Running Mappings in a Kerberos-Enabled Hadoop Environment
Running Mappings in a Kerberos-Enabled Hadoop Environment
To run mappings in a Kerberos-enabled Hadoop environment, you must configure the Kerberos configuration file, create user authentication artifacts, and configure Kerberos authentication properties for the Informatica domain. To view metadata from Hive, HBase and complex file sources in the Developer tool, you must import configuration files and generate a Kerberos credentials file.
The Kerberos configuration file
krb5.conf
contains configuration properties for the Kerberos realm. The one-way cross-realm trust enables the Informatica domain to communicate with the Hadoop cluster.
The Informatica domain uses Kerberos authentication on a Microsoft Active Directory service. The Hadoop cluster uses Kerberos authentication on an MIT Kerberos service. You set up a one-way cross-realm trust to enable the KDC for the MIT Kerberos service to communicate with the KDC for the Active Directory service. After you set up the cross-realm trust, you must configure the Informatica domain to enable mappings to run in the Hadoop cluster.
To run mappings on a cluster that uses Kerberos authentication, perform the following configuration tasks:
Set up the Kerberos configuration file.
When the Informatica domain uses Kerberos authentication, set up the one-way cross-realm trust.
Create matching operating system profile user names on each Hadoop cluster node.
Create the Service Principal Name and Keytab File in the Active Directory Server.
Specify the Kerberos authentication properties for the Data Integration Service.
Configure Execution Options for the Data Integration Service.
Configure the Developer tool to enable you to view metadata from Hive, HBase and complex file sources when a cluster is Kerberos-enabled.