<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>question Re: unable to authenticate as &amp;quot;username&amp;quot; to cluster after enabling kerberos in Archives of Support Questions (Read Only)</title>
    <link>https://community.cloudera.com/t5/Archives-of-Support-Questions/unable-to-authenticate-as-quot-username-quot-to-cluster/m-p/235530#M84750</link>
    <description>&lt;P&gt;&lt;A href="https://community.hortonworks.com/questions/227267/unable-to-authenticate-as-username-to-cluster-afte.html#"&gt;@Narendra Neerukonda&lt;/A&gt;
&lt;/P&gt;&lt;P&gt;There is a place in the Ambari UI to set "additional realms".  This is a comma-delimited list of realm names that Ambari will use to generate special auth-to-local rules.  For each realm, Ambari will add the following rule&lt;/P&gt;&lt;PRE&gt;RULE:[1:$1@$0](.*@REALM)s/@.*//&lt;/PRE&gt;&lt;P&gt;For your example, you will add "EXAMPLE.COM" to the additional realms field.  Ambari will then add the following rule to all auth-to-local rule properties it knows about:&lt;/P&gt;&lt;PRE&gt;RULE:[1:$1@$0](.*@EXAMPLE.COM)s/@.*//&lt;/PRE&gt;&lt;P&gt;Then principal names like user@EXAMPLE.COM will be translated into "username" when services are perform auto-to-local rule translations.&lt;/P&gt;&lt;P&gt;The "Additional Realms" field is found in the administrative Kerberos view... not to be confused with the Kerberos service view. &lt;/P&gt;&lt;P&gt;Make sure that you have also edited the krb5.conf template that Ambari uses to generate the krb5.conf files so that the realm is known to the Kerberos infrastructure.  I assume that you already did this since you are able to kinit as a user from EXAMPLE.COM. Also, make sure that you established a trust relationship between the MIT KDC and the Active Directory.  Else, even though you are able to kinit, services will not trust Kerberos tokens for that user and fail authentication. Looking at the error you are seeing, I assume you did this as well since the user appears to have been authenticated.&lt;/P&gt;</description>
    <pubDate>Wed, 07 Nov 2018 22:53:20 GMT</pubDate>
    <dc:creator>rlevas</dc:creator>
    <dc:date>2018-11-07T22:53:20Z</dc:date>
    <item>
      <title>unable to authenticate as "username" to cluster after enabling kerberos</title>
      <link>https://community.cloudera.com/t5/Archives-of-Support-Questions/unable-to-authenticate-as-quot-username-quot-to-cluster/m-p/235529#M84749</link>
      <description>&lt;P&gt;I enabled kerbros using MIT KDC. MIT KDC has a trust setup with Active Directory. Say my AD realm was "EXAMPLE.COM" and local realm was "HADOOP.CLUSTERNAME.EXAMPLE.COM".&lt;/P&gt;&lt;P&gt;When i do a kinit &amp;lt;username&amp;gt;@EXAMPLE.COM, i'm able to get a kerberos ticket from the Active Directory. Now this should allow me to use hadoop as "username". However, instead it allows me to use only if i'm "username@EXAMPLE.COM".&lt;/P&gt;&lt;P&gt;Ex 1:&lt;/P&gt;&lt;P&gt;once authenticated with kerberos:&lt;/P&gt;&lt;P&gt;hadoop fs -put &amp;lt;localfile&amp;gt;  /user/&amp;lt;username&amp;gt;/   - doesn't allow&lt;/P&gt;&lt;P&gt;But,&lt;/P&gt;&lt;P&gt;hadoop fs -mkdir /user/&amp;lt;username&amp;gt;@EXAMPLE.COM&lt;/P&gt;&lt;P&gt;hadoop fs -put &amp;lt;localfile&amp;gt;   ---- this works&lt;/P&gt;&lt;P&gt;Ex 2:&lt;/P&gt;&lt;P&gt;hbase shell&lt;/P&gt;&lt;P&gt;user "username" has permission to access a table but, won't be allowed to access the table unless "username@EXAMPLE.COM" has access to table (or in other words):&lt;/P&gt;&lt;P&gt;after kinit &amp;lt;username&amp;gt;@EXAMPLE.COM&lt;/P&gt;&lt;P&gt;grant '&amp;lt;username&amp;gt;','R','tablename' --- will not allow me to access the table whereas grant '&amp;lt;username@EXAMPLE.COM&amp;gt;','R','tablename' will allow me to access the table. &lt;/P&gt;</description>
      <pubDate>Fri, 16 Sep 2022 13:52:39 GMT</pubDate>
      <guid>https://community.cloudera.com/t5/Archives-of-Support-Questions/unable-to-authenticate-as-quot-username-quot-to-cluster/m-p/235529#M84749</guid>
