<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>question Re: Enable Kerberos wizard created AD SamAccountName as $K5V500-1ET1B4KFE6C4, how to change to regular username in Support Questions</title>
    <link>https://community.cloudera.com/t5/Support-Questions/Enable-Kerberos-wizard-created-AD-SamAccountName-as-K5V500/m-p/95769#M59128</link>
    <description>&lt;P&gt;thank you for the details, next week I will test in new cluster build.&lt;/P&gt;</description>
    <pubDate>Fri, 30 Oct 2015 08:32:59 GMT</pubDate>
    <dc:creator>skonduru</dc:creator>
    <dc:date>2015-10-30T08:32:59Z</dc:date>
    <item>
      <title>Enable Kerberos wizard created AD SamAccountName as $K5V500-1ET1B4KFE6C4, how to change to regular username</title>
      <link>https://community.cloudera.com/t5/Support-Questions/Enable-Kerberos-wizard-created-AD-SamAccountName-as-K5V500/m-p/95767#M59126</link>
      <description>&lt;P&gt;How to change SamAccountName  : $K5V500-1ET1B4KFE6C4 to username storm-poc.&lt;/P&gt;&lt;P&gt;Ambari 2.1.2 enable kerberos wizard created AD account SamAccountName : $K5V500-1ET1B4KFE6C4.&lt;/P&gt;&lt;PRE&gt;Get-ADUser -Identity '$K5V500-1ET1B4KFE6C4' -Properties *
AccountExpirationDate  :
accountExpires  : 0
AccountLockoutTime  :
AccountNotDelegated  : False
AllowReversiblePasswordEncryption  : False
BadLogonCount  : 0
badPasswordTime  : 0
badPwdCount  : 0
CannotChangePassword  : False
CanonicalName  : ldap.customer.com/HDP/Domain Accounts/Service Accounts/storm-poc
Certificates  : {}
City  :
CN  : storm-poc
codePage  : 0
Company  :
Country  :
countryCode  : 0
Created  : 10/16/2015 12:54:07 PM
createTimeStamp  : 10/16/2015 12:54:07 PM
Deleted  :
Department  :
Description  :
DisplayName  :
DistinguishedName  : CN=storm-poc,OU=Service Accounts,OU=Domain Accounts,OU=HDP,DC=poc,DC=customer,DC=com
Division  :
DoesNotRequirePreAuth  : False
dSCorePropagationData  : {12/31/1600 7:00:00 PM}
EmailAddress  :
EmployeeID  :
EmployeeNumber  :
Enabled  : True
Fax  :
GivenName  :
HomeDirectory  :
HomedirRequired  : False
HomeDrive  :
HomePage  :
HomePhone  :
Initials  :
instanceType  : 4
isDeleted  :
LastBadPasswordAttempt  :
LastKnownParent  :
lastLogoff  : 0
lastLogon  : 130898381140333887
LastLogonDate  : 10/16/2015 12:54:07 PM
lastLogonTimestamp  : 130894880477406005
LockedOut  : False
logonCount  : 60159
LogonWorkstations  :
Manager  :
MemberOf  : {}
MNSLogonAccount  : False
MobilePhone  :
Modified  : 10/16/2015 12:54:07 PM
modifyTimeStamp  : 10/16/2015 12:54:07 PM
msDS-User-Account-Control-Computed : 0
Name  : storm-poc
nTSecurityDescriptor  : System.DirectoryServices.ActiveDirectorySecurity
ObjectCategory  : CN=Person,CN=Schema,CN=Configuration,DC=poc,DC=customer,DC=com
ObjectClass  : user
ObjectGUID  : 6d7826eb-4729-4074-8e4a-3705c9adcd40
objectSid  : S-1-5-21-568884682-143551100-1954249272-195764
Office  :
OfficePhone  :
Organization  :
OtherName  :
PasswordExpired  : False
PasswordLastSet  : 10/16/2015 12:54:07 PM
PasswordNeverExpires  : True
PasswordNotRequired  : False
POBox  :
PostalCode  :
PrimaryGroup  : CN=Domain Users,CN=Users,DC=poc,DC=customer,DC=com
primaryGroupID  : 513
ProfilePath  :
ProtectedFromAccidentalDeletion  : False
pwdLastSet  : 130894880476781969
SamAccountName  : $K5V500-1ET1B4KFE6C4
sAMAccountType  : 805306368
ScriptPath  :
sDRightsEffective  : 15
ServicePrincipalNames  : {}
SID  : S-1-5-21-568884682-143551100-1954249272-195764
SIDHistory  : {}
SmartcardLogonRequired  : False
State  :
StreetAddress  :
Surname  :
Title  :
