This is an automated email from the ASF dual-hosted git repository.

weichiu pushed a commit to branch HDDS-9225-website-v2
in repository https://gitbox.apache.org/repos/asf/ozone-site.git


The following commit(s) were added to refs/heads/HDDS-9225-website-v2 by this 
push:
     new 9f7d87c66 HDDS-14332. [Website v2] [Docs] Move Kerberos-related 
content from Administrator Guide to System Internals (#266)
9f7d87c66 is described below

commit 9f7d87c66410b2a841190244514546feeb125c69
Author: Russole <[email protected]>
AuthorDate: Thu Jan 22 10:09:31 2026 +0800

    HDDS-14332. [Website v2] [Docs] Move Kerberos-related content from 
Administrator Guide to System Internals (#266)
---
 .../02-configuration/03-security/02-kerberos.md    | 92 ++++++----------------
 .../07-system-internals/05-security/01-kerberos.md | 53 ++++++++++++-
 2 files changed, 77 insertions(+), 68 deletions(-)

diff --git 
a/docs/05-administrator-guide/02-configuration/03-security/02-kerberos.md 
b/docs/05-administrator-guide/02-configuration/03-security/02-kerberos.md
index 196cc48c7..f0d88793f 100644
--- a/docs/05-administrator-guide/02-configuration/03-security/02-kerberos.md
+++ b/docs/05-administrator-guide/02-configuration/03-security/02-kerberos.md
@@ -8,43 +8,21 @@ Ozone depends on [Kerberos](https://web.mit.edu/kerberos/) to 
make the clusters
 
 This release of Ozone follows that model, but soon will move to *secure by 
default.* Today to enable security in Ozone cluster, we need to set the 
configuration `ozone.security.enabled` to `true` and 
`hadoop.security.authentication` to `kerberos`.
 
-| Property | Value |
-|----------|-------|
-| `ozone.security.enabled` | `true` |
+| Property                         | Value      |
+| -------------------------------- | ---------- |
+| `ozone.security.enabled`         | `true`     |
 | `hadoop.security.authentication` | `kerberos` |
 
-## Tokens
-
-Ozone uses a notion of tokens to avoid overburdening the Kerberos server. When 
you serve thousands of requests per second, involving Kerberos might not work 
well. Hence once an authentication is done, Ozone issues delegation tokens and 
block tokens to the clients. These tokens allow applications to do specified 
operations against the cluster, as if they have kerberos tickets with them. 
Ozone supports following kinds of tokens.
-
-### Delegation Token
-
-Delegation tokens allow an application to impersonate a users kerberos 
credentials. This token is based on verification of kerberos identity and is 
issued by the Ozone Manager. Delegation tokens are enabled by default when 
security is enabled.
-
-### Block Token
-
-Block tokens allow a client to read or write a block. This is needed so that 
Datanodes know that the user/client has permission to read or make 
modifications to the block.
-
-### S3AuthInfo
-
-S3 uses a very different shared secret security scheme. Ozone supports the AWS 
Signature Version 4 protocol, and from the end users perspective Ozone's S3 
feels exactly like AWS S3.
-
-The S3 credential tokens are called S3 auth info in the code. These tokens are 
also enabled by default when security is enabled.
-
-Each of the service daemons that make up Ozone needs a Kerberos service 
principal name and a corresponding [kerberos key 
tab](https://web.mit.edu/kerberos/krb5-latest/doc/basic/keytab_def.html) file.
-
-All these settings should be made in `ozone-site.xml`.
-
 ## Storage Container Manager
 
 SCM requires two Kerberos principals, and the corresponding key tab files for 
both of these principals.
 
