<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>question Re: HDP 2.5 Ranger Knox policy only works with user in Archives of Support Questions (Read Only)</title>
    <link>https://community.cloudera.com/t5/Archives-of-Support-Questions/HDP-2-5-Ranger-Knox-policy-only-works-with-user/m-p/134735#M51906</link>
    <description>&lt;P&gt;@&lt;A rel="user" href="https://community.cloudera.com/users/354/lmccay.html" nodeid="354"&gt;lmccay&lt;/A&gt;&lt;/P&gt;&lt;P&gt;As you mentioned, the log does indicate the group search is no returning the right group&lt;/P&gt;&lt;PRE&gt;17/01/18 15:31:26 ||5725e8ba-938d-40a7-86b9-64642ad8903f|audit|WEBHDFS|hr1|||authentication|uri|/gateway/default/webhdfs/v1/hr/exempt?op=LISTSTATUS|success|
17/01/18 15:31:26 ||5725e8ba-938d-40a7-86b9-64642ad8903f|audit|WEBHDFS|hr1|||authentication|uri|/gateway/default/webhdfs/v1/hr/exempt?op=LISTSTATUS|success|Groups: []

&lt;/PRE&gt;
&lt;A rel="user" href="https://community.cloudera.com/users/354/lmccay.html" nodeid="354"&gt;&lt;/A&gt;&lt;P&gt;How do I config knox to do group lookup? Don't see anything in my topology related to group lookup&lt;/P&gt;&lt;PRE&gt;&amp;lt;topology&amp;gt;
            &amp;lt;gateway&amp;gt;
                &amp;lt;provider&amp;gt;
                    &amp;lt;role&amp;gt;authentication&amp;lt;/role&amp;gt;
                    &amp;lt;name&amp;gt;ShiroProvider&amp;lt;/name&amp;gt;
                    &amp;lt;enabled&amp;gt;true&amp;lt;/enabled&amp;gt;
                    &amp;lt;param&amp;gt;
                        &amp;lt;name&amp;gt;sessionTimeout&amp;lt;/name&amp;gt;
                        &amp;lt;value&amp;gt;30&amp;lt;/value&amp;gt;
                    &amp;lt;/param&amp;gt;
                    &amp;lt;param&amp;gt;
                        &amp;lt;name&amp;gt;main.ldapRealm&amp;lt;/name&amp;gt;
                        &amp;lt;value&amp;gt;org.apache.hadoop.gateway.shirorealm.KnoxLdapRealm&amp;lt;/value&amp;gt; 
                    &amp;lt;/param&amp;gt;


&amp;lt;!-- changes for AD/user sync --&amp;gt;

&amp;lt;param&amp;gt;
    &amp;lt;name&amp;gt;main.ldapContextFactory&amp;lt;/name&amp;gt;
    &amp;lt;value&amp;gt;org.apache.hadoop.gateway.shirorealm.KnoxLdapContextFactory&amp;lt;/value&amp;gt;
&amp;lt;/param&amp;gt;

&amp;lt;!-- main.ldapRealm.contextFactory needs to be placed before other main.ldapRealm.contextFactory* entries  --&amp;gt;
&amp;lt;param&amp;gt;
    &amp;lt;name&amp;gt;main.ldapRealm.contextFactory&amp;lt;/name&amp;gt;
    &amp;lt;value&amp;gt;$ldapContextFactory&amp;lt;/value&amp;gt;
&amp;lt;/param&amp;gt;

&amp;lt;!-- AD url --&amp;gt;
&amp;lt;param&amp;gt;
    &amp;lt;name&amp;gt;main.ldapRealm.contextFactory.url&amp;lt;/name&amp;gt;
    &amp;lt;value&amp;gt;ldap://qwang-kdc-ldap.field.hortonworks.com:389&amp;lt;/value&amp;gt; 
&amp;lt;/param&amp;gt;

&amp;lt;!-- system user --&amp;gt;
&amp;lt;param&amp;gt;
    &amp;lt;name&amp;gt;main.ldapRealm.contextFactory.systemUsername&amp;lt;/name&amp;gt;
    &amp;lt;value&amp;gt;cn=admin,dc=field,dc=hortonworks,dc=com&amp;lt;/value&amp;gt;
&amp;lt;/param&amp;gt;

