- Subscribe to RSS Feed
- Mark Question as New
- Mark Question as Read
- Float this Question for Current User
- Bookmark
- Subscribe
- Mute
- Printer Friendly Page
LDAP no longer supported
- Labels:
-
Cloudera Manager
-
Kerberos
Created on ‎10-06-2016 03:38 PM - edited ‎09-16-2022 03:43 AM
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
I set up my kerberized cluster with LDAP a long time ago. I am now trying to add services after upgrading to CM 5.8.2 which require more kerberos accounts on AD, and it looks like it only supports LDAPS. Is this correct?
I can add LDAPS to my AD server, but where do I put the certificate on CM?
Thank You
Created ‎10-06-2016 07:34 PM
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
Hello,
The AD certificate goes in the JVM keystore on CM:
1. On the domain controller, export the certificate in the "Base-64 encoded X.509 (.CER) format.
2. Copy the file to the Cloudera Manager host using an SCP/SSH tool such as WinSCP.
3. Import the certificate into your JVM keystore:
keytool -import -alias <alias-for-cert> -file <path-to-cert> -keystore <path-to-keystore> -storepass <keystore password>
Note: The truststore is usually located at: $JAVA_HOME/jre/lib/security/cacerts.
Created ‎10-06-2016 07:34 PM
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
Hello,
The AD certificate goes in the JVM keystore on CM:
1. On the domain controller, export the certificate in the "Base-64 encoded X.509 (.CER) format.
2. Copy the file to the Cloudera Manager host using an SCP/SSH tool such as WinSCP.
3. Import the certificate into your JVM keystore:
keytool -import -alias <alias-for-cert> -file <path-to-cert> -keystore <path-to-keystore> -storepass <keystore password>
Note: The truststore is usually located at: $JAVA_HOME/jre/lib/security/cacerts.
