You are viewing a plain text version of this content. The canonical link for it is here.
Posted to commits@kylin.apache.org by li...@apache.org on 2018/10/14 14:07:29 UTC
svn commit: r1843838 - in /kylin/site: docs/howto/howto_ldap_and_sso.html
docs21/howto/howto_ldap_and_sso.html docs23/howto/howto_ldap_and_sso.html
docs24/howto/howto_ldap_and_sso.html feed.xml
Author: lidong
Date: Sun Oct 14 14:07:29 2018
New Revision: 1843838
URL: http://svn.apache.org/viewvc?rev=1843838&view=rev
Log:
update howto_ldap document
Modified:
kylin/site/docs/howto/howto_ldap_and_sso.html
kylin/site/docs21/howto/howto_ldap_and_sso.html
kylin/site/docs23/howto/howto_ldap_and_sso.html
kylin/site/docs24/howto/howto_ldap_and_sso.html
kylin/site/feed.xml
Modified: kylin/site/docs/howto/howto_ldap_and_sso.html
URL: http://svn.apache.org/viewvc/kylin/site/docs/howto/howto_ldap_and_sso.html?rev=1843838&r1=1843837&r2=1843838&view=diff
==============================================================================
--- kylin/site/docs/howto/howto_ldap_and_sso.html (original)
+++ kylin/site/docs/howto/howto_ldap_and_sso.html Sun Oct 14 14:07:29 2018
@@ -6030,25 +6030,25 @@ java -classpath kylin-server-base-\<v
<p>Config them in the conf/kylin.properties:</p>
-<div class="highlighter-rouge"><pre class="highlight"><code>ldap.server=ldap://<your_ldap_host>:<port>
-ldap.username=<your_user_name>
-ldap.password=<your_password_encrypted>
+<div class="highlighter-rouge"><pre class="highlight"><code>kylin.security.ldap.connection-server=ldap://<your_ldap_host>:<port>
+kylin.security.ldap.connection-username=<your_user_name>
+kylin.security.ldap.connection-password=<your_password_encrypted>
</code></pre>
</div>
<p>Secondly, provide the user search patterns, this is by LDAP design, here is just a sample:</p>
-<div class="highlighter-rouge"><pre class="highlight"><code>ldap.user.searchBase=OU=UserAccounts,DC=mycompany,DC=com
-ldap.user.searchPattern=(&(cn={0})(memberOf=CN=MYCOMPANY-USERS,DC=mycompany,DC=com))
-ldap.user.groupSearchBase=OU=Group,DC=mycompany,DC=com
+<div class="highlighter-rouge"><pre class="highlight"><code>kylin.security.ldap.user-search-base=OU=UserAccounts,DC=mycompany,DC=com
+kylin.security.ldap.user-search-pattern=(&(cn={0})(memberOf=CN=MYCOMPANY-USERS,DC=mycompany,DC=com))
+kylin.security.ldap.user-group-search-base=OU=Group,DC=mycompany,DC=com
</code></pre>
</div>
-<p>If you have service accounts (e.g, for system integration) which also need be authenticated, configure them in ldap.service.*; Otherwise, leave them be empty;</p>
+<p>If you have service accounts (e.g, for system integration) which also need be authenticated, configure them in kylin.security.ldap.service-.*; Otherwise, leave them be empty;</p>
<h3 id="configure-the-administrator-group">Configure the administrator group</h3>
-<p>To map an LDAP group to the admin group in Kylin, need set the âkylin.security.acl.admin-roleâ to the LDAP group name(shall keep the original case), and the users in this group will be global admin in Kylin.</p>
+<p>To map an LDAP group to the admin group in Kylin, need set the âkylin.security.acl.admin-roleâ to the LDAP group name (shall keep the original case), and the users in this group will be global admin in Kylin.</p>
<p>For example, in LDAP the group âKYLIN-ADMIN-GROUPâ is the list of administrators, here need set it as:</p>
Modified: kylin/site/docs21/howto/howto_ldap_and_sso.html