&amp;lt;!-- pass in the password using the alias created earlier --&amp;gt;
&amp;lt;param&amp;gt;
    &amp;lt;name&amp;gt;main.ldapRealm.contextFactory.systemPassword&amp;lt;/name&amp;gt;
    &amp;lt;value&amp;gt;password&amp;lt;/value&amp;gt;
&amp;lt;/param&amp;gt;

                    &amp;lt;param&amp;gt;
                        &amp;lt;name&amp;gt;main.ldapRealm.contextFactory.authenticationMechanism&amp;lt;/name&amp;gt;
                        &amp;lt;value&amp;gt;simple&amp;lt;/value&amp;gt;
                    &amp;lt;/param&amp;gt;
                    &amp;lt;param&amp;gt;
                        &amp;lt;name&amp;gt;urls./**&amp;lt;/name&amp;gt;
                        &amp;lt;value&amp;gt;authcBasic&amp;lt;/value&amp;gt; 
                    &amp;lt;/param&amp;gt;


&amp;lt;!--  AD groups of users to allow --&amp;gt;
&amp;lt;param&amp;gt;
    &amp;lt;name&amp;gt;main.ldapRealm.searchBase&amp;lt;/name&amp;gt;
    &amp;lt;value&amp;gt;ou=Users,dc=field,dc=hortonworks,dc=com&amp;lt;/value&amp;gt;
&amp;lt;/param&amp;gt;
&amp;lt;param&amp;gt;
    &amp;lt;name&amp;gt;main.ldapRealm.userObjectClass&amp;lt;/name&amp;gt;
    &amp;lt;value&amp;gt;person&amp;lt;/value&amp;gt;
&amp;lt;/param&amp;gt;
&amp;lt;param&amp;gt;
    &amp;lt;name&amp;gt;main.ldapRealm.userSearchAttributeName&amp;lt;/name&amp;gt;
    &amp;lt;value&amp;gt;uid&amp;lt;/value&amp;gt;
&amp;lt;/param&amp;gt;


&amp;lt;!-- changes needed for group sync--&amp;gt;
&amp;lt;param&amp;gt;
    &amp;lt;name&amp;gt;main.ldapRealm.authorizationEnabled&amp;lt;/name&amp;gt;
    &amp;lt;value&amp;gt;true&amp;lt;/value&amp;gt;
&amp;lt;/param&amp;gt;
&amp;lt;param&amp;gt;
    &amp;lt;name&amp;gt;main.ldapRealm.groupSearchBase&amp;lt;/name&amp;gt;
    &amp;lt;value&amp;gt;ou=Groups,dc=field,dc=hortonworks,dc=com&amp;lt;/value&amp;gt;
&amp;lt;/param&amp;gt;
&amp;lt;param&amp;gt;
    &amp;lt;name&amp;gt;main.ldapRealm.groupObjectClass&amp;lt;/name&amp;gt;
    &amp;lt;value&amp;gt;posixgroup&amp;lt;/value&amp;gt;
&amp;lt;/param&amp;gt;
&amp;lt;param&amp;gt;
    &amp;lt;name&amp;gt;main.ldapRealm.groupIdAttribute&amp;lt;/name&amp;gt;
    &amp;lt;value&amp;gt;cn&amp;lt;/value&amp;gt;
&amp;lt;/param&amp;gt;
                &amp;lt;/provider&amp;gt;
                &amp;lt;provider&amp;gt;
                    &amp;lt;role&amp;gt;identity-assertion&amp;lt;/role&amp;gt;
                    &amp;lt;name&amp;gt;Default&amp;lt;/name&amp;gt;
                    &amp;lt;enabled&amp;gt;true&amp;lt;/enabled&amp;gt;
                &amp;lt;/provider&amp;gt;
                &amp;lt;provider&amp;gt;
                    &amp;lt;role&amp;gt;authorization&amp;lt;/role&amp;gt;
                    &amp;lt;name&amp;gt;XASecurePDPKnox&amp;lt;/name&amp;gt;
                    &amp;lt;enabled&amp;gt;true&amp;lt;/enabled&amp;gt;
                &amp;lt;/provider&amp;gt;
            &amp;lt;/gateway&amp;gt;
            