-| Property | Description |
-|----------|-------------|
-| `hdds.scm.kerberos.principal` | The SCM service principal. e.g. 
`scm/[email protected]` |
-| `hdds.scm.kerberos.keytab.file` | The keytab file used by SCM daemon to 
login as its service principal. |
-| `hdds.scm.http.auth.kerberos.principal` | SCM HTTP server service principal 
if SPNEGO is enabled for SCM HTTP server. |
-| `hdds.scm.http.auth.kerberos.keytab` | The keytab file used by SCM HTTP 
server to login as its service principal if SPNEGO is enabled for SCM HTTP 
server. |
+| Property                                | Description                        
                                                                                
 |
+| --------------------------------------- | 
-------------------------------------------------------------------------------------------------------------------
 |
+| `hdds.scm.kerberos.principal`           | The SCM service principal. e.g. 
`scm/[email protected]`                                                           
    |
+| `hdds.scm.kerberos.keytab.file`         | The keytab file used by SCM daemon 
to login as its service principal.                                              
 |
+| `hdds.scm.http.auth.kerberos.principal` | SCM HTTP server service principal 
if SPNEGO is enabled for SCM HTTP server.                                       
  |
+| `hdds.scm.http.auth.kerberos.keytab`    | The keytab file used by SCM HTTP 
server to login as its service principal if SPNEGO is enabled for SCM HTTP 
server. |
 
 :::note
 For general configuration on enabling Kerberos based SPNEGO authentication for 
HTTP web-consoles, refer to [Configuring 
HTTPS](/docs/05-administrator-guide/02-configuration/03-security/05-encryption/01-network-encryption/03-https.md).
@@ -54,23 +32,23 @@ For general configuration on enabling Kerberos based SPNEGO 
authentication for H
 
 Like SCM, OM also requires two Kerberos principals, and the corresponding key 
tab files for both of these principals.
 
-| Property | Description |
-|----------|-------------|
-| `ozone.om.kerberos.principal` | The OzoneManager service principal. e.g. 
`om/[email protected]` |
-| `ozone.om.kerberos.keytab.file` | The keytab file used by OM daemon to login 
as its service principal. |
-| `ozone.om.http.auth.kerberos.principal` | Ozone Manager HTTP server service 
principal if SPNEGO is enabled for OM HTTP server. |
-| `ozone.om.http.auth.kerberos.keytab` | The keytab file used by OM HTTP 
server to login as its service principal if SPNEGO is enabled for OM HTTP 
server. |
+| Property                                | Description                        
                                                                               |
+| --------------------------------------- | 
-----------------------------------------------------------------------------------------------------------------
 |
+| `ozone.om.kerberos.principal`           | The OzoneManager service 
principal. e.g. `om/[email protected]`                                            
         |
+| `ozone.om.kerberos.keytab.file`         | The keytab file used by OM daemon 
to login as its service principal.                                              
|
+| `ozone.om.http.auth.kerberos.principal` | Ozone Manager HTTP server service 
principal if SPNEGO is enabled for OM HTTP server.                              
|
+| `ozone.om.http.auth.kerberos.keytab`    | The keytab file used by OM HTTP 
server to login as its service principal if SPNEGO is enabled for OM HTTP 
server. |
 
 ## S3 Gateway
 
 S3 Gateway requires one service principal and here the configuration values 
needed in the `ozone-site.xml`.
 
-| Property | Description |
-|----------|-------------|
-| `ozone.s3g.kerberos.principal` | S3 Gateway principal. e.g. 
`s3g/_HOST@REALM` |
-| `ozone.s3g.kerberos.keytab.file` | The keytab file used by S3 Gateway. e.g. 
`/etc/security/keytabs/s3g.keytab` |
+| Property                                 | Description                       
                                                                  |
+| ---------------------------------------- | 
---------------------------------------------------------------------------------------------------
 |
+| `ozone.s3g.kerberos.principal`           | S3 Gateway principal. e.g. 
`s3g/_HOST@REALM`                                                        |
+| `ozone.s3g.kerberos.keytab.file`         | The keytab file used by S3 
Gateway. e.g. `/etc/security/keytabs/s3g.keytab`                         |
 | `ozone.s3g.http.auth.kerberos.principal` | S3 Gateway principal if SPNEGO is 
enabled for S3 Gateway HTTP server. e.g. `HTTP/[email protected]` |
-| `ozone.s3g.http.auth.kerberos.keytab` | The keytab file used by S3 Gateway 
if SPNEGO is enabled for S3 Gateway HTTP server. |
+| `ozone.s3g.http.auth.kerberos.keytab`    | The keytab file used by S3 
Gateway if SPNEGO is enabled for S3 Gateway HTTP server.                 |
 
