<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>question Re: Kerberos Integration to Active Directory failed: kinit: Preauthentication failed while getting initial credentials in Archives of Support Questions (Read Only)</title>
    <link>https://community.cloudera.com/t5/Archives-of-Support-Questions/Kerberos-Integration-to-Active-Directory-failed-kinit/m-p/158788#M57148</link>
    <description>&lt;P&gt;"Enable case insensitive username rule" is related to how principal names are translated into local username.  This happens after the Kerberos authentication process and helps to convert uppercase characters in principal names to lowercase characters which may be needed when Active Directory is involved. &lt;/P&gt;&lt;P&gt;If the Active Directory was created with a lowercase realm/domain name it is unlikely that authentication and/or validation attempts will work from the Hadoop cluster. However I think it may be possible if the Active Directory is on Windows 2008 server.&lt;/P&gt;</description>
    <pubDate>Thu, 16 Mar 2017 06:25:26 GMT</pubDate>
    <dc:creator>rlevas</dc:creator>
    <dc:date>2017-03-16T06:25:26Z</dc:date>
    <item>
      <title>Kerberos Integration to Active Directory failed: kinit: Preauthentication failed while getting initial credentials</title>
      <link>https://community.cloudera.com/t5/Archives-of-Support-Questions/Kerberos-Integration-to-Active-Directory-failed-kinit/m-p/158785#M57145</link>
      <description>&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;I am trying to enable Kerberos on my cluster (Ambari 2.4.2, HDP 2.5.3, Centos 7.3).&lt;/P&gt;&lt;P&gt;I have started following this guide:&lt;/P&gt;&lt;P&gt;&lt;A href="https://community.hortonworks.com/articles/82536/configuring-ambari-and-hadoop-for-kerberos-using-a.html" target="_blank"&gt;https://community.hortonworks.com/articles/82536/configuring-ambari-and-hadoop-for-kerberos-using-a.html&lt;/A&gt;&lt;/P&gt;&lt;P&gt;It also has a video inside.&lt;/P&gt;&lt;P&gt;After "Install Kerberos Client" step, it failed during "Test Kerberos Client" step. It failed with following shell exception:&lt;/P&gt;&lt;PRE&gt;resource_management.core.exceptions.ExecutionFailed: Execution of '/usr/bin/kinit -c /var/lib/ambari-agent/tmp/kerberos_service_check_cc_bd98b56f3fb825bccff406ea5b89a680 -kt /etc/security/keytabs/kerberos.service_check.031517.keytab mybigdev-031517@hadoopad.local' returned 1. kinit: Preauthentication failed while getting initial credentials&lt;/PRE&gt;&lt;P&gt;Then I applied another guide:&lt;/P&gt;&lt;P&gt;&lt;A href="https://www.ibm.com/support/knowledgecenter/SSPT3X_4.2.0/com.ibm.swg.im.infosphere.biginsights.admin.doc/doc/admin_kerb_activedir.html" target="_blank"&gt;https://www.ibm.com/support/knowledgecenter/SSPT3X_4.2.0/com.ibm.swg.im.infosphere.biginsights.admin.doc/doc/admin_kerb_activedir.html&lt;/A&gt;&lt;/P&gt;&lt;P&gt;I got certificate of Active Directory in to following file:&lt;/P&gt;&lt;P&gt;/etc/pki/ca-trust/source/anchors/activedirectory.pem&lt;/P&gt;&lt;P&gt;run the following commands as root user to trust CA certificate:&lt;/P&gt;&lt;PRE&gt;&lt;CODE&gt;update-ca-trust enable
&lt;/CODE&gt;update-ca-trust extract