            &amp;lt;service&amp;gt;
                &amp;lt;role&amp;gt;NAMENODE&amp;lt;/role&amp;gt;
                &amp;lt;url&amp;gt;hdfs://{{namenode_host}}:{{namenode_rpc_port}}&amp;lt;/url&amp;gt;
            &amp;lt;/service&amp;gt;
            &amp;lt;service&amp;gt;
                &amp;lt;role&amp;gt;JOBTRACKER&amp;lt;/role&amp;gt;
                &amp;lt;url&amp;gt;rpc://{{rm_host}}:{{jt_rpc_port}}&amp;lt;/url&amp;gt;
            &amp;lt;/service&amp;gt;
            &amp;lt;service&amp;gt;
                &amp;lt;role&amp;gt;WEBHDFS&amp;lt;/role&amp;gt;
                &amp;lt;url&amp;gt;http://{{namenode_host}}:{{namenode_http_port}}/webhdfs&amp;lt;/url&amp;gt;
            &amp;lt;/service&amp;gt;
            &amp;lt;service&amp;gt;
                &amp;lt;role&amp;gt;WEBHCAT&amp;lt;/role&amp;gt;
                &amp;lt;url&amp;gt;http://{{webhcat_server_host}}:{{templeton_port}}/templeton&amp;lt;/url&amp;gt;
            &amp;lt;/service&amp;gt;
            &amp;lt;service&amp;gt;
                &amp;lt;role&amp;gt;OOZIE&amp;lt;/role&amp;gt;
                &amp;lt;url&amp;gt;http://{{oozie_server_host}}:{{oozie_server_port}}/oozie&amp;lt;/url&amp;gt;
            &amp;lt;/service&amp;gt;
            &amp;lt;service&amp;gt;
                &amp;lt;role&amp;gt;WEBHBASE&amp;lt;/role&amp;gt;
                &amp;lt;url&amp;gt;http://{{hbase_master_host}}:{{hbase_master_port}}&amp;lt;/url&amp;gt;
            &amp;lt;/service&amp;gt;
            &amp;lt;service&amp;gt;
                &amp;lt;role&amp;gt;HIVE&amp;lt;/role&amp;gt;
                &amp;lt;url&amp;gt;http://{{hive_server_host}}:{{hive_http_port}}/{{hive_http_path}}&amp;lt;/url&amp;gt;
            &amp;lt;/service&amp;gt;
            &amp;lt;service&amp;gt;
                &amp;lt;role&amp;gt;RESOURCEMANAGER&amp;lt;/role&amp;gt;
                &amp;lt;url&amp;gt;http://{{rm_host}}:{{rm_port}}/ws&amp;lt;/url&amp;gt;
            &amp;lt;/service&amp;gt;
        &amp;lt;/topology&amp;gt;

&lt;/PRE&gt;</description>
    <pubDate>Thu, 19 Jan 2017 04:23:03 GMT</pubDate>
    <dc:creator>qiwang</dc:creator>
    <dc:date>2017-01-19T04:23:03Z</dc:date>
    <item>
      <title>HDP 2.5 Ranger Knox policy only works with user</title>
      <link>https://community.cloudera.com/t5/Archives-of-Support-Questions/HDP-2-5-Ranger-Knox-policy-only-works-with-user/m-p/134733#M51904</link>
      <description>&lt;P&gt;HDP 2.5 secured cluster with Knox installed as gateway. Ranger policy is create for default topology and WEBHDFS service. However when the policy only contains only hr group which hr1 user is part of, I got error from gateway request&lt;/P&gt;&lt;PRE&gt;curl -ik -u hr1 &lt;A href="https://&amp;lt;knox-gateway&amp;gt;:8443/gateway/default/webhdfs/v1/hr/exempt?op=LISTSTATUS" target="_blank" rel="nofollow noopener noreferrer"&gt;https://&amp;lt;knox-gateway&amp;gt;:8443/gateway/default/webhdfs/v1/hr/exempt?op=LISTSTATUS&lt;/A&gt;

&amp;lt;html&amp;gt;
&amp;lt;head&amp;gt;
&amp;lt;meta http-equiv="Content-Type" content="text/html; charset=UTF-8"/&amp;gt;
&amp;lt;title&amp;gt;Error 403 Forbidden&amp;lt;/title&amp;gt;
&amp;lt;/head&amp;gt;
&amp;lt;body&amp;gt;&amp;lt;h2&amp;gt;HTTP ERROR 403&amp;lt;/h2&amp;gt;
&amp;lt;p&amp;gt;Problem accessing /gateway/default/webhdfs/v1/hr/exempt. Reason:
&amp;lt;pre&amp;gt;    Forbidden&amp;lt;/pre&amp;gt;&amp;lt;/p&amp;gt;&amp;lt;hr&amp;gt;&amp;lt;i&amp;gt;&amp;lt;small&amp;gt;Powered by Jetty://&amp;lt;/small&amp;gt;&amp;lt;/i&amp;gt;&amp;lt;hr/&amp;gt;