 ## HttpFS Gateway
 
@@ -103,27 +81,9 @@ Datanodes under Hadoop is traditionally secured by creating 
a Keytab file on the
 
 However, we support the legacy Kerberos based Authentication to make it easy 
for the current set of users. The HDFS configuration keys are the following 
that is setup in `hdfs-site.xml`.
 
-| Property | Description |
-|----------|-------------|
-| `dfs.datanode.kerberos.principal` | The Datanode service principal. e.g. 
`dn/[email protected]` |
-| `dfs.datanode.kerberos.keytab.file` | The keytab file used by Datanode 
daemon to login as its service principal. |
-| `hdds.datanode.http.auth.kerberos.principal` | Datanode HTTP server service 
principal. |
-| `hdds.datanode.http.auth.kerberos.keytab` | The keytab file used by Datanode 
HTTP server to login as its service principal. |
-
-### How a Datanode becomes secure
-
-Under Ozone, when a Datanode boots up and discovers SCM's address, the first 
thing that Datanode does is to create a private key and send a certificate 
request to the SCM.
-
-#### Certificate Approval via Kerberos
-
-SCM has a built-in CA, and SCM has to approve this request. If the Datanode 
already has a Kerberos key tab, then SCM will trust Kerberos credentials and 
issue a certificate automatically.
-
-#### Manual Approval
-
-If these are brand new Datanodes and Kerberos key tabs are not present at the 
Datanodes, then this request for the Datanodes identity certificate is queued 
up for approval from the administrator (This is work in progress, not committed 
in Ozone yet). In other words, the chain of trust is established by the 
administrator of the cluster.
-
-#### Automatic Approval
-
-If you running under an container orchestrator like Kubernetes, we rely on 
Kubernetes to create a one-time token that will be given to Datanode during 
boot time to prove the identity of the Datanode container (This is also work in 
progress.)
-
-Once a certificate is issued, a Datanode is secure and Ozone Manager can issue 
block tokens. If there is no Datanode certificates or the SCM's root 
certificate is not present in the Datanode, then Datanode will register itself 
and download the SCM's root certificate as well get the certificates for itself.
+| Property                                     | Description                   
                                                  |
+| -------------------------------------------- | 
------------------------------------------------------------------------------- 
|
+| `dfs.datanode.kerberos.principal`            | The Datanode service 
principal. e.g. `dn/[email protected]`                       |
+| `dfs.datanode.kerberos.keytab.file`          | The keytab file used by 
Datanode daemon to login as its service principal.      |
+| `hdds.datanode.http.auth.kerberos.principal` | Datanode HTTP server service 
principal.                                         |
+| `hdds.datanode.http.auth.kerberos.keytab`    | The keytab file used by 
Datanode HTTP server to login as its service principal. |
diff --git a/docs/07-system-internals/05-security/01-kerberos.md 
b/docs/07-system-internals/05-security/01-kerberos.md
index cd84e4f0f..c45138b0c 100644
--- a/docs/07-system-internals/05-security/01-kerberos.md
+++ b/docs/07-system-internals/05-security/01-kerberos.md
@@ -4,6 +4,55 @@ sidebar_label: Kerberos
 
 # How Ozone Uses Kerberos
 
-**TODO:** File a subtask under 
[HDDS-9862](https://issues.apache.org/jira/browse/HDDS-9862) and complete this 
page or section.
+## Tokens
 
