<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>question Re: keyadmin user not working after enabling Kerberos in Archives of Support Questions (Read Only)</title>
    <link>https://community.cloudera.com/t5/Archives-of-Support-Questions/keyadmin-user-not-working-after-enabling-Kerberos/m-p/170328#M25274</link>
    <description>&lt;P&gt;But turning off Kerberos auth is not an option for me.&lt;/P&gt;</description>
    <pubDate>Fri, 15 Apr 2016 19:32:24 GMT</pubDate>
    <dc:creator>sadek_mostefai</dc:creator>
    <dc:date>2016-04-15T19:32:24Z</dc:date>
    <item>
      <title>keyadmin user not working after enabling Kerberos</title>
      <link>https://community.cloudera.com/t5/Archives-of-Support-Questions/keyadmin-user-not-working-after-enabling-Kerberos/m-p/170326#M25272</link>
      <description>&lt;P&gt;Hi, &lt;/P&gt;&lt;P&gt;Since I've enabled Kerberos I cannot get the keyadmin user to list the previously created keys or create new ones. First I noticed that the keyadmin principal hadn't been created along the other ones during the Kerberos set up. I did add it manually following these instructions: &lt;/P&gt;&lt;P&gt;&lt;A href="https://docs.hortonworks.com/HDPDocuments/HDP2/HDP-2.4.0/bk_Ranger_KMS_Admin_Guide/content/ch02s01s03.html" target="_blank"&gt;https://docs.hortonworks.com/HDPDocuments/HDP2/HDP-2.4.0/bk_Ranger_KMS_Admin_Guide/content/ch02s01s03.html&lt;/A&gt; &lt;/P&gt;&lt;P&gt;Also part 6.b is not very clear to me at &lt;/P&gt;&lt;P&gt;&lt;A href="https://docs.hortonworks.com/HDPDocuments/HDP2/HDP-2.4.0/bk_Ranger_KMS_Admin_Guide/content/ch02s01.html" target="_blank"&gt;https://docs.hortonworks.com/HDPDocuments/HDP2/HDP-2.4.0/bk_Ranger_KMS_Admin_Guide/content/ch02s01.html&lt;/A&gt; &lt;/P&gt;&lt;P&gt;What values are those attributes supposed to have? &lt;/P&gt;&lt;P&gt;The error I see in the kms-audit.log file is: &lt;/P&gt;&lt;P&gt;2016-04-14 18:54:57,923 UNAUTHENTICATED RemoteHost:xxxxxxxx Method:GET URL:http://xxxxxxxxxx:9292/kms/v1/keys/names?doAs=keyadmin ErrorMsg:'Authentication required'
Thanks,
Sadek&lt;/P&gt;</description>
      <pubDate>Fri, 15 Apr 2016 06:27:30 GMT</pubDate>
      <guid>https://community.cloudera.com/t5/Archives-of-Support-Questions/keyadmin-user-not-working-after-enabling-Kerberos/m-p/170326#M25272</guid>
      <dc:creator>sadek_mostefai</dc:creator>
      <dc:date>2016-04-15T06:27:30Z</dc:date>
    </item>
    <item>
      <title>Re: keyadmin user not working after enabling Kerberos</title>
      <link>https://community.cloudera.com/t5/Archives-of-Support-Questions/keyadmin-user-not-working-after-enabling-Kerberos/m-p/170327#M25273</link>
      <description>&lt;P&gt;Same problem here on HDP 2.3.4 with Ambari 2.2.0&lt;/P&gt;&lt;P&gt;Changing hadoop.kms.authentication.type to simple works fine. &lt;/P&gt;</description>
      <pubDate>Fri, 15 Apr 2016 18:17:32 GMT</pubDate>