URL: http://svn.apache.org/viewvc/kylin/site/docs21/howto/howto_ldap_and_sso.html?rev=1843838&r1=1843837&r2=1843838&view=diff
==============================================================================
--- kylin/site/docs21/howto/howto_ldap_and_sso.html (original)
+++ kylin/site/docs21/howto/howto_ldap_and_sso.html Sun Oct 14 14:07:29 2018
@@ -9894,21 +9894,21 @@ java -classpath kylin-server-base-\<v
<p>Config them in the conf/kylin.properties:</p>
-<div class="highlighter-rouge"><pre class="highlight"><code>ldap.server=ldap://<your_ldap_host>:<port>
-ldap.username=<your_user_name>
-ldap.password=<your_password_encrypted>
+<div class="highlighter-rouge"><pre class="highlight"><code>kylin.security.ldap.connection-server=ldap://<your_ldap_host>:<port>
+kylin.security.ldap.connection-username=<your_user_name>
+kylin.security.ldap.connection-password=<your_password_encrypted>
</code></pre>
</div>
<p>Secondly, provide the user search patterns, this is by LDAP design, here is just a sample:</p>
-<div class="highlighter-rouge"><pre class="highlight"><code>ldap.user.searchBase=OU=UserAccounts,DC=mycompany,DC=com
-ldap.user.searchPattern=(&(cn={0})(memberOf=CN=MYCOMPANY-USERS,DC=mycompany,DC=com))
-ldap.user.groupSearchBase=OU=Group,DC=mycompany,DC=com
+<div class="highlighter-rouge"><pre class="highlight"><code>kylin.security.ldap.user-search-base=OU=UserAccounts,DC=mycompany,DC=com
+kylin.security.ldap.user-search-pattern=(&(cn={0})(memberOf=CN=MYCOMPANY-USERS,DC=mycompany,DC=com))
+kylin.security.ldap.user-group-search-base=OU=Group,DC=mycompany,DC=com
</code></pre>
</div>
-<p>If you have service accounts (e.g, for system integration) which also need be authenticated, configure them in ldap.service.*; Otherwise, leave them be empty;</p>
+<p>If you have service accounts (e.g, for system integration) which also need be authenticated, configure them in kylin.security.ldap.service-*; Otherwise, leave them be empty;</p>
<h3 id="configure-the-administrator-group-and-default-role">Configure the administrator group and default role</h3>
Modified: kylin/site/docs23/howto/howto_ldap_and_sso.html
URL: http://svn.apache.org/viewvc/kylin/site/docs23/howto/howto_ldap_and_sso.html?rev=1843838&r1=1843837&r2=1843838&view=diff
==============================================================================
--- kylin/site/docs23/howto/howto_ldap_and_sso.html (original)
+++ kylin/site/docs23/howto/howto_ldap_and_sso.html Sun Oct 14 14:07:29 2018
@@ -6031,21 +6031,21 @@ java -classpath kylin-server-base-\<v
<p>Config them in the conf/kylin.properties:</p>
-<div class="highlighter-rouge"><pre class="highlight"><code>ldap.server=ldap://<your_ldap_host>:<port>
-ldap.username=<your_user_name>
-ldap.password=<your_password_encrypted>
+<div class="highlighter-rouge"><pre class="highlight"><code>kylin.security.ldap.connection-server=ldap://<your_ldap_host>:<port>
+kylin.security.ldap.connection-username=<your_user_name>
+kylin.security.ldap.connection-password=<your_password_encrypted>
</code></pre>
</div>
<p>Secondly, provide the user search patterns, this is by LDAP design, here is just a sample:</p>
-<div class="highlighter-rouge"><pre class="highlight"><code>ldap.user.searchBase=OU=UserAccounts,DC=mycompany,DC=com
-ldap.user.searchPattern=(&(cn={0})(memberOf=CN=MYCOMPANY-USERS,DC=mycompany,DC=com))
-ldap.user.groupSearchBase=OU=Group,DC=mycompany,DC=com
+<div class="highlighter-rouge"><pre class="highlight"><code>kylin.security.ldap.user-search-base=OU=UserAccounts,DC=mycompany,DC=com