update-ca-trust check&lt;/PRE&gt;&lt;P&gt;then added trust in Java certificate file:&lt;/P&gt;&lt;PRE&gt;&lt;CODE&gt;   mycert=/etc/pki/ca-trust/source/anchors/activedirectory.pem sudo keytool -importcert -noprompt -storepass changeit -file ${mycert} -alias ad -keystore /etc/pki/java/cacerts&lt;/CODE&gt;&lt;/PRE&gt;&lt;P&gt;It didn't work. Error was the same. I exit Kerberos wizard for any change and restart ambari-server.&lt;/P&gt;&lt;P&gt;I tried following command:&lt;/P&gt;&lt;P&gt;keytool -importcert -file activedirectory.pem -noprompt -storepass changeit -alias ad -keystore /usr/java/jdk1.8.0_73/jre/lib/security/cacerts&lt;/P&gt;&lt;P&gt;after this I listed certificates in my cert files in both location (/etc/pki/java and /usr/java/jdk...)&lt;/P&gt;&lt;P&gt;My alias was there:&lt;/P&gt;&lt;P&gt;*******&lt;/P&gt;&lt;P&gt;*******&lt;/P&gt;&lt;P&gt;Alias name: ad &lt;/P&gt;&lt;P&gt;Creation date: Mar 15, 2017 &lt;/P&gt;&lt;P&gt;Entry type: trustedCertEntry &lt;/P&gt;&lt;P&gt;Owner: CN=hadoopad-HADOOPDC-CA, DC=hadoopad, DC=local &lt;/P&gt;&lt;P&gt;Issuer: CN=hadoopad-HADOOPDC-CA, DC=hadoopad, DC=local&lt;/P&gt;&lt;P&gt;...&lt;/P&gt;&lt;P&gt;*****&lt;/P&gt;&lt;P&gt;*****&lt;/P&gt;&lt;P&gt;I also tried &lt;/P&gt;&lt;P&gt;addent -password -p ${user} -k 1 -e rc4-hmac&lt;/P&gt;&lt;P&gt;but it didn't change anything&lt;/P&gt;&lt;P&gt;then I uncommented following encryption types entries but it didn't change anything either:&lt;/P&gt;&lt;P&gt;#default_tgs_enctypes = {{encryption_types}}
#default_tkt_enctypes = {{encryption_types}}&lt;/P&gt;&lt;P&gt;Now I need you guys' comments.&lt;/P&gt;&lt;P&gt;Thanks in advance...&lt;/P&gt;</description>
      <pubDate>Fri, 16 Sep 2022 11:15:44 GMT</pubDate>
      <guid>https://community.cloudera.com/t5/Archives-of-Support-Questions/Kerberos-Integration-to-Active-Directory-failed-kinit/m-p/158785#M57145</guid>
      <dc:creator>sedatkestepe</dc:creator>
      <dc:date>2022-09-16T11:15:44Z</dc:date>
    </item>
    <item>
      <title>Re: Kerberos Integration to Active Directory failed: kinit: Preauthentication failed while getting initial credentials</title>
      <link>https://community.cloudera.com/t5/Archives-of-Support-Questions/Kerberos-Integration-to-Active-Directory-failed-kinit/m-p/158786#M57146</link>
      <description>&lt;A rel="user" href="https://community.cloudera.com/users/15282/skestepe.html" nodeid="15282"&gt;@Sedat Kestepe&lt;/A&gt;&lt;P&gt;The issue is with your realm name - &lt;STRONG&gt;hadoopad.local&lt;/STRONG&gt;.  Realm names should be in all uppercase characters in both the client (Ambari) configuration as well as on the server (AD, MIT KDC, etc...).  So the realm name should be &lt;STRONG&gt;HADOOPAD.LOCAL&lt;/STRONG&gt;.   If the Active Directory was not set up with the uppercase form, it will need to be fixed. &lt;/P&gt;</description>
      <pubDate>Thu, 16 Mar 2017 00:34:13 GMT</pubDate>
      <guid>https://community.cloudera.com/t5/Archives-of-Support-Questions/Kerberos-Integration-to-Active-Directory-failed-kinit/m-p/158786#M57146</guid>
      <dc:creator>rlevas</dc:creator>
      <dc:date>2017-03-16T00:34:13Z</dc:date>
    </item>
    <item>
      <title>Re: Kerberos Integration to Active Directory failed: kinit: Preauthentication failed while getting initial credentials</title>
      <link>https://community.cloudera.com/t5/Archives-of-Support-Questions/Kerberos-Integration-to-Active-Directory-failed-kinit/m-p/158787#M57147</link>