      <guid>https://community.cloudera.com/t5/Archives-of-Support-Questions/keyadmin-user-not-working-after-enabling-Kerberos/m-p/170327#M25273</guid>
      <dc:creator>rahulpathak109</dc:creator>
      <dc:date>2016-04-15T18:17:32Z</dc:date>
    </item>
    <item>
      <title>Re: keyadmin user not working after enabling Kerberos</title>
      <link>https://community.cloudera.com/t5/Archives-of-Support-Questions/keyadmin-user-not-working-after-enabling-Kerberos/m-p/170328#M25274</link>
      <description>&lt;P&gt;But turning off Kerberos auth is not an option for me.&lt;/P&gt;</description>
      <pubDate>Fri, 15 Apr 2016 19:32:24 GMT</pubDate>
      <guid>https://community.cloudera.com/t5/Archives-of-Support-Questions/keyadmin-user-not-working-after-enabling-Kerberos/m-p/170328#M25274</guid>
      <dc:creator>sadek_mostefai</dc:creator>
      <dc:date>2016-04-15T19:32:24Z</dc:date>
    </item>
    <item>
      <title>Re: keyadmin user not working after enabling Kerberos</title>
      <link>https://community.cloudera.com/t5/Archives-of-Support-Questions/keyadmin-user-not-working-after-enabling-Kerberos/m-p/170329#M25275</link>
      <description>&lt;A rel="user" href="https://community.cloudera.com/users/6068/sadek-mostefai.html" nodeid="6068"&gt;@Sadek M&lt;/A&gt;&lt;P&gt;Please first configure KMS for Kerberos authentication.&lt;/P&gt;&lt;P&gt;Use &lt;A href="https://docs.hortonworks.com/HDPDocuments/HDP2/HDP-2.4.0/bk_Ranger_KMS_Admin_Guide/content/ch02s01.html"&gt;second&lt;/A&gt; link you have mentioned in your question.&lt;/P&gt;&lt;P&gt;Regarding point 6b&lt;/P&gt;&lt;P&gt;Add values for the following properties in the "Custom kms-site" section. These properties allow the specified system users (&lt;CODE&gt;hive&lt;/CODE&gt;, &lt;CODE&gt;oozie&lt;/CODE&gt;, and others) to proxy on behalf of other users when communicating with Ranger KMS. This helps individual services (such as Hive) use their own keytabs, but retain the ability to access Ranger KMS as the end user (use access policies associated with the end user).&lt;/P&gt;&lt;UL&gt;
&lt;LI&gt;&lt;CODE&gt;hadoop.kms.proxyuser.hive.users&lt;/CODE&gt;&lt;/LI&gt;&lt;LI&gt;&lt;CODE&gt;hadoop.kms.proxyuser.oozie.users&lt;/CODE&gt;&lt;/LI&gt;&lt;LI&gt;&lt;CODE&gt;hadoop.kms.proxyuser.HTTP.users&lt;/CODE&gt;&lt;/LI&gt;&lt;LI&gt;&lt;CODE&gt;hadoop.kms.proxyuser.ambari.users&lt;/CODE&gt;&lt;/LI&gt;&lt;LI&gt;&lt;CODE&gt;hadoop.kms.proxyuser.yarn.users&lt;/CODE&gt;&lt;/LI&gt;&lt;LI&gt;&lt;CODE&gt;hadoop.kms.proxyuser.hive.hosts&lt;/CODE&gt;&lt;/LI&gt;&lt;LI&gt;&lt;CODE&gt;hadoop.kms.proxyuser.oozie.hosts&lt;/CODE&gt;&lt;/LI&gt;&lt;LI&gt;&lt;CODE&gt;hadoop.kms.proxyuser.HTTP.hosts&lt;/CODE&gt;&lt;/LI&gt;&lt;LI&gt;&lt;CODE&gt;hadoop.kms.proxyuser.ambari.hosts&lt;/CODE&gt;&lt;/LI&gt;&lt;LI&gt;&lt;CODE&gt;hadoop.kms.proxyuser.yarn.hosts&lt;/CODE&gt;&lt;/LI&gt;&lt;/UL&gt;&lt;P&gt;These properties are for user impersonation&lt;/P&gt;</description>
