<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>question Re: Failing to connect to KDC during enable kerberos, CA certificate has been imported into Ambari &amp; Java trust stores in Support Questions</title>
    <link>https://community.cloudera.com/t5/Support-Questions/Failing-to-connect-to-KDC-during-enable-kerberos-CA/m-p/237342#M199155</link>
    <description>&lt;P&gt;My suggestion to set kerberos.operation.verify.kdc.trust to true is a bit of a hack, but it may give you an idea of what the cause is.  If this works, then there is something up with the Ambari trust store... like the needed CA certs have not been imported, or maybe Ambari is not really using the one you think it is.   Once we figure out a solution to the issue, we can flip the flag back to true (or remove that property) and you will have SSL certificate trust validation turned on again.&lt;/P&gt;&lt;P&gt;Looking at the log entries, the issue points to a lack of information in the trust store :&lt;/P&gt;&lt;PRE&gt;sun.security.provider.certpath.SunCertPathBuilderException: unable to find valid certification path to requested target&lt;/PRE&gt;&lt;P&gt;Did you try adding all CA and intermediary CA certs into the trust store?&lt;/P&gt;</description>
    <pubDate>Fri, 07 Dec 2018 03:49:28 GMT</pubDate>
    <dc:creator>rlevas</dc:creator>
    <dc:date>2018-12-07T03:49:28Z</dc:date>
  </channel>
</rss>

