<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>question Re: Test cross realm kerberos in Archives of Support Questions (Read Only)</title>
    <link>https://community.cloudera.com/t5/Archives-of-Support-Questions/Test-cross-realm-kerberos/m-p/32590#M7671</link>
    <description>Glad to hear you were able to figure it out! In spirit of&lt;BR /&gt;&lt;A href="https://xkcd.com/979/," target="_blank"&gt;https://xkcd.com/979/,&lt;/A&gt; please consider sharing more details of the solution&lt;BR /&gt;and marking the topic as solved for others with similar issues.&lt;BR /&gt;&lt;BR /&gt;</description>
    <pubDate>Fri, 02 Oct 2015 13:44:55 GMT</pubDate>
    <dc:creator>Harsh J</dc:creator>
    <dc:date>2015-10-02T13:44:55Z</dc:date>
    <item>
      <title>Test cross realm kerberos</title>
      <link>https://community.cloudera.com/t5/Archives-of-Support-Questions/Test-cross-realm-kerberos/m-p/32422#M7668</link>
      <description>&lt;P&gt;I have Kerberos authentication working with a stand alone KDC. However, our next step is to allow users from another realm/domain to access the cluster. Obviously I followed the guide for cross realm configuration, but I am having little success. Does anyone know of another way to test the cross realm configuration without going through the cluster? Or at least how to turn on some more robust logging?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;The authentication always stays on the local kdc and never tries to go out to the AD. I was under the impression that once the configurations with the cross realm principals were in place, kerberos would look first locally for an acount and then remotely. However I am guessing that I am completely off base. Here are my crossrealm entries in my KDC:&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;krbtgt/DATA.FOREST.COM@DATA.FOREST.COM&lt;BR /&gt;krbtgt/DATA.FOREST.COM@FOREST.COM&lt;BR /&gt;krbtgt/FOREST.COM@DATA.FOREST.COM&lt;/P&gt;&lt;P&gt;Here is my krb5.conf:&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;[logging]&lt;BR /&gt;default = FILE:/var/log/krb5libs.log&lt;BR /&gt;kdc = FILE:/var/log/krb5kdc.log&lt;BR /&gt;admin_server = FILE:/var/log/kadmind.log&lt;/P&gt;&lt;P&gt;[libdefaults]&lt;BR /&gt;default_realm = DATA.FOREST.COM&lt;BR /&gt;dns_lookup_realm = false&lt;BR /&gt;dns_lookup_kdc = false&lt;BR /&gt;ticket_lifetime = 24h&lt;BR /&gt;renew_lifetime = 7d&lt;BR /&gt;forwardable = true&lt;/P&gt;&lt;P&gt;[realms]&lt;BR /&gt;DATA.FOREST.COM = {&lt;BR /&gt;kdc = ip-10-0-0-241.us-west-2.compute.internal&lt;BR /&gt;admin_server = ip-10-0-0-241.us-west-2.compute.internal&lt;BR /&gt;default_domain = data.forest.com&lt;/P&gt;&lt;P&gt;}&lt;BR /&gt;FOREST.COM = {&lt;BR /&gt;kdc = ip-10-0-0-251.us-west-2.compute.internal&lt;BR /&gt;admin_server = ip-10-0-0-251.us-west-2.compute.internal&lt;BR /&gt;default_domain = forest.com&lt;BR /&gt;}&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;[domain_realm]&lt;BR /&gt;.data.forest.com = DATA.FOREST.COM&lt;BR /&gt;data.forest.com = DATA.FOREST.COM&lt;BR /&gt;.forest.com = FOREST.COM&lt;BR /&gt;forest.com = FOREST.COM&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Any assistance would be appreciated.&lt;/P&gt;</description>
      <pubDate>Fri, 16 Sep 2022 09:42:03 GMT</pubDate>
      <guid>https://community.cloudera.com/t5/Archives-of-Support-Questions/Test-cross-realm-kerberos/m-p/32422#M7668</guid>
      <dc:creator>flint172</dc:creator>
      <dc:date>2022-09-16T09:42:03Z</dc:date>
    </item>
    <item>
      <title>Re: Test cross realm kerberos</title>
      <link>https://community.cloudera.com/t5/Archives-of-Support-Questions/Test-cross-realm-kerberos/m-p/32533#M7669</link>
