[ 
https://issues.apache.org/jira/browse/HIVE-13590?page=com.atlassian.jira.plugin.system.issuetabpanels:comment-tabpanel&focusedCommentId=15674832#comment-15674832
 ] 

Ruslan Dautkhanov commented on HIVE-13590:
------------------------------------------

Sorry, I am not following. auth_to_local is already being applied to Kerberos 
principals. Why applying auth_to_local to LDAP principals is different than 
mapping Kerberos principals? Why it introduces security risk? Please elaborate. 
Thank you.

> Kerberized HS2 with LDAP auth enabled fails in multi-domain LDAP case
> ---------------------------------------------------------------------
>
>                 Key: HIVE-13590
>                 URL: https://issues.apache.org/jira/browse/HIVE-13590
>             Project: Hive
>          Issue Type: Bug
>          Components: Authentication, Security
>            Reporter: Chaoyu Tang
>            Assignee: Chaoyu Tang
>             Fix For: 2.2.0, 2.1.1
>
>         Attachments: HIVE-13590.1.patch, HIVE-13590.1.patch, 
> HIVE-13590.patch, HIVE-13590.patch
>
>
> In a kerberized HS2 with LDAP authentication enabled, LDAP user usually logs 
> in using username in form of username@domain in LDAP multi-domain case. But 
> it fails if the domain was not in the Hadoop auth_to_local mapping rule, the 
> error is as following:
> {code}
> Caused by: 
> org.apache.hadoop.security.authentication.util.KerberosName$NoMatchingRule: 
> No rules applied to ct...@mydomain.com
> at 
> org.apache.hadoop.security.authentication.util.KerberosName.getShortName(KerberosName.java:389)
> at org.apache.hadoop.security.User.<init>(User.java:48)
> {code}



--
This message was sent by Atlassian JIRA
(v6.3.4#6332)

Reply via email to