&amp;lt;/body&amp;gt;
&amp;lt;/html&amp;gt;
&lt;/PRE&gt;&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="11497-screen-shot-2017-01-18-at-102746-am.png" style="width: 2256px;"&gt;&lt;img src="https://community.cloudera.com/t5/image/serverpage/image-id/22108i8B004E6585F9EDD6/image-size/medium?v=v2&amp;amp;px=400" role="button" title="11497-screen-shot-2017-01-18-at-102746-am.png" alt="11497-screen-shot-2017-01-18-at-102746-am.png" /&gt;&lt;/span&gt;&lt;/P&gt;&lt;P&gt;When user hr1 is included in the policy, it works fine&lt;/P&gt;&lt;PRE&gt;curl -ik -u hr1 &lt;A href="https://&amp;lt;knox-gateway&amp;gt;:8443/gateway/default/webhdfs/v1/hr/exempt?op=LISTSTATUS" target="_blank" rel="nofollow noopener noreferrer"&gt;https://&amp;lt;knox-gateway&amp;gt;:8443/gateway/default/webhdfs/v1/hr/exempt?op=LISTSTATUS&lt;/A&gt;


{"FileStatuses":{"FileStatus":[{"accessTime":1483632050751,"blockSize":134217728,"childrenNum":0,"fileId":152421,"group":"hr","length":23,"modificationTime":1483632051087,"owner":"hdfs","pathSuffix":"testfile","permission":"644","replication":3,"storagePolicy":0,"type":"FILE"}]}}&lt;/PRE&gt;&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="11498-screen-shot-2017-01-18-at-102703-am.png" style="width: 2255px;"&gt;&lt;img src="https://community.cloudera.com/t5/image/serverpage/image-id/22109i6B8F8401A5562328/image-size/medium?v=v2&amp;amp;px=400" role="button" title="11498-screen-shot-2017-01-18-at-102703-am.png" alt="11498-screen-shot-2017-01-18-at-102703-am.png" /&gt;&lt;/span&gt;&lt;/P&gt;&lt;P&gt;This happens with other knox services as well like hive through knox. The group policy does work fine on other Ranger policies not for knox, like HDFS and Hive. Only the policies for Knox seems to have this particular problem.&lt;/P&gt;&lt;P&gt;And in HDFS custom core-site, I have&lt;/P&gt;&lt;PRE&gt;hadoop.proxyuser.knox.hosts=*
hadoop.proxyuser.knox.groups=*&lt;/PRE&gt;</description>
      <pubDate>Mon, 19 Aug 2019 09:01:03 GMT</pubDate>
      <guid>https://community.cloudera.com/t5/Archives-of-Support-Questions/HDP-2-5-Ranger-Knox-policy-only-works-with-user/m-p/134733#M51904</guid>
      <dc:creator>qiwang</dc:creator>
      <dc:date>2019-08-19T09:01:03Z</dc:date>
    </item>
    <item>
      <title>Re: HDP 2.5 Ranger Knox policy only works with user</title>
      <link>https://community.cloudera.com/t5/Archives-of-Support-Questions/HDP-2-5-Ranger-Knox-policy-only-works-with-user/m-p/134734#M51905</link>
      <description>&lt;P&gt;More than likely, you do not have group lookup configured in Knox. If you check the {GATEWAY_HOME}/logs/gateway-audit.log you will likely notice an empty array "[]" for groups with the authentication entries.&lt;/P&gt;&lt;P&gt;The groups need to be looked up by the Knox code and made available to the Ranger Knox plugin. The plugin doesn't do its own group lookup.&lt;/P&gt;&lt;P&gt;HTH&lt;/P&gt;</description>
      <pubDate>Thu, 19 Jan 2017 02:14:01 GMT</pubDate>
      <guid>https://community.cloudera.com/t5/Archives-of-Support-Questions/HDP-2-5-Ranger-Knox-policy-only-works-with-user/m-p/134734#M51905</guid>
      <dc:creator>lmccay</dc:creator>
      <dc:date>2017-01-19T02:14:01Z</dc:date>
    </item>
    <item>
      <title>Re: HDP 2.5 Ranger Knox policy only works with user</title>
      <link>https://community.cloudera.com/t5/Archives-of-Support-Questions/HDP-2-5-Ranger-Knox-policy-only-works-with-user/m-p/134735#M51906</link>
      <description>&lt;P&gt;@&lt;A rel="user" href="https://community.cloudera.com/users/354/lmccay.html" nodeid="354"&gt;lmccay&lt;/A&gt;&lt;/P&gt;&lt;P&gt;As you mentioned, the log does indicate the group search is no returning the right group&lt;/P&gt;&lt;PRE&gt;17/01/18 15:31:26 ||5725e8ba-938d-40a7-86b9-64642ad8903f|audit|WEBHDFS|hr1|||authentication|uri|/gateway/default/webhdfs/v1/hr/exempt?op=LISTSTATUS|success|
17/01/18 15:31:26 ||5725e8ba-938d-40a7-86b9-64642ad8903f|audit|WEBHDFS|hr1|||authentication|uri|/gateway/default/webhdfs/v1/hr/exempt?op=LISTSTATUS|success|Groups: []

