[ 
https://issues.apache.org/jira/browse/HADOOP-11683?page=com.atlassian.jira.plugin.system.issuetabpanels:comment-tabpanel&focusedCommentId=14350085#comment-14350085
 ] 

Sunny Cheung commented on HADOOP-11683:
---------------------------------------

It is worth mentioning that MIT Kerberos 1.12 added a plugin interface (called 
localauth) to control the relationship between Kerberos principals and local 
system accounts [1]. And a 3rd party software (SSSD) has leveraged this feature 
to support calls to getpwnam() passing in a Kerberos principal name to get 
normalized user profile back [2]. This implies that (to some degrees) arbitrary 
mapping of Kerberos principals to local system accounts is a common problem in 
authentication.

References:
[1] Local authorization interface (localauth) 
http://web.mit.edu/kerberos/krb5-1.12/doc/plugindev/localauth.html
[2] Allow Kerberos Principals in getpwnam() calls
https://fedorahosted.org/sssd/wiki/DesignDocs/NSSWithKerberosPrincipal

> Need a plugin API to translate long principal names to local OS user names 
> arbitrarily
> --------------------------------------------------------------------------------------
>
>                 Key: HADOOP-11683
>                 URL: https://issues.apache.org/jira/browse/HADOOP-11683
>             Project: Hadoop Common
>          Issue Type: Improvement
>          Components: security
>            Reporter: Sunny Cheung
>
> We need a plugin API to translate long principal names (e.g. 
> [email protected]) to local OS user names (e.g. user123456) arbitrarily.
> For some organizations the name translation is straightforward (e.g. 
> [email protected] to john_doe), and the hadoop.security.auth_to_local 
> configurable mapping is sufficient to resolve this (see HADOOP-6526). 
> However, in some other cases the name translation is arbitrary and cannot be 
> generalized by a set of translation rules easily.



--
This message was sent by Atlassian JIRA
(v6.3.4#6332)

Reply via email to