      <description>The preferred way to test a cross-realm auth (in CDH context) is to try and obtain a cluster realm's service ticket when logged in as the remote realm.&lt;BR /&gt;&lt;BR /&gt;kinit user@REMOTEREALM&lt;BR /&gt;kvno hdfs/namenode-host@LOCALREALM&lt;BR /&gt;&lt;BR /&gt;If the service ticket obtaining fails, then Cross Realm Trust is broken.&lt;BR /&gt;&lt;BR /&gt;A lot of people also oversee/misconfigure [domain_realm]. It exists to mean an automatic mapping of hostnames to their realms, and it factors greatly into the use of cross-realm trust when dealing with service authentication.&lt;BR /&gt;&lt;BR /&gt;An ideal [domain_realm], if you have two cluster realms A (host1.a.com, host2.a.com) and B (mybhost.data.com, mychost.data.com) would look like:&lt;BR /&gt;&lt;BR /&gt;[domain_realm]&lt;BR /&gt;host1.a.com=A&lt;BR /&gt;host2.a.com=A&lt;BR /&gt;mybhost.data.com=B&lt;BR /&gt;mychost.data.com=B&lt;BR /&gt;&lt;BR /&gt;Or if you use the limited wildcard ability, if applicable range-wise:&lt;BR /&gt;&lt;BR /&gt;[domain_realm]&lt;BR /&gt;.a.com=A&lt;BR /&gt;.data.com=B&lt;BR /&gt;&lt;BR /&gt;This section helps Kerberos libraries and clients to find the right KDC to talk to when looking for a server under a specific realm (its the intelligence mapping that helps determine which service host lies in what realm).&lt;BR /&gt;&lt;BR /&gt;Another thing to remember is that the communication isn't done in fallback manner. The trust works based on the key being the same on both ends (For the krbtgt principals). That is, an encrypted token generated on one end may be trusted on another end if it can decrypt it (and since you use the same key on both sides, this is possible). The path of communication therefore is purely dependent on reaching the correct KDC for the provided principal - something [domain_realm] would help with.&lt;BR /&gt;&lt;BR /&gt;Does this help?</description>
      <pubDate>Thu, 01 Oct 2015 10:57:28 GMT</pubDate>
      <guid>https://community.cloudera.com/t5/Archives-of-Support-Questions/Test-cross-realm-kerberos/m-p/32533#M7669</guid>
      <dc:creator>Harsh J</dc:creator>
      <dc:date>2015-10-01T10:57:28Z</dc:date>
    </item>
    <item>
      <title>Re: Test cross realm kerberos</title>
      <link>https://community.cloudera.com/t5/Archives-of-Support-Questions/Test-cross-realm-kerberos/m-p/32589#M7670</link>
      <description>&lt;P&gt;Thanks this is very helpful. It seems that the problem was the encryption of the cross realm entries in the MIT KDC. Using kvno is a very quick way of testing.&lt;/P&gt;</description>
      <pubDate>Fri, 02 Oct 2015 13:33:10 GMT</pubDate>
      <guid>https://community.cloudera.com/t5/Archives-of-Support-Questions/Test-cross-realm-kerberos/m-p/32589#M7670</guid>
      <dc:creator>flint172</dc:creator>
      <dc:date>2015-10-02T13:33:10Z</dc:date>
    </item>
    <item>
      <title>Re: Test cross realm kerberos</title>
      <link>https://community.cloudera.com/t5/Archives-of-Support-Questions/Test-cross-realm-kerberos/m-p/32590#M7671</link>
      <description>Glad to hear you were able to figure it out! In spirit of&lt;BR /&gt;&lt;A href="https://xkcd.com/979/," target="_blank"&gt;https://xkcd.com/979/,&lt;/A&gt; please consider sharing more details of the solution&lt;BR /&gt;and marking the topic as solved for others with similar issues.&lt;BR /&gt;&lt;BR /&gt;</description>
      <pubDate>Fri, 02 Oct 2015 13:44:55 GMT</pubDate>
      <guid>https://community.cloudera.com/t5/Archives-of-Support-Questions/Test-cross-realm-kerberos/m-p/32590#M7671</guid>
      <dc:creator>Harsh J</dc:creator>
      <dc:date>2015-10-02T13:44:55Z</dc:date>
    </item>
    <item>
      <title>Re: Test cross realm kerberos</title>
      <link>https://community.cloudera.com/t5/Archives-of-Support-Questions/Test-cross-realm-kerberos/m-p/32594#M7672</link>
      <description>&lt;P&gt;To solve this I did a kinit &amp;lt;account&amp;gt;@FOREST.COM which goes to the remote (AD) domain and then klist -e to see what encryption types were being sent back. In my case we were getting aes256 and arcfour. The cross realm entries were only encrypted for arcfour, so I recreated the cross realm entries with all the encryption types being sent by the remote domain in my local KDC. So it looked like this:&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;addprinc -e "arcfour-hmac:normal aes256-cts-hmac-sha1-96:normal"&amp;nbsp; krbtgt/DATA.FOREST.COM@DATA.FOREST.COM&lt;BR /&gt;addprinc -e "arcfour-hmac:normal aes256-cts-hmac-sha1-96:normal"&amp;nbsp; krbtgt/DATA.FOREST.COM@FOREST.COM&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;after a restart of the local KDC things are working well. The most helpful piece was turning on debugging:&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;HADOOP_OPTS="-Dsun.security.krb5.debug=true"&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Without the debugging I had no idea it was even trying to connect to the remote domain.&lt;/P&gt;</description>