&lt;/PRE&gt;
&lt;A rel="user" href="https://community.cloudera.com/users/354/lmccay.html" nodeid="354"&gt;&lt;/A&gt;&lt;P&gt;How do I config knox to do group lookup? Don't see anything in my topology related to group lookup&lt;/P&gt;&lt;PRE&gt;&amp;lt;topology&amp;gt;
            &amp;lt;gateway&amp;gt;
                &amp;lt;provider&amp;gt;
                    &amp;lt;role&amp;gt;authentication&amp;lt;/role&amp;gt;
                    &amp;lt;name&amp;gt;ShiroProvider&amp;lt;/name&amp;gt;
                    &amp;lt;enabled&amp;gt;true&amp;lt;/enabled&amp;gt;
                    &amp;lt;param&amp;gt;
                        &amp;lt;name&amp;gt;sessionTimeout&amp;lt;/name&amp;gt;
                        &amp;lt;value&amp;gt;30&amp;lt;/value&amp;gt;
                    &amp;lt;/param&amp;gt;
                    &amp;lt;param&amp;gt;
                        &amp;lt;name&amp;gt;main.ldapRealm&amp;lt;/name&amp;gt;
                        &amp;lt;value&amp;gt;org.apache.hadoop.gateway.shirorealm.KnoxLdapRealm&amp;lt;/value&amp;gt; 
                    &amp;lt;/param&amp;gt;


&amp;lt;!-- changes for AD/user sync --&amp;gt;

&amp;lt;param&amp;gt;
    &amp;lt;name&amp;gt;main.ldapContextFactory&amp;lt;/name&amp;gt;
    &amp;lt;value&amp;gt;org.apache.hadoop.gateway.shirorealm.KnoxLdapContextFactory&amp;lt;/value&amp;gt;
&amp;lt;/param&amp;gt;

&amp;lt;!-- main.ldapRealm.contextFactory needs to be placed before other main.ldapRealm.contextFactory* entries  --&amp;gt;
&amp;lt;param&amp;gt;
    &amp;lt;name&amp;gt;main.ldapRealm.contextFactory&amp;lt;/name&amp;gt;
    &amp;lt;value&amp;gt;$ldapContextFactory&amp;lt;/value&amp;gt;
&amp;lt;/param&amp;gt;

&amp;lt;!-- AD url --&amp;gt;
&amp;lt;param&amp;gt;
    &amp;lt;name&amp;gt;main.ldapRealm.contextFactory.url&amp;lt;/name&amp;gt;
    &amp;lt;value&amp;gt;ldap://qwang-kdc-ldap.field.hortonworks.com:389&amp;lt;/value&amp;gt; 
&amp;lt;/param&amp;gt;

&amp;lt;!-- system user --&amp;gt;
&amp;lt;param&amp;gt;
    &amp;lt;name&amp;gt;main.ldapRealm.contextFactory.systemUsername&amp;lt;/name&amp;gt;
    &amp;lt;value&amp;gt;cn=admin,dc=field,dc=hortonworks,dc=com&amp;lt;/value&amp;gt;
&amp;lt;/param&amp;gt;

