Table of Contents

Search

  1. Preface
  2. Introduction to Data Engineering Administration
  3. Authentication
  4. Running Mappings on a Cluster with Kerberos Authentication
  5. Authorization
  6. Cluster Configuration
  7. Cloud Provisioning Configuration
  8. Data Integration Service Processing
  9. Appendix A: Connections Reference
  10. Appendix B: Monitoring REST API

Data Engineering Administrator Guide

Data Engineering Administrator Guide

User Impersonation in the Hadoop Environment

User Impersonation in the Hadoop Environment

To enable different users to run mapping and workflow jobs on a Hadoop cluster that uses Kerberos authentication, you must configure user impersonation in the Hadoop environment.
For example, you want to enable user Bob to run mappings and workflows on the Hadoop cluster that uses Kerberos authentication.
To enable user impersonation, you must complete the following steps:
  1. In the Active Directory, enable delegation for the Service Principal Name for the Data Integration Service to enable Bob to run Hadoop jobs.
  2. If the service principal name (SPN) is different from the impersonation user, grant read permission on Hive tables to the SPN user.
  3. Specify Bob as the user name in the Hadoop connection.
To run a kinit command in a Command task, use a custom Kerberos credential cache file location to separate users. This allows the Data Integration Service to run mappings in parallel and isolate the internal Kerberos authentication.

0 COMMENTS

We’d like to hear from you!