-Document which Ozone components use Kerberos, what calls they make, and why.
+Ozone uses a notion of tokens to avoid overburdening the Kerberos server. When 
you serve thousands of requests per second, involving Kerberos might not work 
well. Hence once an authentication is done, Ozone issues delegation tokens and 
block tokens to the clients. These tokens allow applications to do specified 
operations against the cluster, as if they have kerberos tickets with them. 
Ozone supports following kinds of tokens.
+
+### Delegation Token
+
+Delegation tokens allow an application to impersonate a users kerberos 
credentials. This token is based on verification of kerberos identity and is 
issued by the Ozone Manager. Delegation tokens are enabled by default when 
security is enabled.
+
+### Block Token
+
+Block tokens allow a client to read or write a block. This is needed so that 
Datanodes know that the user/client has permission to read or make 
modifications to the block.
+
+### S3AuthInfo
+
+S3 uses a very different shared secret security scheme. Ozone supports the AWS 
Signature Version 4 protocol, and from the end users perspective Ozone's S3 
feels exactly like AWS S3.
+
+The S3 credential tokens are called S3 auth info in the code. These tokens are 
also enabled by default when security is enabled.
+
+Each of the service daemons that make up Ozone needs a Kerberos service 
principal name and a corresponding [kerberos key 
tab](https://web.mit.edu/kerberos/krb5-latest/doc/basic/keytab_def.html) file.
+
+All these settings should be made in `ozone-site.xml`.
+
+## Securing Datanodes
+
+Datanodes under Hadoop is traditionally secured by creating a Keytab file on 
the Datanodes. With Ozone, we have moved away to using Datanode certificates. 
That is, Kerberos on Datanodes is not needed in case of a secure Ozone cluster.
+
+However, we support the legacy Kerberos based Authentication to make it easy 
for the current set of users. The HDFS configuration keys are the following 
that is setup in `hdfs-site.xml`.
+
+| Property                                     | Description                   
                                                  |
+| -------------------------------------------- | 
------------------------------------------------------------------------------- 
|
+| `dfs.datanode.kerberos.principal`            | The Datanode service 
principal. e.g. `dn/[email protected]`                       |
+| `dfs.datanode.kerberos.keytab.file`          | The keytab file used by 
Datanode daemon to login as its service principal.      |
+| `hdds.datanode.http.auth.kerberos.principal` | Datanode HTTP server service 
principal.                                         |
+| `hdds.datanode.http.auth.kerberos.keytab`    | The keytab file used by 
Datanode HTTP server to login as its service principal. |
+
+### How a Datanode becomes secure
+
+Under Ozone, when a Datanode boots up and discovers SCM's address, the first 
thing that Datanode does is to create a private key and send a certificate 
request to the SCM.
+
+#### Certificate Approval via Kerberos
+
+SCM has a built-in CA, and SCM has to approve this request. If the Datanode 
already has a Kerberos key tab, then SCM will trust Kerberos credentials and 
issue a certificate automatically.
+
+#### Manual Approval
+
+If these are brand new Datanodes and Kerberos key tabs are not present at the 
Datanodes, then this request for the Datanodes identity certificate is queued 
up for approval from the administrator (This is work in progress, not committed 
in Ozone yet). In other words, the chain of trust is established by the 
administrator of the cluster.
+
+#### Automatic Approval
+
+If you running under an container orchestrator like Kubernetes, we rely on 
Kubernetes to create a one-time token that will be given to Datanode during 
boot time to prove the identity of the Datanode container (This is also work in 
progress.)
+
+Once a certificate is issued, a Datanode is secure and Ozone Manager can issue 
block tokens. If there is no Datanode certificates or the SCM's root 
certificate is not present in the Datanode, then Datanode will register itself 
and download the SCM's root certificate as well get the certificates for itself.


---------------------------------------------------------------------
To unsubscribe, e-mail: [email protected]
For additional commands, e-mail: [email protected]

Reply via email to