You are viewing a plain text version of this content. The canonical link for it is here.
Posted to dev@ambari.apache.org by "Robert Levas (JIRA)" <ji...@apache.org> on 2016/03/07 14:33:40 UTC

[jira] [Created] (AMBARI-15316) Kerberos: Provide SHA256 or SHA512 options for template principal digest

Robert Levas created AMBARI-15316:
-------------------------------------

             Summary: Kerberos: Provide SHA256 or SHA512 options for template principal digest
                 Key: AMBARI-15316
                 URL: https://issues.apache.org/jira/browse/AMBARI-15316
             Project: Ambari
          Issue Type: Bug
          Components: ambari-server
    Affects Versions: 2.0.0
            Reporter: Robert Levas
            Assignee: Robert Levas
             Fix For: 2.4.0


When generating accounts in an Active Directory, it may be useful to add a unique value to CN's.  In the past generating this value was done by taking the SHA1 hash of the relevant normalized principal name. For example {{ambari-qa-c1@EXAMPLE.COM}} yields {{d9b48cb1c075d3da9fab4855a4031266bab8fb6a}}.  

Because using SHA1 at all may not be desirable, Ambari should provide options to use the following digest algorithms in the Active Directory account creation attribute template ({{kerberos-env/ad_create_attributes_template}}:

||Attribute Variables||Example||
|$principal_digest|SHA1 hash of the $normalized_principal|
|$principal_digest_256|SHA256 hash of the $normalized_principal|
|$principal_digest_512|SHA512 hash of the $normalized_principal|

   



--
This message was sent by Atlassian JIRA
(v6.3.4#6332)