[
https://issues.apache.org/jira/browse/HADOOP-11683?page=com.atlassian.jira.plugin.system.issuetabpanels:comment-tabpanel&focusedCommentId=14350085#comment-14350085
]
Sunny Cheung commented on HADOOP-11683:
---------------------------------------
It is worth mentioning that MIT Kerberos 1.12 added a plugin interface (called
localauth) to control the relationship between Kerberos principals and local
system accounts [1]. And a 3rd party software (SSSD) has leveraged this feature
to support calls to getpwnam() passing in a Kerberos principal name to get
normalized user profile back [2]. This implies that (to some degrees) arbitrary
mapping of Kerberos principals to local system accounts is a common problem in
authentication.
References:
[1] Local authorization interface (localauth)
http://web.mit.edu/kerberos/krb5-1.12/doc/plugindev/localauth.html
[2] Allow Kerberos Principals in getpwnam() calls
https://fedorahosted.org/sssd/wiki/DesignDocs/NSSWithKerberosPrincipal
> Need a plugin API to translate long principal names to local OS user names
> arbitrarily
> --------------------------------------------------------------------------------------
>
> Key: HADOOP-11683
> URL: https://issues.apache.org/jira/browse/HADOOP-11683
> Project: Hadoop Common
> Issue Type: Improvement
> Components: security
> Reporter: Sunny Cheung
>
> We need a plugin API to translate long principal names (e.g.
> [email protected]) to local OS user names (e.g. user123456) arbitrarily.
> For some organizations the name translation is straightforward (e.g.
> [email protected] to john_doe), and the hadoop.security.auth_to_local
> configurable mapping is sufficient to resolve this (see HADOOP-6526).
> However, in some other cases the name translation is arbitrary and cannot be
> generalized by a set of translation rules easily.
--
This message was sent by Atlassian JIRA
(v6.3.4#6332)