<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>question Re: How One-way Trust works - MIT KDC to Active Directory in Support Questions</title>
    <link>https://community.cloudera.com/t5/Support-Questions/How-One-way-Trust-works-MIT-KDC-to-Active-Directory/m-p/382820#M244706</link>
    <description>&lt;P&gt;&lt;SPAN&gt;traffic analysis shows an error &lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;KRB5KDC_ERR_S_PRINCIPAL_UNKNOWN &lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;requests to dfs from a user in MIT KDC are successfully executed &lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;Checking&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;./&lt;/SPAN&gt;&lt;SPAN&gt;hdfs groups &lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;returns the correct set of groups &lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;but the AD user's requests after kinit return the above error&lt;/SPAN&gt;&lt;/P&gt;</description>
    <pubDate>Mon, 29 Jan 2024 11:26:49 GMT</pubDate>
    <dc:creator>avs2211</dc:creator>
    <dc:date>2024-01-29T11:26:49Z</dc:date>
    <item>
      <title>How One-way Trust works - MIT KDC to Active Directory</title>
      <link>https://community.cloudera.com/t5/Support-Questions/How-One-way-Trust-works-MIT-KDC-to-Active-Directory/m-p/382788#M244692</link>
      <description>&lt;P&gt;I read the &lt;A href="https://community.cloudera.com/t5/Community-Articles/One-Way-Trust-MIT-KDC-to-Active-Directory/ta-p/247638" target="_self"&gt;article&amp;nbsp;&lt;/A&gt;&lt;/P&gt;&lt;P&gt;But I can't understand a few things&lt;/P&gt;&lt;P&gt;1. I have&lt;BR /&gt;a Hadoop (3.1.3)&lt;BR /&gt;MIT KDC cluster on a separate server&lt;BR /&gt;Active Directory for&lt;BR /&gt;server users with hadoop is not included in the domain&lt;/P&gt;&lt;P&gt;2. All hadoop NN, DN, JN, etc. services are launched using the keytabs created for them and are working successfully&lt;/P&gt;&lt;P&gt;3. any requests from the user from AD fall with an error&lt;/P&gt;&lt;P&gt;2024-01-27 15:56:07,949 DEBUG security.SaslRpcClient: Sending sasl message state: NEGOTIATE&lt;/P&gt;&lt;P&gt;2024-01-27 15:56:07,950 DEBUG security.SaslRpcClient: Get token info proto:interface org.apache.hadoop.hdfs.protocolPB.ClientNamenodeProtocolPB info:@org.apache.hadoop.security.token.TokenInfo(value=class org.apache.hadoop.hdfs.security.token.delegation.DelegationTokenSelector)&lt;BR /&gt;2024-01-27 15:56:07,951 DEBUG security.SaslRpcClient: tokens aren't supported for this protocol or user doesn't have one&lt;BR /&gt;2024-01-27 15:56:07,951 DEBUG security.SaslRpcClient: Get kerberos info proto:interface org.apache.hadoop.hdfs.protocolPB.ClientNamenodeProtocolPB info:@org.apache.hadoop.security.KerberosInfo(clientPrincipal=, serverPrincipal=dfs.namenode.kerberos.principal)&lt;BR /&gt;2024-01-27 15:56:07,953 DEBUG security.SaslRpcClient: RPC Server's Kerberos principal name for protocol=org.apache.hadoop.hdfs.protocolPB.ClientNamenodeProtocolPB is hdfs/hadoop01dev.local@HADOOP.LOCAL&lt;BR /&gt;2024-01-27 15:56:07,953 DEBUG security.SaslRpcClient: Creating SASL GSSAPI(KERBEROS) client to authenticate to service at hadoop01dev.local&lt;BR /&gt;2024-01-27 15:56:07,955 DEBUG security.SaslRpcClient: Use KERBEROS authentication for protocol ClientNamenodeProtocolPB&lt;BR /&gt;2024-01-27 15:56:07,987 DEBUG security.UserGroupInformation: PrivilegedActionException as:user1@AD.LOCAL (auth:KERBEROS) cause:javax.security.sasl.SaslException: GSS initiate failed [Caused by GSSException: No valid credentials provided (Mechanism level: Fail to create credential. (63) - No service creds)]&lt;/P&gt;&lt;P&gt;single-party trust between AD and MIT KDC is set up&lt;BR /&gt;I can't understand what algorithm works in this scheme for users in AD&amp;nbsp;through kinit they get a ticket to AD, but how do they get into hadoop, which works with MIT KDC tickets?&lt;BR /&gt;It turns out that after authentication via kinit in AD, they should receive a ticket to MIT KDC somehow? or does this ticket get a NameNode for them , for example?&lt;BR /&gt;Can someone explain how this mechanism works?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Sat, 27 Jan 2024 13:17:24 GMT</pubDate>