&amp;lt;!-- pass in the password using the alias created earlier --&amp;gt;
&amp;lt;param&amp;gt;
    &amp;lt;name&amp;gt;main.ldapRealm.contextFactory.systemPassword&amp;lt;/name&amp;gt;
    &amp;lt;value&amp;gt;password&amp;lt;/value&amp;gt;
&amp;lt;/param&amp;gt;

                    &amp;lt;param&amp;gt;
                        &amp;lt;name&amp;gt;main.ldapRealm.contextFactory.authenticationMechanism&amp;lt;/name&amp;gt;
                        &amp;lt;value&amp;gt;simple&amp;lt;/value&amp;gt;
                    &amp;lt;/param&amp;gt;
                    &amp;lt;param&amp;gt;
                        &amp;lt;name&amp;gt;urls./**&amp;lt;/name&amp;gt;
                        &amp;lt;value&amp;gt;authcBasic&amp;lt;/value&amp;gt; 
                    &amp;lt;/param&amp;gt;


&amp;lt;!--  AD groups of users to allow --&amp;gt;
&amp;lt;param&amp;gt;
    &amp;lt;name&amp;gt;main.ldapRealm.searchBase&amp;lt;/name&amp;gt;
    &amp;lt;value&amp;gt;ou=Users,dc=field,dc=hortonworks,dc=com&amp;lt;/value&amp;gt;
&amp;lt;/param&amp;gt;
&amp;lt;param&amp;gt;
    &amp;lt;name&amp;gt;main.ldapRealm.userObjectClass&amp;lt;/name&amp;gt;
    &amp;lt;value&amp;gt;person&amp;lt;/value&amp;gt;
&amp;lt;/param&amp;gt;
&amp;lt;param&amp;gt;
    &amp;lt;name&amp;gt;main.ldapRealm.userSearchAttributeName&amp;lt;/name&amp;gt;
    &amp;lt;value&amp;gt;uid&amp;lt;/value&amp;gt;
&amp;lt;/param&amp;gt;


&amp;lt;!-- changes needed for group sync--&amp;gt;
&amp;lt;param&amp;gt;
    &amp;lt;name&amp;gt;main.ldapRealm.authorizationEnabled&amp;lt;/name&amp;gt;
    &amp;lt;value&amp;gt;true&amp;lt;/value&amp;gt;
&amp;lt;/param&amp;gt;
&amp;lt;param&amp;gt;
    &amp;lt;name&amp;gt;main.ldapRealm.groupSearchBase&amp;lt;/name&amp;gt;
    &amp;lt;value&amp;gt;ou=Groups,dc=field,dc=hortonworks,dc=com&amp;lt;/value&amp;gt;
&amp;lt;/param&amp;gt;
&amp;lt;param&amp;gt;
    &amp;lt;name&amp;gt;main.ldapRealm.groupObjectClass&amp;lt;/name&amp;gt;
    &amp;lt;value&amp;gt;posixgroup&amp;lt;/value&amp;gt;
&amp;lt;/param&amp;gt;
&amp;lt;param&amp;gt;
    &amp;lt;name&amp;gt;main.ldapRealm.groupIdAttribute&amp;lt;/name&amp;gt;
    &amp;lt;value&amp;gt;cn&amp;lt;/value&amp;gt;
&amp;lt;/param&amp;gt;
                &amp;lt;/provider&amp;gt;
                &amp;lt;provider&amp;gt;
                    &amp;lt;role&amp;gt;identity-assertion&amp;lt;/role&amp;gt;
                    &amp;lt;name&amp;gt;Default&amp;lt;/name&amp;gt;
                    &amp;lt;enabled&amp;gt;true&amp;lt;/enabled&amp;gt;
                &amp;lt;/provider&amp;gt;
                &amp;lt;provider&amp;gt;
                    &amp;lt;role&amp;gt;authorization&amp;lt;/role&amp;gt;
                    &amp;lt;name&amp;gt;XASecurePDPKnox&amp;lt;/name&amp;gt;
                    &amp;lt;enabled&amp;gt;true&amp;lt;/enabled&amp;gt;
                &amp;lt;/provider&amp;gt;
            &amp;lt;/gateway&amp;gt;
            
