[ 
https://issues.apache.org/jira/browse/HADOOP-9296?page=com.atlassian.jira.plugin.system.issuetabpanels:comment-tabpanel&focusedCommentId=13883537#comment-13883537
 ] 

Daryn Sharp commented on HADOOP-9296:
-------------------------------------

@Benoy, I've looked at this a bit more at this.  Overloading the semantics of 
the serverId field will cause earlier 2.x clients to fail.  -1 to approaches 
that introduce RPC incompatibility.

Are you sure setting up a one-way trust relationship isn't the easier route?  I 
think it's a valid feature for a multi-interface server to use the correct 
realm for each interface - which RPC is currently lacking - but it seems rather 
kludgey to support multiple realms on the same interface.  Kerberos wasn't 
intended to work this way...  

> Authenticating users from different realm without a trust relationship
> ----------------------------------------------------------------------
>
>                 Key: HADOOP-9296
>                 URL: https://issues.apache.org/jira/browse/HADOOP-9296
>             Project: Hadoop Common
>          Issue Type: Improvement
>          Components: security
>            Reporter: Benoy Antony
>            Assignee: Benoy Antony
>         Attachments: HADOOP-9296-1.1.patch, HADOOP-9296.patch, 
> HADOOP-9296.patch, multirealm.pdf
>
>
> Hadoop Masters (JobTracker and NameNode) and slaves (Data Node and 
> TaskTracker) are part of the Hadoop domain, controlled by Hadoop Active 
> Directory. 
> The users belong to the CORP domain, controlled by the CORP Active Directory. 
> In the absence of a one way trust from HADOOP DOMAIN to CORP DOMAIN, how will 
> Hadoop Servers (JobTracker, NameNode) authenticate  CORP users ?
> The solution and implementation details are in the attachement



--
This message was sent by Atlassian JIRA
(v6.1.5#6160)

Reply via email to