You are viewing a plain text version of this content. The canonical link for it is here.
Posted to issues@ambari.apache.org by "Doroszlai, Attila (JIRA)" <ji...@apache.org> on 2017/11/07 16:36:00 UTC

[jira] [Reopened] (AMBARI-22293) Improve KDC integration

     [ https://issues.apache.org/jira/browse/AMBARI-22293?page=com.atlassian.jira.plugin.system.issuetabpanels:all-tabpanel ]

Doroszlai, Attila reopened AMBARI-22293:
----------------------------------------

Hi [~rlevas], the following related unit tests started failing with this commit, can you please check?

{noformat}
[ERROR] Tests run: 21, Failures: 6, Errors: 2, Skipped: 0, Time elapsed: 2.103 s <<< FAILURE! - in org.apache.ambari.server.serveraction.kerberos.IPAKerberosOperationHandlerTest
[ERROR] Tests run: 26, Failures: 6, Errors: 2, Skipped: 0, Time elapsed: 3.922 s <<< FAILURE! - in org.apache.ambari.server.serveraction.kerberos.MITKerberosOperationHandlerTest
{noformat}

> Improve KDC integration
> -----------------------
>
>                 Key: AMBARI-22293
>                 URL: https://issues.apache.org/jira/browse/AMBARI-22293
>             Project: Ambari
>          Issue Type: Task
>          Components: ambari-server
>    Affects Versions: 3.0.0
>            Reporter: Robert Levas
>            Assignee: Robert Levas
>              Labels: kerberos
>             Fix For: 3.0.0
>
>         Attachments: AMBARI-22293_trunk_01.patch, AMBARI-22293_trunk_02.patch
>
>
> Improve KDC integration by making the interfaces more consistent with each other.
> *Notes:*
> * When using the MIT KDC or IPA options, the {{kerberos-env/admin_server_host}} value *must be the fully qualified domain name* (FQDN) of the host were the KDC administrator service is. 
> * When connecting to the MIT KDC and IPA server, a username a password is not used to authenticate using the kadmin utility.  A Kerberos ticket is first acquired and that is used for authentication.
> * When creating Kerberos identities using the MIT KDC and IPA handlers, the Ambari-generated password is not used.  All password's for principals in the MIT KDC and IP server are generated randomly by the KDC.
> * Removed {{kerberos-env/set_password_expiry}} and {{kerberos-env/password_chat_timeout}} properties since they are no longer needed
> * Changed {{kerberos-env/groups}} to {{kerberos-env/ipa_user_groups}} to be more explicit in how the property is used.
> * The setPassword implementation for the MIT KDC and IPA handlers do nothing except check to see if the relevant principal exists. This is to maintain backward compatibility with previous implementations.  



--
This message was sent by Atlassian JIRA
(v6.4.14#64029)