            &amp;lt;service&amp;gt;
                &amp;lt;role&amp;gt;NAMENODE&amp;lt;/role&amp;gt;
                &amp;lt;url&amp;gt;hdfs://{{namenode_host}}:{{namenode_rpc_port}}&amp;lt;/url&amp;gt;
            &amp;lt;/service&amp;gt;
            &amp;lt;service&amp;gt;
                &amp;lt;role&amp;gt;JOBTRACKER&amp;lt;/role&amp;gt;
                &amp;lt;url&amp;gt;rpc://{{rm_host}}:{{jt_rpc_port}}&amp;lt;/url&amp;gt;
            &amp;lt;/service&amp;gt;
            &amp;lt;service&amp;gt;
                &amp;lt;role&amp;gt;WEBHDFS&amp;lt;/role&amp;gt;
                &amp;lt;url&amp;gt;http://{{namenode_host}}:{{namenode_http_port}}/webhdfs&amp;lt;/url&amp;gt;
            &amp;lt;/service&amp;gt;
            &amp;lt;service&amp;gt;
                &amp;lt;role&amp;gt;WEBHCAT&amp;lt;/role&amp;gt;
                &amp;lt;url&amp;gt;http://{{webhcat_server_host}}:{{templeton_port}}/templeton&amp;lt;/url&amp;gt;
            &amp;lt;/service&amp;gt;
            &amp;lt;service&amp;gt;
                &amp;lt;role&amp;gt;OOZIE&amp;lt;/role&amp;gt;
                &amp;lt;url&amp;gt;http://{{oozie_server_host}}:{{oozie_server_port}}/oozie&amp;lt;/url&amp;gt;
            &amp;lt;/service&amp;gt;
            &amp;lt;service&amp;gt;
                &amp;lt;role&amp;gt;WEBHBASE&amp;lt;/role&amp;gt;
                &amp;lt;url&amp;gt;http://{{hbase_master_host}}:{{hbase_master_port}}&amp;lt;/url&amp;gt;
            &amp;lt;/service&amp;gt;
            &amp;lt;service&amp;gt;
                &amp;lt;role&amp;gt;HIVE&amp;lt;/role&amp;gt;
                &amp;lt;url&amp;gt;http://{{hive_server_host}}:{{hive_http_port}}/{{hive_http_path}}&amp;lt;/url&amp;gt;
            &amp;lt;/service&amp;gt;
            &amp;lt;service&amp;gt;
                &amp;lt;role&amp;gt;RESOURCEMANAGER&amp;lt;/role&amp;gt;
                &amp;lt;url&amp;gt;http://{{rm_host}}:{{rm_port}}/ws&amp;lt;/url&amp;gt;
            &amp;lt;/service&amp;gt;
        &amp;lt;/topology&amp;gt;