      <description>&lt;P&gt;&lt;A rel="user" href="https://community.cloudera.com/users/322/rlevas.html" nodeid="322"&gt;@Robert Levas&lt;/A&gt; thanks for the answer.&lt;/P&gt;&lt;P&gt;I'll try that tomorrow morning (in 12 hours)&lt;/P&gt;&lt;P&gt;There was a setting before starting kerberization:&lt;/P&gt;&lt;P&gt;Under Advanced kerberos-env section:&lt;/P&gt;&lt;P&gt;"Enable case insensitive username rules"&lt;/P&gt;&lt;P&gt;I have checked this one so thougth it would be enough. Isn't it?&lt;/P&gt;&lt;P&gt;If so, does it mean that we cannot connect an HDP cluster to an Active Directory if AD realm was defined with lower case letters?&lt;/P&gt;</description>
      <pubDate>Thu, 16 Mar 2017 03:02:51 GMT</pubDate>
      <guid>https://community.cloudera.com/t5/Archives-of-Support-Questions/Kerberos-Integration-to-Active-Directory-failed-kinit/m-p/158787#M57147</guid>
      <dc:creator>sedatkestepe</dc:creator>
      <dc:date>2017-03-16T03:02:51Z</dc:date>
    </item>
    <item>
      <title>Re: Kerberos Integration to Active Directory failed: kinit: Preauthentication failed while getting initial credentials</title>
      <link>https://community.cloudera.com/t5/Archives-of-Support-Questions/Kerberos-Integration-to-Active-Directory-failed-kinit/m-p/158788#M57148</link>
      <description>&lt;P&gt;"Enable case insensitive username rule" is related to how principal names are translated into local username.  This happens after the Kerberos authentication process and helps to convert uppercase characters in principal names to lowercase characters which may be needed when Active Directory is involved. &lt;/P&gt;&lt;P&gt;If the Active Directory was created with a lowercase realm/domain name it is unlikely that authentication and/or validation attempts will work from the Hadoop cluster. However I think it may be possible if the Active Directory is on Windows 2008 server.&lt;/P&gt;</description>
      <pubDate>Thu, 16 Mar 2017 06:25:26 GMT</pubDate>
      <guid>https://community.cloudera.com/t5/Archives-of-Support-Questions/Kerberos-Integration-to-Active-Directory-failed-kinit/m-p/158788#M57148</guid>
      <dc:creator>rlevas</dc:creator>
      <dc:date>2017-03-16T06:25:26Z</dc:date>
    </item>
    <item>
      <title>Re: Kerberos Integration to Active Directory failed: kinit: Preauthentication failed while getting initial credentials</title>
      <link>https://community.cloudera.com/t5/Archives-of-Support-Questions/Kerberos-Integration-to-Active-Directory-failed-kinit/m-p/158789#M57149</link>
      <description>&lt;P&gt;Follow up question...&lt;/P&gt;&lt;P&gt;Reverting AD Realm name seems to be a long process and risky.&lt;/P&gt;&lt;P&gt;Can anybody confirm &lt;A rel="user" href="https://community.cloudera.com/users/322/rlevas.html" nodeid="322"&gt;@Robert Levas&lt;/A&gt; ?&lt;/P&gt;&lt;P&gt;Does anybody have comments on this?&lt;/P&gt;&lt;P&gt;The thing is; I didn't see it was mentioned anywhere in guides but see it first time here.&lt;/P&gt;&lt;P&gt;I even read that host names and domain names should be in lower case in a Hortonworks blog. &lt;/P&gt;&lt;P&gt;&lt;A href="https://hortonworks.com/blog/enabling-kerberos-hdp-active-directory-integration/" target="_blank"&gt;https://hortonworks.com/blog/enabling-kerberos-hdp-active-directory-integration/&lt;/A&gt;&lt;/P&gt;&lt;P&gt;"&lt;/P&gt;&lt;H4&gt;DOMAIN_REALM&lt;/H4&gt;&lt;P&gt;provides a translation from a domain name or hostname to a Kerberos realm name. The tag name can be a host name, or a domain name, where domain names are indicated by a prefix of a period (.). Host names and domain names should be in lower case. "&lt;/P&gt;</description>