      <guid>https://community.cloudera.com/t5/Support-Questions/How-One-way-Trust-works-MIT-KDC-to-Active-Directory/m-p/382788#M244692</guid>
      <dc:creator>avs2211</dc:creator>
      <dc:date>2024-01-27T13:17:24Z</dc:date>
    </item>
    <item>
      <title>Re: How One-way Trust works - MIT KDC to Active Directory</title>
      <link>https://community.cloudera.com/t5/Support-Questions/How-One-way-Trust-works-MIT-KDC-to-Active-Directory/m-p/382818#M244704</link>
      <description>&lt;P&gt;&lt;a href="https://community.cloudera.com/t5/user/viewprofilepage/user-id/108949"&gt;@avs2211&lt;/a&gt;,&amp;nbsp;Welcome to our community! To help you get the best possible answer, I have tagged in our HDFS experts&amp;nbsp;&lt;a href="https://community.cloudera.com/t5/user/viewprofilepage/user-id/33734"&gt;@Asok&lt;/a&gt;&amp;nbsp;&lt;a href="https://community.cloudera.com/t5/user/viewprofilepage/user-id/82089"&gt;@willx&lt;/a&gt;&amp;nbsp;&lt;a href="https://community.cloudera.com/t5/user/viewprofilepage/user-id/12885"&gt;@mszurap&lt;/a&gt;&amp;nbsp;&lt;a href="https://community.cloudera.com/t5/user/viewprofilepage/user-id/80393"&gt;@rki_&lt;/a&gt;&amp;nbsp;&amp;nbsp;who may be able to assist you further.&lt;BR /&gt;&lt;BR /&gt;Please feel free to provide any additional information or details about your query, and we hope that you will find a satisfactory solution to your question.&lt;/P&gt;</description>
      <pubDate>Mon, 29 Jan 2024 10:40:38 GMT</pubDate>
      <guid>https://community.cloudera.com/t5/Support-Questions/How-One-way-Trust-works-MIT-KDC-to-Active-Directory/m-p/382818#M244704</guid>
      <dc:creator>VidyaSargur</dc:creator>
      <dc:date>2024-01-29T10:40:38Z</dc:date>
    </item>
    <item>
      <title>Re: How One-way Trust works - MIT KDC to Active Directory</title>
      <link>https://community.cloudera.com/t5/Support-Questions/How-One-way-Trust-works-MIT-KDC-to-Active-Directory/m-p/382820#M244706</link>
      <description>&lt;P&gt;&lt;SPAN&gt;traffic analysis shows an error &lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;KRB5KDC_ERR_S_PRINCIPAL_UNKNOWN &lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;requests to dfs from a user in MIT KDC are successfully executed &lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;Checking&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;./&lt;/SPAN&gt;&lt;SPAN&gt;hdfs groups &lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;returns the correct set of groups &lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;but the AD user's requests after kinit return the above error&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Mon, 29 Jan 2024 11:26:49 GMT</pubDate>
      <guid>https://community.cloudera.com/t5/Support-Questions/How-One-way-Trust-works-MIT-KDC-to-Active-Directory/m-p/382820#M244706</guid>
      <dc:creator>avs2211</dc:creator>
      <dc:date>2024-01-29T11:26:49Z</dc:date>
    </item>
    <item>
      <title>Re: How One-way Trust works - MIT KDC to Active Directory</title>
      <link>https://community.cloudera.com/t5/Support-Questions/How-One-way-Trust-works-MIT-KDC-to-Active-Directory/m-p/383049#M244806</link>
      <description>&lt;P&gt;the problem was in trust - the password was incorrectly set in the MIT KDC when creating the trust&lt;/P&gt;</description>
      <pubDate>Fri, 02 Feb 2024 12:44:37 GMT</pubDate>
      <guid>https://community.cloudera.com/t5/Support-Questions/How-One-way-Trust-works-MIT-KDC-to-Active-Directory/m-p/383049#M244806</guid>
      <dc:creator>avs2211</dc:creator>
      <dc:date>2024-02-02T12:44:37Z</dc:date>
    </item>
    <item>
      <title>Re: How One-way Trust works - MIT KDC to Active Directory</title>
      <link>https://community.cloudera.com/t5/Support-Questions/How-One-way-Trust-works-MIT-KDC-to-Active-Directory/m-p/386672#M246111</link>
      <description>&lt;P&gt;The password is correct but the same problem occurs&lt;/P&gt;</description>
      <pubDate>Wed, 17 Apr 2024 03:08:37 GMT</pubDate>
      <guid>https://community.cloudera.com/t5/Support-Questions/How-One-way-Trust-works-MIT-KDC-to-Active-Directory/m-p/386672#M246111</guid>
      <dc:creator>lslzz</dc:creator>
      <dc:date>2024-04-17T03:08:37Z</dc:date>
    </item>
  </channel>
</rss>

