Table of Contents

Search

  1. Preface
  2. Introduction to Big Data Management Administration
  3. Big Data Management Engines
  4. Authentication and Authorization
  5. Running Mappings on a Cluster with Kerberos Authentication
  6. Configuring Access to an SSL/TLS-Enabled Cluster
  7. Cluster Configuration
  8. Cluster Configuration Privileges and Permissions
  9. Cloud Provisioning Configuration
  10. Queuing
  11. Tuning for Big Data Processing
  12. Connections
  13. Multiple Blaze Instances on a Cluster

Big Data Management Administrator Guide

Big Data Management Administrator Guide

Configuring KMS for Informatica User Access

Configuring KMS for Informatica User Access

If you use a KMS to encrypt HDFS data at rest, use the cluster administration utility to configure the KMS for Informatica user access.
  1. Create a KMS user account for the Informatica user. Add the Informatica user to a new KMS repository, or to an existing KMS repository.
    The user corresponds to the Data Integration Service user or the Kerberos SPN user.
  2. Grant permissions to the Informatica user.
  3. Create and configure an encryption key.
  4. Create an encryption zone that uses the encryption key you created.
    For example:
    hdfs dfs -mkdir /zone_encr_infa hdfs crypto -createZone -keyName infa_key -path /zone_encr_infa
  5. Browse to the Custom KMS Site page and add the following properties:
    hadoop.kms.proxyuser.<user>.groups=* hadoop.kms.proxyuser.<user>.hosts=* hadoop.kms.proxyuser.<user>.users=*
    where <user> is the Informatica user name you configured in Step 1.
  6. Update the following properties:
    hadoop.kms.proxyuser.<user>.hosts hadoop.kms.proxyuser.<user>.groups
  7. Search for
    proxyuser
    in the KMS Configurations area. To register all Hadoop system users with the KMS, add the following properties:
    hadoop.kms.proxyuser.HTTP.hosts=* hadoop.kms.proxyuser.HTTP.users=* hadoop.kms.proxyuser.hive.hosts=* hadoop.kms.proxyuser.hive.users=* hadoop.kms.proxyuser.keyadmin.hosts=* hadoop.kms.proxyuser.keyadmin.users=* hadoop.kms.proxyuser.nn.hosts=* hadoop.kms.proxyuser.nn.users=* hadoop.kms.proxyuser.rm.hosts=* hadoop.kms.proxyuser.rm.users=* hadoop.kms.proxyuser.yarn.hosts=* hadoop.kms.proxyuser.yarn.users=*

0 COMMENTS

We’d like to hear from you!