Support Questions

Find answers, ask questions, and share your expertise
Announcements
Celebrating as our community reaches 100,000 members! Thank you!

kerberos MIT kdc with active directory one way trust working

avatar
Rising Star

Hi Folks,

I have configured MIT kdc which is integrated with Active directory according to referred link:

https://community.hortonworks.com/articles/59635/one-way-trust-mit-kdc-to-active-directory.html

My question is:

1. How can i test one way trust is successfully created or not?

2. Users will persist on AD server and services will persist on hadoop cluster. Should i have to create user principal in kerberos database?

3. If yes, Should be have to add principal in kerberos manually whenever new user created in AD server?

Regards,

Vinay

1 ACCEPTED SOLUTION

avatar
hide-solution

This problem has been solved!

Want to get a detailed solution you have to login/registered on the community

Register/Login
8 REPLIES 8

avatar
hide-solution

This problem has been solved!

Want to get a detailed solution you have to login/registered on the community

Register/Login

avatar

@Vinay K if one way trust is correctly configured user principals will be able to authenticate using user@AD.REALM. My understanding is now you are asking how then those UPN (user principals names) are going to be authorized by Hadoop services. For this you need to update the auth_to_local rules (in core-site.xml) and add rules for user@AD.REALM to map to user. Then you can set posix/authorization rules for this user (no longer UPN because it has been mapped using auth_to_local) using Ranger or regular hdfs posix permissions/service acl.

More here: https://community.hortonworks.com/articles/14463/auth-to-local-rules-syntax.html

Note: Please comment on this post rather than creating a new answer thanks!

avatar
Rising Star

@Felix Albani

As i understand, My solution is hidden in "mapped using auth_to_local". I have to specify policy in HDFS configuration for provide services access to users based.

Correct me if i'm wrong.

avatar

@Vinay K yes, you will need to add appropiate policies on Ranger to authorize users to resources.

avatar
Rising Star

Thanks @Felix Albani

It's working.

avatar
Rising Star
@Felix Albani

I agree with 2nd and 3rd answer.

If we use user@AD.REALM for access kerberized service on cluster, how we define service access to user@AD.REALM?

As i know, We don't need to create any service principal at AD server. Just we have to create trust with AD servers.

Can you please help me to understand the concept?

Regards,

Vinay

avatar
Contributor

@Vinay K

In a one-way trust between a trusted domain (AD Domain) and a trusting domain (MIT KDC), users or computers in the trusted domain can access resources in the trusting domain. However, users in the trusting domain cannot access resources in the trusted domain.

So basically you tell your MIT KDC to trust the users in the AD to access resources in your cluster. Service access happens the same way as for MIT KDC users. Service will ask Kerberos to authenticate, if that user is authenticated to use that service, Kerberos will check the domain of the user and accordingly if that user is from a trusted domain, Kerberos will ask the AD/LDAP to authenticate and if AD authenticates, Kerberos trusts that user and so does your service.

avatar
Rising Star

@Sparsh Singhal

Thanks for response and clear the point.

Let me test. Will get back to you.

Thanks