Kerberos
Kafka SASL relying on Kerberized cluster.
configurations for enable Kerberos via Ambari wizard
Configuration Name | Value |
---|---|
KDC Type | Existing Active Directory |
KDC hosts | kdcserver1,kdcserver2 |
Realm name | DOMAINNAME.CAPITAL.NET |
LDAP url | ldaps://ldapserver1.domainname.capital.net:636 |
Container DN | OU=AmbariCluster, DC=net |
Domains | DOMAINNAME |
Kadmin host | kdcserver1 |
Admin principal | SUPERUSER |
Admin password | password |
mandatory configuration for Nifi when Kerberos is enabled
Specify the kerberos provider
make sure the kerberos-provider details is defined at “Template for login-identity-providers.xml”.
1 | <provider> |
Check the user mapping
After kerbereros is enabled, the ldap user name logged in may contains domain like username@domain.com
The name might not match with autorization policy in Ranger.
To solve this, we should config the identity mapping for Nifi.
https://docs.hortonworks.com/HDPDocuments/HDF3/HDF-3.0.0/bk_security/content/identity-mapping.html
So that when user name and password is given from Nifi login form, it will be regrexed and submit partial part to Ranger to authorize.
For example,
1 | nifi.security.identity.mapping.pattern.dn=^CN=(.*?), OU=(.*?)$ |