<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>question Re: Cloudera Security kerberos load on Windows AD in Archives of Support Questions (Read Only)</title>
    <link>https://community.cloudera.com/t5/Archives-of-Support-Questions/Cloudera-Security-kerberos-load-on-Windows-AD/m-p/1991#M324</link>
    <description>&lt;P&gt;To add to this, Cloudera Manager uses the kadmin interface to generate the service principles. Windows AD does not support the kerberos kadmin interface from my understanding. You will be better off setting up a MIT based Kdc on a linux system and then configuring cross-realm trust with your AD server.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;-roland&lt;/P&gt;</description>
    <pubDate>Wed, 02 Oct 2013 23:50:06 GMT</pubDate>
    <dc:creator>Rolando</dc:creator>
    <dc:date>2013-10-02T23:50:06Z</dc:date>
    <item>
      <title>Cloudera Security kerberos load on Windows AD</title>
      <link>https://community.cloudera.com/t5/Archives-of-Support-Questions/Cloudera-Security-kerberos-load-on-Windows-AD/m-p/1943#M321</link>
      <description>&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Hi there&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;When we implement Cloudera Manager Security with kerberos.&lt;/P&gt;&lt;P&gt;and we connect to our windows AD for as KDC.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;What will the impact / load be on the windows AD ?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;can i get some information/numbers about that?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Thank you&lt;/P&gt;</description>
      <pubDate>Fri, 16 Sep 2022 08:48:26 GMT</pubDate>
      <guid>https://community.cloudera.com/t5/Archives-of-Support-Questions/Cloudera-Security-kerberos-load-on-Windows-AD/m-p/1943#M321</guid>
      <dc:creator>bertbert98</dc:creator>
      <dc:date>2022-09-16T08:48:26Z</dc:date>
    </item>
    <item>
      <title>Re: Cloudera Security kerberos load on Windows AD</title>
      <link>https://community.cloudera.com/t5/Archives-of-Support-Questions/Cloudera-Security-kerberos-load-on-Windows-AD/m-p/1981#M322</link>
      <description>&lt;P&gt;It can have significant impact. &amp;nbsp;This is why we do not document or support direct configuration against the AD server as a kerberos KDC.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Todd&lt;/P&gt;</description>
      <pubDate>Wed, 02 Oct 2013 23:35:50 GMT</pubDate>
      <guid>https://community.cloudera.com/t5/Archives-of-Support-Questions/Cloudera-Security-kerberos-load-on-Windows-AD/m-p/1981#M322</guid>
      <dc:creator>Grizzly</dc:creator>
      <dc:date>2013-10-02T23:35:50Z</dc:date>
    </item>
    <item>
      <title>Re: Cloudera Security kerberos load on Windows AD</title>
      <link>https://community.cloudera.com/t5/Archives-of-Support-Questions/Cloudera-Security-kerberos-load-on-Windows-AD/m-p/1985#M323</link>
      <description>&lt;P&gt;Make sure you "want" kerberos security configured. &amp;nbsp;Disable NameNode HA Auto Failover and Jobtracker HA before starting. &amp;nbsp;If HBASE is in use, you will want to review if you want to keep kerberos enabled. &amp;nbsp;Once you enable kerberos, disabling kerberos can become a complex process as you have to go into zookeeper and remove ACL's over those znode entries, while kerberos is still enabled.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Set up a your cluster KDC, on the CM server for example. &amp;nbsp;If you are on RHEL, Follow the steps here:&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;A target="_blank" href="https://access.redhat.com/site/documentation/en-US/Red_Hat_Enterprise_Linux/6/html/Managing_Smart_Cards/Configuring_a_Kerberos_5_Server.html"&gt;https://access.redhat.com/site/documentation/en-US/Red_Hat_Enterprise_Linux/6/html/Managing_Smart_Cards/Configuring_a_Kerberos_5_Server.html&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Make sure to enable ticket renewal in your kdc/krb4 configs right away before starting on the steps laid out in our guide to enabling hadoop security with cloudera manager&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;A target="_blank" href="http://www.cloudera.com/content/cloudera-content/cloudera-docs/CM4Ent/latest/Configuring-Hadoop-Security-with-Cloudera-Manager/cmchs_using_cm_sec_config.html."&gt;http://www.cloudera.com/content/cloudera-content/cloudera-docs/CM4Ent/latest/Configuring-Hadoop-Security-with-Cloudera-Manager/cmchs_using_cm_sec_config.html.&lt;/A&gt;&lt;/P&gt;</description>
      <pubDate>Wed, 02 Oct 2013 23:45:18 GMT</pubDate>
      <guid>https://community.cloudera.com/t5/Archives-of-Support-Questions/Cloudera-Security-kerberos-load-on-Windows-AD/m-p/1985#M323</guid>
      <dc:creator>Grizzly</dc:creator>
      <dc:date>2013-10-02T23:45:18Z</dc:date>
    </item>
    <item>
      <title>Re: Cloudera Security kerberos load on Windows AD</title>
      <link>https://community.cloudera.com/t5/Archives-of-Support-Questions/Cloudera-Security-kerberos-load-on-Windows-AD/m-p/1991#M324</link>
      <description>&lt;P&gt;To add to this, Cloudera Manager uses the kadmin interface to generate the service principles. Windows AD does not support the kerberos kadmin interface from my understanding. You will be better off setting up a MIT based Kdc on a linux system and then configuring cross-realm trust with your AD server.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;-roland&lt;/P&gt;</description>
      <pubDate>Wed, 02 Oct 2013 23:50:06 GMT</pubDate>
      <guid>https://community.cloudera.com/t5/Archives-of-Support-Questions/Cloudera-Security-kerberos-load-on-Windows-AD/m-p/1991#M324</guid>
      <dc:creator>Rolando</dc:creator>
      <dc:date>2013-10-02T23:50:06Z</dc:date>
    </item>
  </channel>
</rss>