&lt;/PRE&gt;</description>
      <pubDate>Thu, 19 Jan 2017 04:23:03 GMT</pubDate>
      <guid>https://community.cloudera.com/t5/Archives-of-Support-Questions/HDP-2-5-Ranger-Knox-policy-only-works-with-user/m-p/134735#M51906</guid>
      <dc:creator>qiwang</dc:creator>
      <dc:date>2017-01-19T04:23:03Z</dc:date>
    </item>
    <item>
      <title>Re: HDP 2.5 Ranger Knox policy only works with user</title>
      <link>https://community.cloudera.com/t5/Archives-of-Support-Questions/HDP-2-5-Ranger-Knox-policy-only-works-with-user/m-p/134736#M51907</link>
      <description>&lt;P&gt;Hi &lt;A rel="user" href="https://community.cloudera.com/users/3090/qiwang.html" nodeid="3090"&gt;@Qi Wang&lt;/A&gt;,&lt;/P&gt;&lt;P&gt;This may also help where I have answered a similar question.&lt;/P&gt;&lt;P&gt;&lt;A href="https://community.hortonworks.com/questions/74501/how-knox-pass-the-user-information-to-ranger.html"&gt;https://community.hortonworks.com/questions/74501/how-knox-pass-the-user-information-to-ranger.html&lt;/A&gt;&lt;/P&gt;</description>
      <pubDate>Thu, 19 Jan 2017 06:07:56 GMT</pubDate>
      <guid>https://community.cloudera.com/t5/Archives-of-Support-Questions/HDP-2-5-Ranger-Knox-policy-only-works-with-user/m-p/134736#M51907</guid>
      <dc:creator>dvillarreal</dc:creator>
      <dc:date>2017-01-19T06:07:56Z</dc:date>
    </item>
    <item>
      <title>Re: HDP 2.5 Ranger Knox policy only works with user</title>
      <link>https://community.cloudera.com/t5/Archives-of-Support-Questions/HDP-2-5-Ranger-Knox-policy-only-works-with-user/m-p/134737#M51908</link>
      <description>&lt;P&gt;@&lt;A rel="user" href="https://community.cloudera.com/users/509/dvillarreal.html" nodeid="509"&gt;dvillarreal&lt;/A&gt;&lt;/P&gt;&lt;P&gt;I read your comments on &lt;/P&gt;&lt;P&gt;&lt;A href="https://community.hortonworks.com/articles/38348/ranger-is-not-allowing-access-to-knox-resources-wh.html"&gt;https://community.hortonworks.com/articles/38348/ranger-is-not-allowing-access-to-knox-resources-wh.html&lt;/A&gt;&lt;/P&gt;&lt;P&gt;If you look at my topology, it contains the group section just like in your post. The only difference I could think of is that I use open-ldap as the directory server rather than AD. And the values for object class and attributes are different than AD.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;PRE&gt;&amp;lt;param&amp;gt;
    &amp;lt;name&amp;gt;main.ldapRealm.authorizationEnabled&amp;lt;/name&amp;gt;
    &amp;lt;value&amp;gt;true&amp;lt;/value&amp;gt;
&amp;lt;/param&amp;gt;
&amp;lt;param&amp;gt;
    &amp;lt;name&amp;gt;main.ldapRealm.groupSearchBase&amp;lt;/name&amp;gt;
    &amp;lt;value&amp;gt;ou=Groups,dc=field,dc=hortonworks,dc=com&amp;lt;/value&amp;gt;
&amp;lt;/param&amp;gt;
&amp;lt;param&amp;gt;
    &amp;lt;name&amp;gt;main.ldapRealm.groupObjectClass&amp;lt;/name&amp;gt;
    &amp;lt;value&amp;gt;posixgroup&amp;lt;/value&amp;gt;
&amp;lt;/param&amp;gt;
&amp;lt;param&amp;gt;
    &amp;lt;name&amp;gt;main.ldapRealm.groupIdAttribute&amp;lt;/name&amp;gt;
    &amp;lt;value&amp;gt;cn&amp;lt;/value&amp;gt;
&amp;lt;/param&amp;gt;
&lt;/PRE&gt;</description>
      <pubDate>Thu, 19 Jan 2017 07:09:06 GMT</pubDate>
      <guid>https://community.cloudera.com/t5/Archives-of-Support-Questions/HDP-2-5-Ranger-Knox-policy-only-works-with-user/m-p/134737#M51908</guid>
      <dc:creator>qiwang</dc:creator>
      <dc:date>2017-01-19T07:09:06Z</dc:date>
    </item>
    <item>
      <title>Re: HDP 2.5 Ranger Knox policy only works with user</title>
      <link>https://community.cloudera.com/t5/Archives-of-Support-Questions/HDP-2-5-Ranger-Knox-policy-only-works-with-user/m-p/134738#M51909</link>
      <description>&lt;P&gt;Hi &lt;A rel="user" href="https://community.cloudera.com/users/3090/qiwang.html" nodeid="3090"&gt;@Qi Wang&lt;/A&gt;&lt;/P&gt;&lt;P&gt;This should help you to learn by example when it comes to configuring your knox groups and how it relates to your ldapsearch. See Sample 4 specifically   &lt;A href="https://cwiki.apache.org/confluence/display/KNOX/Using+Apache+Knox+with+ActiveDirectory"&gt;https://cwiki.apache.org/confluence/display/KNOX/Using+Apache+Knox+with+ActiveDirectory&lt;/A&gt;&lt;/P&gt;&lt;P&gt;Hope this helps.  &lt;/P&gt;</description>
      <pubDate>Fri, 20 Jan 2017 03:34:00 GMT</pubDate>
      <guid>https://community.cloudera.com/t5/Archives-of-Support-Questions/HDP-2-5-Ranger-Knox-policy-only-works-with-user/m-p/134738#M51909</guid>
      <dc:creator>dvillarreal</dc:creator>
      <dc:date>2017-01-20T03:34:00Z</dc:date>
    </item>
  </channel>
</rss>