      <pubDate>Thu, 16 Mar 2017 20:28:27 GMT</pubDate>
      <guid>https://community.cloudera.com/t5/Archives-of-Support-Questions/Kerberos-Integration-to-Active-Directory-failed-kinit/m-p/158789#M57149</guid>
      <dc:creator>sedatkestepe</dc:creator>
      <dc:date>2017-03-16T20:28:27Z</dc:date>
    </item>
    <item>
      <title>Re: Kerberos Integration to Active Directory failed: kinit: Preauthentication failed while getting initial credentials</title>
      <link>https://community.cloudera.com/t5/Archives-of-Support-Questions/Kerberos-Integration-to-Active-Directory-failed-kinit/m-p/158790#M57150</link>
      <description>&lt;P&gt;Worked! It is the upper case!&lt;/P&gt;&lt;P&gt;Thank you &lt;A rel="user" href="https://community.cloudera.com/users/322/rlevas.html" nodeid="322"&gt;@Robert Levas&lt;/A&gt;!&lt;/P&gt;</description>
      <pubDate>Mon, 20 Mar 2017 13:46:08 GMT</pubDate>
      <guid>https://community.cloudera.com/t5/Archives-of-Support-Questions/Kerberos-Integration-to-Active-Directory-failed-kinit/m-p/158790#M57150</guid>
      <dc:creator>sedatkestepe</dc:creator>
      <dc:date>2017-03-20T13:46:08Z</dc:date>
    </item>
    <item>
      <title>Re: Kerberos Integration to Active Directory failed: kinit: Preauthentication failed while getting initial credentials</title>
      <link>https://community.cloudera.com/t5/Archives-of-Support-Questions/Kerberos-Integration-to-Active-Directory-failed-kinit/m-p/158791#M57151</link>
      <description>&lt;P&gt;Reverting AD Realm name seems to be a long process and risky.&lt;/P&gt;&lt;P&gt;Instead of changing Realm in AD change it in Ambari, &lt;/P&gt;&lt;P&gt;You can use the same realm in caps (Like &lt;STRONG&gt;&lt;A href="http://hadoopad.local/"&gt;HADOOPAD.LOCAL&lt;/A&gt; if it is in lower case in AD&lt;/STRONG&gt; ) in Ambari at the time of kerberos enabling, It will work.&lt;/P&gt;</description>
      <pubDate>Fri, 16 Jun 2017 18:21:13 GMT</pubDate>
      <guid>https://community.cloudera.com/t5/Archives-of-Support-Questions/Kerberos-Integration-to-Active-Directory-failed-kinit/m-p/158791#M57151</guid>
      <dc:creator>ansariabdul62</dc:creator>
      <dc:date>2017-06-16T18:21:13Z</dc:date>
    </item>
    <item>
      <title>Re: Kerberos Integration to Active Directory failed: kinit: Preauthentication failed while getting initial credentials</title>
      <link>https://community.cloudera.com/t5/Archives-of-Support-Questions/Kerberos-Integration-to-Active-Directory-failed-kinit/m-p/158792#M57152</link>
      <description>&lt;P&gt;Changing REALM to UPPERCASE in Ambari helps. No need to change in AD(it worked for me on windows server 2012 r2)&lt;/P&gt;</description>
      <pubDate>Thu, 09 Nov 2017 14:46:02 GMT</pubDate>
      <guid>https://community.cloudera.com/t5/Archives-of-Support-Questions/Kerberos-Integration-to-Active-Directory-failed-kinit/m-p/158792#M57152</guid>
      <dc:creator>KuldeepK</dc:creator>
      <dc:date>2017-11-09T14:46:02Z</dc:date>
    </item>
  </channel>
</rss>

