Github user pepov commented on the issue:

    https://github.com/apache/nifi/pull/2866
  
    Yes, so I was confused because I supposed single sign on is the default way 
we wan't to configure kerberos authentication: 
https://nifi.apache.org/docs/nifi-docs/html/administration-guide.html#kerberos_service
    
    But I just realized the most basic setup you provided authenticates the 
user against kerberos on behalf of the user: 
https://nifi.apache.org/docs/nifi-docs/html/administration-guide.html#kerberos_login_identity_provider
    
    I'm still new to this but I suppose my confusion comes from the fact that 
Kerberos is basically designed to provide single sign on authentication where 
users authenticate themselves against the KDC and got a ticket that can be used 
to authenticate to the service (NiFi in this case) without the need from the 
service to communicate with the KDC. But this process requires the service to 
have an SPN created in Kerberos and the keytab has to be available. I beleive 
this is what NiFi calls the SPNEGO service principal and keytab 
(`nifi.kerberos.spnego.principal*`, `nifi.kerberos.spnego.keytab.location*`) 
and this is what I was referring to by service principal and keytab: 
https://nifi.apache.org/docs/nifi-docs/html/administration-guide.html#kerberos_properties
    
    What you mentioned is the other SPN and keytab, referred to as 
`nifi.kerberos.service.principal*`, `nifi.kerberos.service.keytab.location*` 
which is used by NiFi to authenticate to other systems as you just mentioned, 
but this is not what I was referring to. 


---

Reply via email to