      <pubDate>Sun, 17 Apr 2016 12:30:18 GMT</pubDate>
      <guid>https://community.cloudera.com/t5/Archives-of-Support-Questions/keyadmin-user-not-working-after-enabling-Kerberos/m-p/170329#M25275</guid>
      <dc:creator>KuldeepK</dc:creator>
      <dc:date>2016-04-17T12:30:18Z</dc:date>
    </item>
    <item>
      <title>Re: keyadmin user not working after enabling Kerberos</title>
      <link>https://community.cloudera.com/t5/Archives-of-Support-Questions/keyadmin-user-not-working-after-enabling-Kerberos/m-p/170330#M25276</link>
      <description>&lt;P&gt;&lt;A rel="user" href="https://community.cloudera.com/users/6068/sadek-mostefai.html" nodeid="6068"&gt;@Sadek M&lt;/A&gt; &lt;/P&gt;&lt;P&gt;I was able to resolve it after restarting Ranger Service.&lt;/P&gt;&lt;P&gt;Ambari does not prompt for restarting Ranger service, but prompt for only Ranger Kms.   &lt;/P&gt;&lt;P&gt;Be sure to edit the repository username from Ranger UI by logging in as keyadmin user.&lt;/P&gt;&lt;P&gt;Changing user from Ambari does not work. &lt;/P&gt;&lt;P&gt;Set values of below to *&lt;/P&gt;&lt;UL&gt;&lt;LI&gt;&lt;CODE&gt;hadoop.kms.proxyuser.hive.users=*&lt;/CODE&gt;&lt;/LI&gt;&lt;LI&gt;&lt;CODE&gt;hadoop.kms.proxyuser.oozie.users=*&lt;/CODE&gt;&lt;/LI&gt;&lt;LI&gt;&lt;CODE&gt;hadoop.kms.proxyuser.HTTP.users=*&lt;/CODE&gt;&lt;/LI&gt;&lt;LI&gt;&lt;CODE&gt;hadoop.kms.proxyuser.ambari.users=*&lt;/CODE&gt;&lt;/LI&gt;&lt;LI&gt;&lt;CODE&gt;hadoop.kms.proxyuser.yarn.users=*&lt;/CODE&gt;&lt;/LI&gt;&lt;LI&gt;&lt;CODE&gt;hadoop.kms.proxyuser.hive.hosts=*&lt;/CODE&gt;&lt;/LI&gt;&lt;LI&gt;&lt;CODE&gt;hadoop.kms.proxyuser.oozie.hosts=*&lt;/CODE&gt;&lt;/LI&gt;&lt;LI&gt;&lt;CODE&gt;hadoop.kms.proxyuser.HTTP.hosts=*&lt;/CODE&gt;&lt;/LI&gt;&lt;LI&gt;&lt;CODE&gt;hadoop.kms.proxyuser.ambari.hosts=*&lt;/CODE&gt;&lt;/LI&gt;&lt;LI&gt;&lt;CODE&gt;hadoop.kms.proxyuser.yarn.hosts=*&lt;/CODE&gt;&lt;/LI&gt;&lt;/UL&gt;</description>
      <pubDate>Sun, 17 Apr 2016 13:56:25 GMT</pubDate>
      <guid>https://community.cloudera.com/t5/Archives-of-Support-Questions/keyadmin-user-not-working-after-enabling-Kerberos/m-p/170330#M25276</guid>
      <dc:creator>rahulpathak109</dc:creator>
      <dc:date>2016-04-17T13:56:25Z</dc:date>
    </item>
    <item>
      <title>Re: keyadmin user not working after enabling Kerberos</title>
      <link>https://community.cloudera.com/t5/Archives-of-Support-Questions/keyadmin-user-not-working-after-enabling-Kerberos/m-p/170331#M25277</link>
      <description>&lt;P&gt;That did it!. &lt;/P&gt;</description>
      <pubDate>Mon, 18 Apr 2016 18:10:05 GMT</pubDate>
      <guid>https://community.cloudera.com/t5/Archives-of-Support-Questions/keyadmin-user-not-working-after-enabling-Kerberos/m-p/170331#M25277</guid>
      <dc:creator>sadek_mostefai</dc:creator>
      <dc:date>2016-04-18T18:10:05Z</dc:date>
    </item>
    <item>
      <title>Re: keyadmin user not working after enabling Kerberos</title>