TrustedForDelegation  : False
TrustedToAuthForDelegation  : False
UseDESKeyOnly  : False
userAccountControl  : 66048
userCertificate  : {}
UserPrincipalName  : storm-poc@ldap.customer.com
uSNChanged  : 9889735
uSNCreated  : 9889732
whenChanged  : 10/16/2015 12:54:07 PM
whenCreated  : 10/16/2015 12:54:07 PM&lt;/PRE&gt;</description>
      <pubDate>Fri, 16 Sep 2022 09:45:13 GMT</pubDate>
      <guid>https://community.cloudera.com/t5/Support-Questions/Enable-Kerberos-wizard-created-AD-SamAccountName-as-K5V500/m-p/95767#M59126</guid>
      <dc:creator>skonduru</dc:creator>
      <dc:date>2022-09-16T09:45:13Z</dc:date>
    </item>
    <item>
      <title>Re: Enable Kerberos wizard created AD SamAccountName as $K5V500-1ET1B4KFE6C4, how to change to regular username</title>
      <link>https://community.cloudera.com/t5/Support-Questions/Enable-Kerberos-wizard-created-AD-SamAccountName-as-K5V500/m-p/95768#M59127</link>
      <description>&lt;P&gt;Once the account has been created, you can use the "Active Directory Users and Computers" applet on the Windows Server, find the account, open up the properties, and perform one of the following: &lt;/P&gt;&lt;P&gt;Option A:&lt;/P&gt;&lt;UL&gt;&lt;LI&gt;Click on the "Account" tab&lt;/LI&gt;&lt;LI&gt;Edit the 2nd box of the "Windows login name (pre-Windows 2000)" field&lt;/LI&gt;&lt;LI&gt;Click the "Apply" button&lt;/LI&gt;&lt;/UL&gt;&lt;P&gt;Option B:&lt;/P&gt;&lt;UL&gt;&lt;LI&gt;Click on the "Attribute Editor" tab (shown if "Advanced Features" is turned on)&lt;/LI&gt;&lt;LI&gt;Look for "sAMAccountName" in the listbox&lt;/LI&gt;&lt;LI&gt;Double click on the "sAMAccountName" item - a small dialog box will pop up&lt;/LI&gt;&lt;LI&gt;Edit the name in the textbox&lt;/LI&gt;&lt;LI&gt;Click the "OK" button (closed the dialog box)&lt;/LI&gt;&lt;LI&gt;Click the "Apply" button&lt;/LI&gt;&lt;/UL&gt;&lt;P&gt;If you haven't enabled Kerberos yet, you can edit the Active Directory "Account Attribute Template" value under the "Advanced kerberos-env" section on the "Configure Kerberos" page of the "Enable Kerberos Wizard" and add something like:&lt;/P&gt;&lt;PRE&gt;"sAMAccountName": "$principal_name"
&lt;/PRE&gt;&lt;P&gt;However this field is limited to 20 characters so you will need to do some additional stuff to limit the value and hope that it is unique. For example:&lt;/P&gt;&lt;PRE&gt;#set( $sAMAccountName = "${principal_primary}-${principal_digest}" )
{
 "objectClass": ["top","person","organizationalPerson","user"],
 "cn": "$principal_name",
 "sAMAccountName": "$sAMAccountName.substring(0,20)",
 #if( $is_service )
 "servicePrincipalName": "$principal_name",
 #end
 "userPrincipalName": "$normalized_principal",
 "unicodePwd": "$password",
 "accountExpires": "0",
 "userAccountControl": "66048"
}
&lt;/PRE&gt;</description>
      <pubDate>Fri, 23 Oct 2015 23:27:43 GMT</pubDate>
      <guid>https://community.cloudera.com/t5/Support-Questions/Enable-Kerberos-wizard-created-AD-SamAccountName-as-K5V500/m-p/95768#M59127</guid>
      <dc:creator>rlevas</dc:creator>
      <dc:date>2015-10-23T23:27:43Z</dc:date>
    </item>
    <item>
      <title>Re: Enable Kerberos wizard created AD SamAccountName as $K5V500-1ET1B4KFE6C4, how to change to regular username</title>
      <link>https://community.cloudera.com/t5/Support-Questions/Enable-Kerberos-wizard-created-AD-SamAccountName-as-K5V500/m-p/95769#M59128</link>
      <description>&lt;P&gt;thank you for the details, next week I will test in new cluster build.&lt;/P&gt;</description>
      <pubDate>Fri, 30 Oct 2015 08:32:59 GMT</pubDate>
