[ 
https://issues.apache.org/jira/browse/AMBARI-7204?page=com.atlassian.jira.plugin.system.issuetabpanels:comment-tabpanel&focusedCommentId=14148139#comment-14148139
 ] 

Eron Wright  commented on AMBARI-7204:
--------------------------------------

Thanks for incorporating much of the feedback.    The introduction of the 
"kdc-<unique identifier>" configuration block seems to allow a multitude of 
realms to be defined in krb5.conf.   Accordingly a use case should be defined.

Seems we are now able to satisfy the use case I mentioned earlier, where the 
managed KDC is the 'trusted' party to some external KDC.   But we must clarify 
how the cross-realm trust principals are specified.  Would it be correct to 
define 'identity-' blocks for the trust principals?    At minimum a password 
must be specified.  

Here is an example to illustrate the use case.   A user in USER realm submits a 
job to a cluster in HADOOP realm, which reads data from a data storage system 
in DATABASE realm.  The HADOOP realm is managed.  Keep in mind that trust 
principals are defined as "krbtgt/TRUSTING_REALM@TRUSTED_REALM".

{code}
"configurations": [
{ "cluster­env": { "kerberos_domain": "HADOOP.EXAMPLE.COM" } },
{
  "kdc­-users": { "realm": "USERS.EXAMPLE.COM", "kdc_server": 
"kdc.users.example.com", "admin_server": "kdc.users.example.com" }
},
{ 
  "kdc-hadoop": { "realm": "HADOOP.EXAMPLE.COM" }
},
{
  "kdc­-database": { "realm": "DATABASE.EXAMPLE.COM", "kdc_server": 
"kdc.database.example.com", "admin_server": "kdc.database.example.com" }
},
{
  "identity­-user-trust": {
    "realm": "HADOOP.EXAMPLE.COM",
    "principal": "krbtgt/[email protected]",
    "password": "hadoop"
  }
},
{
  "identity­-database-trust": {
    "realm": "HADOOP.EXAMPLE.COM",
    "principal": "krbtgt/[email protected]",
    "password": "hadoop"
  }
}
]
{code}

Thanks

> Ambari Automated Kerberization
> ------------------------------
>
>                 Key: AMBARI-7204
>                 URL: https://issues.apache.org/jira/browse/AMBARI-7204
>             Project: Ambari
>          Issue Type: Epic
>          Components: ambari-server, security, stacks
>    Affects Versions: 2.0.0
>         Environment: Kerberos
>            Reporter: Robert Levas
>            Assignee: Robert Levas
>              Labels: active-directory, authentication, kerberos, 
> mit-kerberos, security, stack
>             Fix For: 2.0.0
>
>         Attachments: AmbariClusterKerberization.pdf
>
>   Original Estimate: 2,016h
>  Remaining Estimate: 2,016h
>
> *Problem*
> Manually installing and setting up Kerberos for a secure Hadoop cluster is 
> error prone, largely manual and a potential source of configuration problems. 
> It requires many steps where configuration files and credentials may need to 
> be distributed across many nodes.  Because of this the process is time 
> consuming and lead to a high probability of user error.
> The problem is exacerbated when the cluster is modified by adding or removing 
> nodes and services.
> *Solution*
> Use Ambari to secure the cluster using Kerberos.  By automating the process 
> of setting up Kerberos, the repetitive tasks of distributing configuration 
> details and credentials can be done in parallel to the nodes within the 
> cluster.  This also negates most user-related errors due to the lack of 
> interaction a user has with the process.  
> See [^AmbariClusterKerberization.pdf] for more details.



--
This message was sent by Atlassian JIRA
(v6.3.4#6332)

Reply via email to