Table of Contents

Search

  1. Preface
  2. Introduction to Big Data Management Administration
  3. Authentication
  4. Running Mappings on a Cluster with Kerberos Authentication
  5. Authorization
  6. Cluster Configuration
  7. Cloud Provisioning Configuration
  8. Data Integration Service Processing
  9. Connections
  10. Multiple Blaze Instances on a Cluster
  11. Monitoring REST API

Big Data Management Administrator Guide

Big Data Management Administrator Guide

Configure the Microsoft Active Directory Server

Configure the Microsoft Active Directory Server

Add the MIT KDC host name and local realm trust to the Active Directory server.
To configure the Active Directory server, complete the following steps:
  1. Enter the following command to add the MIT KDC host name:
    ksetup /addkdc <mit_realm_name> <kdc_hostname>
    For example, enter the command to add the following values:
    ksetup /addkdc HADOOP-MIT-REALM def456.hadoop-mit-realm.com
  2. Enter the following command to add the local realm trust to Active Directory:
    netdom trust <mit_realm_name> /Domain:<ad_realm_name> /add /realm /passwordt:<TrustPassword>
    For example, enter the command to add the following values:
    netdom trust HADOOP-MIT-REALM /Domain:INFA-AD-REALM /add /realm /passwordt:trust1234
  3. Enter the following commands based on your Microsoft Windows environment to set the proper encryption type:
    For Microsoft Windows 2008, enter the following command:
    ksetup /SetEncTypeAttr <mit_realm_name> <enc_type>
    For Microsoft Windows 2003, enter the following command:
    ktpass /MITRealmName <mit_realm_name> /TrustEncryp <enc_type>
    The enc_type parameter specifies AES, DES, or RC4 encryption. To find the value for enc_type, see the documentation for your version of Windows Active Directory. The encryption type you specify must be supported on both versions of Windows that use Active Directory and the MIT server.

0 COMMENTS

We’d like to hear from you!