+kylin.security.ldap.user-search-pattern=(&(cn={0})(memberOf=CN=MYCOMPANY-USERS,DC=mycompany,DC=com))
+kylin.security.ldap.user-group-search-base=OU=Group,DC=mycompany,DC=com
</code></pre>
</div>
-<p>If you have service accounts (e.g, for system integration) which also need be authenticated, configure them in ldap.service.*; Otherwise, leave them be empty;</p>
+<p>If you have service accounts (e.g, for system integration) which also need be authenticated, configure them in kylin.security.ldap.service-*; Otherwise, leave them be empty;</p>
<h3 id="configure-the-administrator-group">Configure the administrator group</h3>
Modified: kylin/site/docs24/howto/howto_ldap_and_sso.html
URL: http://svn.apache.org/viewvc/kylin/site/docs24/howto/howto_ldap_and_sso.html?rev=1843838&r1=1843837&r2=1843838&view=diff
==============================================================================
--- kylin/site/docs24/howto/howto_ldap_and_sso.html (original)
+++ kylin/site/docs24/howto/howto_ldap_and_sso.html Sun Oct 14 14:07:29 2018
@@ -6030,21 +6030,21 @@ java -classpath kylin-server-base-\<v
<p>Config them in the conf/kylin.properties:</p>
-<div class="highlighter-rouge"><pre class="highlight"><code>ldap.server=ldap://<your_ldap_host>:<port>
-ldap.username=<your_user_name>
-ldap.password=<your_password_encrypted>
+<div class="highlighter-rouge"><pre class="highlight"><code>kylin.security.ldap.connection-server=ldap://<your_ldap_host>:<port>
+kylin.security.ldap.connection-username=<your_user_name>
+kylin.security.ldap.connection-password=<your_password_encrypted>
</code></pre>
</div>
<p>Secondly, provide the user search patterns, this is by LDAP design, here is just a sample:</p>
-<div class="highlighter-rouge"><pre class="highlight"><code>ldap.user.searchBase=OU=UserAccounts,DC=mycompany,DC=com
-ldap.user.searchPattern=(&(cn={0})(memberOf=CN=MYCOMPANY-USERS,DC=mycompany,DC=com))
-ldap.user.groupSearchBase=OU=Group,DC=mycompany,DC=com
+<div class="highlighter-rouge"><pre class="highlight"><code>kylin.security.ldap.user-search-base=OU=UserAccounts,DC=mycompany,DC=com
+kylin.security.ldap.user-search-pattern=(&(cn={0})(memberOf=CN=MYCOMPANY-USERS,DC=mycompany,DC=com))
+kylin.security.ldap.user-group-search-base=OU=Group,DC=mycompany,DC=com
</code></pre>
</div>
-<p>If you have service accounts (e.g, for system integration) which also need be authenticated, configure them in ldap.service.*; Otherwise, leave them be empty;</p>
+<p>If you have service accounts (e.g, for system integration) which also need be authenticated, configure them in kylin.security.ldap.service-*; Otherwise, leave them be empty;</p>
<h3 id="configure-the-administrator-group">Configure the administrator group</h3>
Modified: kylin/site/feed.xml
URL: http://svn.apache.org/viewvc/kylin/site/feed.xml?rev=1843838&r1=1843837&r2=1843838&view=diff
==============================================================================
--- kylin/site/feed.xml (original)
+++ kylin/site/feed.xml Sun Oct 14 14:07:29 2018
@@ -19,8 +19,8 @@
<description>Apache Kylin Home</description>
<link>http://kylin.apache.org/</link>
<atom:link href="http://kylin.apache.org/feed.xml" rel="self" type="application/rss+xml"/>
- <pubDate>Sun, 30 Sep 2018 06:59:42 -0700</pubDate>
- <lastBuildDate>Sun, 30 Sep 2018 06:59:42 -0700</lastBuildDate>
+ <pubDate>Sun, 14 Oct 2018 06:59:20 -0700</pubDate>
+ <lastBuildDate>Sun, 14 Oct 2018 06:59:20 -0700</lastBuildDate>
<generator>Jekyll v2.5.3</generator>
<item>