Table of Contents

Search

  1. Preface
  2. Introduction to Dynamic Data Masking Administration
  3. Authentication
  4. Security
  5. Connection Management
  6. JDBC Client Configuration
  7. ODBC Client Configuration
  8. Configuration for MicroStrategy
  9. Access Control
  10. Logs
  11. High Availability
  12. Server Control
  13. Performance Tuning
  14. Troubleshooting
  15. Appendix A: Database Keywords

Administrator Guide

Administrator Guide

Configuring Kerberos Encryption for Hive Databases

Configuring Kerberos Encryption for Hive Databases

You can configure Kerberos encryption for Hive databases. Copy the
krb5.conf
file and the keytab file for the Dynamic Data Masking service principal to the Dynamic Data Masking Server machine. Then configure the
ddm.security
file.
For information about enabling Kerberos for Hive, see the H2L "
Enabling Kerberos for Hive and Impala Databases in Dynamic Data Masking
."
  1. Stop the Dynamic Data Masking Server.
  2. On Windows, remove the Dynamic Data Masking Service.
  3. Copy the
    krb5.conf
    file and the keytab file for the Dynamic Data Masking service principal to the Dynamic Data Masking Server machine.
  4. If you have not already created an XML
    ddm.security
    configuration file, create the file in the following location:
    <DDM>/cfg/ddm.security
  5. Configure the
    ddm.security
    configuration file. For more information, see Configuring the ddm.security file.
  6. Start the Dynamic Data Masking Server.
    Add the port that you configured in the
    ddm.security
    file to the service. In the example, the
    ddm.security
    file is configured for the Dynamic Data Masking for Hive service running on port 10081. In this case, you would add port 10081 to the Dynamic Data Masking for Hive service.
  7. Configure the JDBC or ODBC client. For more information, see Client Configuration.

0 COMMENTS

We’d like to hear from you!