      <dc:creator>narendra_klu9</dc:creator>
      <dc:date>2022-09-16T13:52:39Z</dc:date>
    </item>
    <item>
      <title>Re: unable to authenticate as "username" to cluster after enabling kerberos</title>
      <link>https://community.cloudera.com/t5/Archives-of-Support-Questions/unable-to-authenticate-as-quot-username-quot-to-cluster/m-p/235530#M84750</link>
      <description>&lt;P&gt;&lt;A href="https://community.hortonworks.com/questions/227267/unable-to-authenticate-as-username-to-cluster-afte.html#"&gt;@Narendra Neerukonda&lt;/A&gt;
&lt;/P&gt;&lt;P&gt;There is a place in the Ambari UI to set "additional realms".  This is a comma-delimited list of realm names that Ambari will use to generate special auth-to-local rules.  For each realm, Ambari will add the following rule&lt;/P&gt;&lt;PRE&gt;RULE:[1:$1@$0](.*@REALM)s/@.*//&lt;/PRE&gt;&lt;P&gt;For your example, you will add "EXAMPLE.COM" to the additional realms field.  Ambari will then add the following rule to all auth-to-local rule properties it knows about:&lt;/P&gt;&lt;PRE&gt;RULE:[1:$1@$0](.*@EXAMPLE.COM)s/@.*//&lt;/PRE&gt;&lt;P&gt;Then principal names like user@EXAMPLE.COM will be translated into "username" when services are perform auto-to-local rule translations.&lt;/P&gt;&lt;P&gt;The "Additional Realms" field is found in the administrative Kerberos view... not to be confused with the Kerberos service view. &lt;/P&gt;&lt;P&gt;Make sure that you have also edited the krb5.conf template that Ambari uses to generate the krb5.conf files so that the realm is known to the Kerberos infrastructure.  I assume that you already did this since you are able to kinit as a user from EXAMPLE.COM. Also, make sure that you established a trust relationship between the MIT KDC and the Active Directory.  Else, even though you are able to kinit, services will not trust Kerberos tokens for that user and fail authentication. Looking at the error you are seeing, I assume you did this as well since the user appears to have been authenticated.&lt;/P&gt;</description>
      <pubDate>Wed, 07 Nov 2018 22:53:20 GMT</pubDate>
      <guid>https://community.cloudera.com/t5/Archives-of-Support-Questions/unable-to-authenticate-as-quot-username-quot-to-cluster/m-p/235530#M84750</guid>
      <dc:creator>rlevas</dc:creator>
      <dc:date>2018-11-07T22:53:20Z</dc:date>
    </item>
    <item>
      <title>Re: unable to authenticate as "username" to cluster after enabling kerberos</title>
      <link>https://community.cloudera.com/t5/Archives-of-Support-Questions/unable-to-authenticate-as-quot-username-quot-to-cluster/m-p/235531#M84751</link>
      <description>&lt;P&gt;Thanks &lt;A rel="user" href="https://community.cloudera.com/users/322/rlevas.html" nodeid="322"&gt;@Robert Levas&lt;/A&gt; This fixed it.&lt;/P&gt;</description>
      <pubDate>Thu, 08 Nov 2018 03:38:10 GMT</pubDate>
      <guid>https://community.cloudera.com/t5/Archives-of-Support-Questions/unable-to-authenticate-as-quot-username-quot-to-cluster/m-p/235531#M84751</guid>
      <dc:creator>narendra_klu9</dc:creator>
      <dc:date>2018-11-08T03:38:10Z</dc:date>
    </item>
    <item>
      <title>Re: unable to authenticate as "username" to cluster after enabling kerberos</title>
      <link>https://community.cloudera.com/t5/Archives-of-Support-Questions/unable-to-authenticate-as-quot-username-quot-to-cluster/m-p/235532#M84752</link>
      <description>&lt;P&gt;&lt;A rel="user" href="https://community.cloudera.com/users/23253/narendraklu9.html" nodeid="23253"&gt;@Narendra Neerukonda&lt;/A&gt; Awesome... I am glad that I could help.  Be sure to accept my answer to close out this issue. &lt;/P&gt;</description>
      <pubDate>Thu, 08 Nov 2018 04:16:14 GMT</pubDate>
      <guid>https://community.cloudera.com/t5/Archives-of-Support-Questions/unable-to-authenticate-as-quot-username-quot-to-cluster/m-p/235532#M84752</guid>
      <dc:creator>rlevas</dc:creator>
      <dc:date>2018-11-08T04:16:14Z</dc:date>
    </item>
  </channel>
</rss>