      <guid>https://community.cloudera.com/t5/Support-Questions/Enable-Kerberos-wizard-created-AD-SamAccountName-as-K5V500/m-p/95769#M59128</guid>
      <dc:creator>skonduru</dc:creator>
      <dc:date>2015-10-30T08:32:59Z</dc:date>
    </item>
    <item>
      <title>Re: Enable Kerberos wizard created AD SamAccountName as $K5V500-1ET1B4KFE6C4, how to change to regular username</title>
      <link>https://community.cloudera.com/t5/Support-Questions/Enable-Kerberos-wizard-created-AD-SamAccountName-as-K5V500/m-p/95770#M59129</link>
      <description>&lt;P&gt;&lt;A rel="user" href="https://community.cloudera.com/users/423/skonduru.html" nodeid="423"&gt;@skonduru&lt;/A&gt; has this been resolved? Can you accept the best answer or provide your own solution?&lt;/P&gt;</description>
      <pubDate>Wed, 03 Feb 2016 01:30:19 GMT</pubDate>
      <guid>https://community.cloudera.com/t5/Support-Questions/Enable-Kerberos-wizard-created-AD-SamAccountName-as-K5V500/m-p/95770#M59129</guid>
      <dc:creator>aervits</dc:creator>
      <dc:date>2016-02-03T01:30:19Z</dc:date>
    </item>
    <item>
      <title>Re: Enable Kerberos wizard created AD SamAccountName as $K5V500-1ET1B4KFE6C4, how to change to regular username</title>
      <link>https://community.cloudera.com/t5/Support-Questions/Enable-Kerberos-wizard-created-AD-SamAccountName-as-K5V500/m-p/95771#M59130</link>
      <description>&lt;P&gt;How did this go for you &lt;A href="https://community.hortonworks.com/questions/1798/enable-kerberos-wizard-created-ad-samaccountname-a.html#"&gt;@skonduru&lt;/A&gt; ? Did you have to do the additional stuff to limit the value?&lt;/P&gt;</description>
      <pubDate>Mon, 18 Jul 2016 16:09:44 GMT</pubDate>
      <guid>https://community.cloudera.com/t5/Support-Questions/Enable-Kerberos-wizard-created-AD-SamAccountName-as-K5V500/m-p/95771#M59130</guid>
      <dc:creator>daleb</dc:creator>
      <dc:date>2016-07-18T16:09:44Z</dc:date>
    </item>
    <item>
      <title>Re: Enable Kerberos wizard created AD SamAccountName as $K5V500-1ET1B4KFE6C4, how to change to regular username</title>
      <link>https://community.cloudera.com/t5/Support-Questions/Enable-Kerberos-wizard-created-AD-SamAccountName-as-K5V500/m-p/95772#M59131</link>
      <description>&lt;P&gt;&lt;/P&gt;&lt;P&gt;It went well with Robert L suggested changes.  &lt;/P&gt;&lt;P&gt;We recommended customer AD team to limit &lt;STRONG&gt;sAMAccountName &lt;/STRONG&gt;characters to &amp;lt;=15&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;-------&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;When using an Active Directory server and the user name is mapped to the&lt;STRONG&gt;userPrincipalName&lt;/STRONG&gt;attribute, the&lt;A href="https://msdn.microsoft.com/en-us/library/system.web.security.activedirectorymembershipprovider.aspx"&gt;ActiveDirectoryMembershipProvider&lt;/A&gt;class will automatically generate a random 20-character user name for the&lt;STRONG&gt;sAMAccountName&lt;/STRONG&gt;parameter on your behalf.&lt;/P&gt;&lt;P&gt;Parameters default to the following maximum lengths.&lt;/P&gt;&lt;TABLE&gt;&lt;TBODY&gt;&lt;TR&gt;&lt;TH&gt;&lt;P&gt;Parameter&lt;/P&gt;&lt;/TH&gt;&lt;TH&gt;&lt;P&gt;Maximum length&lt;/P&gt;&lt;/TH&gt;&lt;/TR&gt;&lt;TR&gt;&lt;TD&gt;&lt;EM&gt;username&lt;/EM&gt;&lt;/TD&gt;&lt;TD&gt;64 characters if using the&lt;STRONG&gt;userPrincipalName&lt;/STRONG&gt;attribute. If using the&lt;STRONG&gt;sAMAccountName&lt;/STRONG&gt;attribute, the common restriction is 20 characters or less.