      <link>https://community.cloudera.com/t5/Archives-of-Support-Questions/keyadmin-user-not-working-after-enabling-Kerberos/m-p/170332#M25278</link>
      <description>&lt;P&gt;&lt;A rel="user" href="https://community.cloudera.com/users/872/rahulpathak109.html" nodeid="872"&gt;@Rahul Pathak&lt;/A&gt; &lt;/P&gt;&lt;P&gt;That didn't quite fix everything though. I was trying to put a file in an (hdfs) encryted zone and got the follwoing exception:&lt;/P&gt;&lt;P&gt;put: java.util.concurrent.ExecutionException: org.apache.hadoop.security.authorize.AuthorizationException: User:nn not allowed to do 'GENERATE_EEK' on 'mykey'.&lt;/P&gt;&lt;P&gt;The nn procipal should map to the 'hdfs' OS user according to the entry in &lt;/P&gt;&lt;P&gt;hadoop.security.auth_to_local: RULE:[2:$1@$0](nn@MYREALM.COM)s/.*/hdfs/&lt;/P&gt;&lt;P&gt;Even after adding similar properties as above to the hdfs user &lt;/P&gt;&lt;UL&gt;
&lt;LI&gt;&lt;CODE&gt;hadoop.kms.proxyuser.hdfs.users=*&lt;/CODE&gt;&lt;/LI&gt;&lt;LI&gt;&lt;CODE&gt;hadoop.kms.proxyuser.hdfs.hosts=*&lt;/CODE&gt;&lt;/LI&gt;&lt;/UL&gt;&lt;P&gt;And allowing all permissions to 'hdfs' user in the KMS policy.&lt;/P&gt;</description>
      <pubDate>Tue, 19 Apr 2016 00:24:15 GMT</pubDate>
      <guid>https://community.cloudera.com/t5/Archives-of-Support-Questions/keyadmin-user-not-working-after-enabling-Kerberos/m-p/170332#M25278</guid>
      <dc:creator>sadek_mostefai</dc:creator>
      <dc:date>2016-04-19T00:24:15Z</dc:date>
    </item>
    <item>
      <title>Re: keyadmin user not working after enabling Kerberos</title>
      <link>https://community.cloudera.com/t5/Archives-of-Support-Questions/keyadmin-user-not-working-after-enabling-Kerberos/m-p/170333#M25279</link>
      <description>&lt;P&gt;&lt;A rel="user" href="https://community.cloudera.com/users/6068/sadek-mostefai.html" nodeid="6068"&gt;@Sadek M&lt;/A&gt; &lt;/P&gt;&lt;P&gt;If I understand this correctly, you are trying to use TDE with hdfs user.&lt;/P&gt;&lt;P&gt;This will not work because hdfs user is blacklisted for TDE operations. &lt;/P&gt;&lt;P&gt;Here is note from Hortonworks Doc.&lt;/P&gt;&lt;P&gt;For separation of administrative roles, do not use the &lt;CODE&gt;hdfs&lt;/CODE&gt; user to create encryption zones. Instead, designate another administrative account for creating encryption keys and zones. See &lt;A href="http://docs.hortonworks.com/HDPDocuments/HDP2/HDP-2.3.0/bk_hdfs_admin_tools/content/hdfs-encr-appendix.html"&gt;Creating an HDFS Admin User&lt;/A&gt; for more information.&lt;/P&gt;</description>
      <pubDate>Tue, 19 Apr 2016 10:19:14 GMT</pubDate>
      <guid>https://community.cloudera.com/t5/Archives-of-Support-Questions/keyadmin-user-not-working-after-enabling-Kerberos/m-p/170333#M25279</guid>
      <dc:creator>rahulpathak109</dc:creator>
      <dc:date>2016-04-19T10:19:14Z</dc:date>
    </item>
  </channel>
</rss>