      <pubDate>Fri, 02 Oct 2015 14:12:10 GMT</pubDate>
      <guid>https://community.cloudera.com/t5/Archives-of-Support-Questions/Test-cross-realm-kerberos/m-p/32594#M7672</guid>
      <dc:creator>flint172</dc:creator>
      <dc:date>2015-10-02T14:12:10Z</dc:date>
    </item>
    <item>
      <title>Re: Test cross realm kerberos</title>
      <link>https://community.cloudera.com/t5/Archives-of-Support-Questions/Test-cross-realm-kerberos/m-p/64179#M7673</link>
      <description>&lt;P&gt;Hi Harsha,&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I need your help in Setting up Cross-Realm Auth between 2 secured clusters. How can i reach you?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Thanks,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Wed, 31 Jan 2018 13:54:13 GMT</pubDate>
      <guid>https://community.cloudera.com/t5/Archives-of-Support-Questions/Test-cross-realm-kerberos/m-p/64179#M7673</guid>
      <dc:creator>Platform</dc:creator>
      <dc:date>2018-01-31T13:54:13Z</dc:date>
    </item>
    <item>
      <title>Re: Test cross realm kerberos</title>
      <link>https://community.cloudera.com/t5/Archives-of-Support-Questions/Test-cross-realm-kerberos/m-p/64180#M7674</link>
      <description>Hi Harsha,&lt;BR /&gt;&lt;BR /&gt;Need your help in setting up cross-realm Auth. How can i contact you ?&lt;BR /&gt;&lt;BR /&gt;Thanks,&lt;BR /&gt;</description>
      <pubDate>Wed, 31 Jan 2018 13:55:17 GMT</pubDate>
      <guid>https://community.cloudera.com/t5/Archives-of-Support-Questions/Test-cross-realm-kerberos/m-p/64180#M7674</guid>
      <dc:creator>Platform</dc:creator>
      <dc:date>2018-01-31T13:55:17Z</dc:date>
    </item>
    <item>
      <title>Re: Test cross realm kerberos</title>
      <link>https://community.cloudera.com/t5/Archives-of-Support-Questions/Test-cross-realm-kerberos/m-p/64190#M7675</link>
      <description>&lt;P&gt;Hello &lt;a href="https://community.cloudera.com/t5/user/viewprofilepage/user-id/24837"&gt;@Platform&lt;/a&gt;,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Since this is a community, you get the benefit of many people looking at your questions or issues.&lt;/P&gt;&lt;P&gt;We prefer to keep our discussions here public unless there are sensitive data involved.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Please start a new thread and explain what you have tried and what the result was and I and many others will be happy to help you out.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Thanks,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Ben&lt;/P&gt;</description>
      <pubDate>Wed, 31 Jan 2018 18:01:07 GMT</pubDate>
      <guid>https://community.cloudera.com/t5/Archives-of-Support-Questions/Test-cross-realm-kerberos/m-p/64190#M7675</guid>
      <dc:creator>bgooley</dc:creator>
      <dc:date>2018-01-31T18:01:07Z</dc:date>
    </item>
    <item>
      <title>Re: Test cross realm kerberos</title>
      <link>https://community.cloudera.com/t5/Archives-of-Support-Questions/Test-cross-realm-kerberos/m-p/64993#M7676</link>
      <description>&lt;P&gt;Thanks... Following the cloudera Doc's I was able to sucessfully setup Cross-realm trust. Issue is with DNS.&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Wed, 28 Feb 2018 09:34:40 GMT</pubDate>
      <guid>https://community.cloudera.com/t5/Archives-of-Support-Questions/Test-cross-realm-kerberos/m-p/64993#M7676</guid>
      <dc:creator>Platform</dc:creator>
      <dc:date>2018-02-28T09:34:40Z</dc:date>
    </item>
  </channel>
</rss>

