubDate>
      <guid>https://community.cloudera.com/t5/Support-Questions/kerberos-MIT-kdc-with-active-directory-one-way-trust-working/m-p/208203#M170162</guid>
      <dc:creator>falbani</dc:creator>
      <dc:date>2018-06-05T00:28:09Z</dc:date>
    </item>
    <item>
      <title>Re: kerberos MIT kdc with active directory one way trust working</title>
      <link>https://community.cloudera.com/t5/Support-Questions/kerberos-MIT-kdc-with-active-directory-one-way-trust-working/m-p/208204#M170163</link>
      <description>&lt;P&gt;&lt;A href="https://community.hortonworks.com/users/69412/testtest12p.html"&gt;@Vinay K&lt;/A&gt;&lt;/P&gt;&lt;P&gt;In a one-way trust between a &lt;STRONG&gt;trusted domain&lt;/STRONG&gt; (AD Domain) and a &lt;STRONG&gt;trusting domain &lt;/STRONG&gt;(MIT KDC), users or computers in the trusted domain can access resources in the trusting domain. However, users in the trusting domain cannot access resources in the trusted domain.&lt;/P&gt;&lt;P&gt;So basically you tell your MIT KDC to trust the users in the AD to access resources in your cluster. Service access happens the same way as for MIT KDC users. Service will ask Kerberos to authenticate, if that user is authenticated to use that service, Kerberos will check the domain of the user and accordingly if that user is from a trusted domain, Kerberos will ask the AD/LDAP to authenticate and if AD authenticates, Kerberos trusts that user and so does your service.&lt;/P&gt;</description>
      <pubDate>Tue, 05 Jun 2018 01:57:25 GMT</pubDate>
      <guid>https://community.cloudera.com/t5/Support-Questions/kerberos-MIT-kdc-with-active-directory-one-way-trust-working/m-p/208204#M170163</guid>
      <dc:creator>sparsh_singhal</dc:creator>
      <dc:date>2018-06-05T01:57:25Z</dc:date>
    </item>
    <item>
      <title>Re: kerberos MIT kdc with active directory one way trust working</title>
      <link>https://community.cloudera.com/t5/Support-Questions/kerberos-MIT-kdc-with-active-directory-one-way-trust-working/m-p/208205#M170164</link>
      <description>&lt;P&gt;&lt;A rel="user" href="https://community.cloudera.com/users/11048/falbani.html" nodeid="11048"&gt;@Felix Albani&lt;/A&gt; &lt;/P&gt;&lt;P&gt;As i understand, My solution is hidden in "mapped using auth_to_local". I have to specify policy in HDFS configuration for provide services access to users based. &lt;/P&gt;&lt;P&gt;Correct me if i'm wrong.&lt;/P&gt;</description>
      <pubDate>Tue, 05 Jun 2018 16:11:39 GMT</pubDate>
      <guid>https://community.cloudera.com/t5/Support-Questions/kerberos-MIT-kdc-with-active-directory-one-way-trust-working/m-p/208205#M170164</guid>
      <dc:creator>vinayk</dc:creator>
      <dc:date>2018-06-05T16:11:39Z</dc:date>
    </item>
    <item>
      <title>Re: kerberos MIT kdc with active directory one way trust working</title>
      <link>https://community.cloudera.com/t5/Support-Questions/kerberos-MIT-kdc-with-active-directory-one-way-trust-working/m-p/208206#M170165</link>
      <description>&lt;P&gt;&lt;A rel="user" href="https://community.cloudera.com/users/70414/sparshsinghal.html" nodeid="70414"&gt;@Sparsh Singhal&lt;/A&gt; &lt;/P&gt;&lt;P&gt;Thanks for response and clear the point.&lt;/P&gt;&lt;P&gt;Let me test. Will get back to you.&lt;/P&gt;&lt;P&gt;Thanks&lt;/P&gt;</description>
      <pubDate>Tue, 05 Jun 2018 16:13:23 GMT</pubDate>
      <guid>https://community.cloudera.com/t5/Support-Questions/kerberos-MIT-kdc-with-active-directory-one-way-trust-working/m-p/208206#M170165</guid>
      <dc:creator>vinayk</dc:creator>
      <dc:date>2018-06-05T16:13:23Z</dc:date>
    </item>
    <item>
      <title>Re: kerberos MIT kdc with active directory one way trust working</title>
      <link>https://community.cloudera.com/t5/Support-Questions/kerberos-MIT-kdc-with-active-directory-one-way-trust-working/m-p/208207#M170166</link>
      <description>&lt;P&gt;&lt;A rel="user" href="https://community.cloudera.com/users/69412/testtest12p.html" nodeid="69412"&gt;@Vinay K&lt;/A&gt; yes, you will need to add appropiate policies on Ranger to authorize users to resources. &lt;/P&gt;</description>
      <pubDate>Tue, 05 Jun 2018 19:04:07 GMT</pubDate>
      <guid>https://community.cloudera.com/t5/Support-Questions/kerberos-MIT-kdc-with-active-directory-one-way-trust-working/m-p/208207#M170166</guid>
      <dc:creator>falbani</dc:creator>
      <dc:date>2018-06-05T19:04:07Z</dc:date>
    </item>
    <item>
      <title>Re: kerberos MIT kdc with active directory one way trust working</title>
      <link>https://community.cloudera.com/t5/Support-Questions/kerberos-MIT-kdc-with-active-directory-one-way-trust-working/m-p/208208#M170167</link>
      <description>&lt;P&gt;Thanks &lt;A rel="user" href="https://community.cloudera.com/users/11048/falbani.html" nodeid="11048"&gt;@Felix Albani&lt;/A&gt;&lt;/P&gt;&lt;P&gt;It's working.&lt;/P&gt;</description>
      <pubDate>Fri, 08 Jun 2018 12:02:33 GMT</pubDate>
      <guid>https://community.cloudera.com/t5/Support-Questions/kerberos-MIT-kdc-with-active-directory-one-way-trust-working/m-p/208208#M170167</guid>
      <dc:creator>vinayk</dc:creator>
      <dc:date>2018-06-08T12:02:33Z</dc:date>
    </item>
  </channel>
</rss>

