[ 
https://issues.apache.org/jira/browse/PHOENIX-5006?page=com.atlassian.jira.plugin.system.issuetabpanels:comment-tabpanel&focusedCommentId=16679923#comment-16679923
 ] 

Biju Nair commented on PHOENIX-5006:
------------------------------------

Thanks [~elserj] for the response. As I mentioned in the comment, having a 
{{site.xml}} with the property {{hadoop.security.authentication}} set to 
{{Kerberos}} picks up the users Kerberos ticket. But passing it in the property 
for the JDBC connection doesn't.

 

```
 prop.setProperty("hadoop.security.authentication","Kerberos");
 prop.setProperty("hbase.security.authentication","Kerberos");
 prop.setProperty("hbase.master.kerberos.principal","hbase/_HOST@"+krbRealm);
 
prop.setProperty("hbase.regionserver.kerberos.principal","hbase/_HOST@"+krbRealm);Connection
 conn = DriverManager.getConnection("jdbc:phoenix:"+zk+":2181:/hbase",prop)
```

 

> jdbc connection to secure cluster should be able to use Kerberos ticket of 
> user
> -------------------------------------------------------------------------------
>
>                 Key: PHOENIX-5006
>                 URL: https://issues.apache.org/jira/browse/PHOENIX-5006
>             Project: Phoenix
>          Issue Type: Bug
>            Reporter: Biju Nair
>            Priority: Minor
>
> Currently JDBC connection against a secure Phoenix cluster requires a 
> Kerberos principal and keytab to be passed in as part of the connection 
> string. But in many instances users may not have a {{Keytab}} especially 
> during development. It would be good to support using the logged in users 
> Kerberos ticket. 
>   



--
This message was sent by Atlassian JIRA
(v7.6.3#76005)

Reply via email to