&lt;/TD&gt;&lt;/TR&gt;&lt;TR&gt;&lt;TD&gt;&lt;EM&gt;password&lt;/EM&gt;&lt;/TD&gt;&lt;TD&gt;128 characters.&lt;/TD&gt;&lt;/TR&gt;&lt;TR&gt;&lt;TD&gt;&lt;EM&gt;email&lt;/EM&gt;&lt;/TD&gt;&lt;TD&gt;256 characters.&lt;/TD&gt;&lt;/TR&gt;&lt;TR&gt;&lt;TD&gt;&lt;EM&gt;passwordQuestion&lt;/EM&gt;&lt;/TD&gt;&lt;TD&gt;256 characters.&lt;/TD&gt;&lt;/TR&gt;&lt;TR&gt;&lt;TD&gt;&lt;EM&gt;passwordAnswer&lt;/EM&gt;&lt;/TD&gt;&lt;TD&gt;128 characters before and after encrypting.&lt;/TD&gt;&lt;/TR&gt;&lt;/TBODY&gt;&lt;/TABLE&gt;
&lt;P&gt;----------&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;for more details Maximum Length User Logon Name (Pre Windows 2000)
&lt;A href="https://msdn.microsoft.com/en-us/library/system.web.security.activedirectorymembershipprovider.createuser.aspx"&gt;https://msdn.microsoft.com/en-us/library/system.web.security.activedirectorymembershipprovider.createuser.aspx&lt;/A&gt;&lt;/P&gt;</description>
      <pubDate>Tue, 19 Jul 2016 11:55:00 GMT</pubDate>
      <guid>https://community.cloudera.com/t5/Support-Questions/Enable-Kerberos-wizard-created-AD-SamAccountName-as-K5V500/m-p/95772#M59131</guid>
      <dc:creator>skonduru</dc:creator>
      <dc:date>2016-07-19T11:55:00Z</dc:date>
    </item>
    <item>
      <title>Re: Enable Kerberos wizard created AD SamAccountName as $K5V500-1ET1B4KFE6C4, how to change to regular username</title>
      <link>https://community.cloudera.com/t5/Support-Questions/Enable-Kerberos-wizard-created-AD-SamAccountName-as-K5V500/m-p/95773#M59132</link>
      <description>&lt;P&gt;&lt;A rel="user" href="https://community.cloudera.com/users/423/skonduru.html" nodeid="423"&gt;@skonduru&lt;/A&gt; interestingly, setting&lt;/P&gt;&lt;PRE&gt;"sAMAccountName":"$sAMAccountName.substring(0,20)",&lt;/PRE&gt;&lt;P&gt;failed for me when installing kerberos. And wouldn't this also result in an inconsistent naming convention?&lt;/P&gt;&lt;P&gt;E.g. sAMAccountName for HDFS would be: hdfs/node01.hadoop.p&lt;/P&gt;&lt;P&gt;but sAMAccountName for Zookeeper would be: zookeeper/node01.had&lt;/P&gt;&lt;P&gt;Is there a better way to achieve a consistent naming convention?&lt;/P&gt;</description>
      <pubDate>Wed, 20 Jul 2016 22:08:38 GMT</pubDate>
      <guid>https://community.cloudera.com/t5/Support-Questions/Enable-Kerberos-wizard-created-AD-SamAccountName-as-K5V500/m-p/95773#M59132</guid>
      <dc:creator>daleb</dc:creator>
      <dc:date>2016-07-20T22:08:38Z</dc:date>
    </item>
    <item>
      <title>Re: Enable Kerberos wizard created AD SamAccountName as $K5V500-1ET1B4KFE6C4, how to change to regular username</title>
      <link>https://community.cloudera.com/t5/Support-Questions/Enable-Kerberos-wizard-created-AD-SamAccountName-as-K5V500/m-p/95774#M59133</link>
      <description>&lt;P&gt;We didn't used any regex for "sAMAccountName":&lt;/P&gt;&lt;P&gt;Looklike your AD configured sAMAccountName as UPN.  
See following notes may helpful to differentiate both properties.
&lt;A href="http://www.morgantechspace.com/2014/04/samaccountname-vs-userprincipalname.html" target="_blank"&gt;http://www.morgantechspace.com/2014/04/samaccountname-vs-userprincipalname.html&lt;/A&gt;&lt;/P&gt;</description>
      <pubDate>Sun, 24 Jul 2016 00:19:52 GMT</pubDate>
      <guid>https://community.cloudera.com/t5/Support-Questions/Enable-Kerberos-wizard-created-AD-SamAccountName-as-K5V500/m-p/95774#M59133</guid>
      <dc:creator>skonduru</dc:creator>
      <dc:date>2016-07-24T00:19:52Z</dc:date>
    </item>
  </channel>
</rss>

