<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>question understanding why mapping Kerberos principals to usernames (and groups) in Archives of Support Questions (Read Only)</title>
    <link>https://community.cloudera.com/t5/Archives-of-Support-Questions/understanding-why-mapping-Kerberos-principals-to-usernames/m-p/207359#M74077</link>
    <description>&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;Why the need to map Kerberos principals to usernames (and groups too) ?&lt;/P&gt;&lt;P&gt;AFAIU, it's all about getting (from a principal) a username and a group to match (next) with HDFS authorizations and to determine if a Kerberos principal is authorized, or not, to access a HDFS resource.&lt;/P&gt;&lt;P&gt;So my question is simple: is there another need for such Kerberos/username and Kerberos/group mapping?&lt;/P&gt;&lt;P&gt;Thanks.&lt;/P&gt;&lt;P&gt;Regards,&lt;/P&gt;&lt;P&gt;Dominique&lt;/P&gt;</description>
    <pubDate>Fri, 16 Sep 2022 12:48:30 GMT</pubDate>
    <dc:creator>ddv36a78</dc:creator>
    <dc:date>2022-09-16T12:48:30Z</dc:date>
    <item>
      <title>understanding why mapping Kerberos principals to usernames (and groups)</title>
      <link>https://community.cloudera.com/t5/Archives-of-Support-Questions/understanding-why-mapping-Kerberos-principals-to-usernames/m-p/207359#M74077</link>
      <description>&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;Why the need to map Kerberos principals to usernames (and groups too) ?&lt;/P&gt;&lt;P&gt;AFAIU, it's all about getting (from a principal) a username and a group to match (next) with HDFS authorizations and to determine if a Kerberos principal is authorized, or not, to access a HDFS resource.&lt;/P&gt;&lt;P&gt;So my question is simple: is there another need for such Kerberos/username and Kerberos/group mapping?&lt;/P&gt;&lt;P&gt;Thanks.&lt;/P&gt;&lt;P&gt;Regards,&lt;/P&gt;&lt;P&gt;Dominique&lt;/P&gt;</description>
      <pubDate>Fri, 16 Sep 2022 12:48:30 GMT</pubDate>
      <guid>https://community.cloudera.com/t5/Archives-of-Support-Questions/understanding-why-mapping-Kerberos-principals-to-usernames/m-p/207359#M74077</guid>
      <dc:creator>ddv36a78</dc:creator>
      <dc:date>2022-09-16T12:48:30Z</dc:date>
    </item>
    <item>
      <title>Re: understanding why mapping Kerberos principals to usernames (and groups)</title>
      <link>https://community.cloudera.com/t5/Archives-of-Support-Questions/understanding-why-mapping-Kerberos-principals-to-usernames/m-p/207360#M74078</link>
      <description>&lt;P&gt;Almost all the tools that are using authorization are based on usernames to authorize. I.e. in Ranger you configure username to allow access. And most of the tools could use an authorization different to Kerberos, so all of them need a mapping from the Kerberos principal to a username.&lt;/P&gt;&lt;P&gt;If you have configured SSH to accept Kerberos authentication, the system still needs to know which user has been authenticated i.e. to determine the home dir and to start the user specific environment &lt;/P&gt;</description>
      <pubDate>Wed, 31 Jan 2018 20:13:24 GMT</pubDate>
      <guid>https://community.cloudera.com/t5/Archives-of-Support-Questions/understanding-why-mapping-Kerberos-principals-to-usernames/m-p/207360#M74078</guid>
      <dc:creator>arald</dc:creator>
      <dc:date>2018-01-31T20:13:24Z</dc:date>
    </item>
  </channel>
</rss>

