You are viewing a plain text version of this content. The canonical link for it is here.
Posted to issues@kudu.apache.org by "Todd Lipcon (JIRA)" <ji...@apache.org> on 2017/08/01 21:36:00 UTC

[jira] [Resolved] (KUDU-2087) Failure to map principal to local username in FreeIPA-configured environment

     [ https://issues.apache.org/jira/browse/KUDU-2087?page=com.atlassian.jira.plugin.system.issuetabpanels:all-tabpanel ]

Todd Lipcon resolved KUDU-2087.
-------------------------------
       Resolution: Fixed
    Fix Version/s: 1.4.1
                   1.5.0
                   1.3.2

> Failure to map principal to local username in FreeIPA-configured environment
> ----------------------------------------------------------------------------
>
>                 Key: KUDU-2087
>                 URL: https://issues.apache.org/jira/browse/KUDU-2087
>             Project: Kudu
>          Issue Type: Bug
>          Components: security
>    Affects Versions: 1.3.1, 1.4.0
>            Reporter: Todd Lipcon
>            Assignee: Todd Lipcon
>             Fix For: 1.3.2, 1.5.0, 1.4.1
>
>
> FreeIPA is a tool provided by Red Hat which helps operators configure and manage an integrated LDAP + Kerberos environment (sort of a parallel of Active Directory from what I can tell). In this environment, the local MIT krb5 installation is configured to use the SSD 'localauth' plugin, which is responsible for mapping principals to usernames by implementing the krb5_auth_to_localname() API.
> In this environment, Kudu fails to start with Kerberos enabled because the krb5_auth_to_localname() API is returning KRB5_PLUGIN_NO_HANDLE when it tries to map its own principal to a username.



--
This message was sent by Atlassian JIRA
(v6.4.14#64029)