[ 
https://issues.apache.org/jira/browse/AMBARI-20938?page=com.atlassian.jira.plugin.system.issuetabpanels:all-tabpanel
 ]

Robert Levas updated AMBARI-20938:
----------------------------------
    Attachment: AMBARI-20938_trunk_01.patch
                AMBARI-20938_branch-2.5_01.patch

> LDAPS connections to an Active Directory when enabling Kerberos should 
> validate the server's SSL certificate
> ------------------------------------------------------------------------------------------------------------
>
>                 Key: AMBARI-20938
>                 URL: https://issues.apache.org/jira/browse/AMBARI-20938
>             Project: Ambari
>          Issue Type: Bug
>          Components: ambari-server
>    Affects Versions: 2.0.0
>            Reporter: Robert Levas
>            Assignee: Robert Levas
>              Labels: active-directory, active_directory, kerberos, ssl
>             Fix For: 2.5.2
>
>         Attachments: AMBARI-20938_branch-2.5_01.patch, 
> AMBARI-20938_trunk_01.patch
>
>
> LDAPS connections to an Active Directory when enabling Kerberos should 
> validate the server's SSL certificate.  The current implementation skips 
> validation checks to help avoid SSL issues; however this is not secure. Also 
> the _trusting_ SSL connection may not support the more secure SSL protocols - 
> TLSv1.2.
> A flag in the {{ambari.properties}} file 
> ({{kerberos.operation.verify.kdc.trust}}) should be available to allow for 
> the user to select either a _trusting_  SSL connection or a validating 
> (non-trusting) SSL connection to be used.  The default should be to use the 
> standard (non-trusting) SSL connection. 



--
This message was sent by Atlassian JIRA
(v6.3.15#6346)

Reply via email to