Appendix I - Configuring LDAP Group Mappings
To Set up LDAP (AD) group mappings for Hadoop, add the following properties to
the core-site.xml on the
NameNode:
Note: In addition:
<property>
<name>hadoop.security.group.mapping</name>
<value>org.apache.hadoop.security.LdapGroupsMapping</value>
</property>
<property>
<name>hadoop.security.group.mapping.ldap.url</name>
<value>ldap://server</value>
</property>
<property>
<name>hadoop.security.group.mapping.ldap.bind.user</name>
<value>Administrator@cloudera-ad.local</value>
</property>
<property>
<name>hadoop.security.group.mapping.ldap.bind.password</name>
<value>****</value>
</property>
<property>
<name>hadoop.security.group.mapping.ldap.base</name>
<value>dc=cloudera-ad,dc=local</value>
</property>
<property>
<name>hadoop.security.group.mapping.ldap.search.filter.user</name>
<value>(&(objectClass=user)(sAMAccountName={0}))</value>
</property>
<property>
<name>hadoop.security.group.mapping.ldap.search.filter.group</name>
<value>(objectClass=group)</value>
</property>
<property>
<name>hadoop.security.group.mapping.ldap.search.attr.member</name>
<value>member</value>
</property>
<property>
<name>hadoop.security.group.mapping.ldap.search.attr.group.name</name>
<value>cn</value>
</property>
Ensure
all your services are registered users in LDAP.
Note- If you are using Sentry with Hive, you will also need to add these properties on the HiveServer2 node.
- If you are using Sentry with Impala, add these properties on all hosts
| << Appendix H - Using a Web Browser to Access an URL Protected by Kerberos HTTP SPNEGO | Appendix J - Before Logging a Support Case >> | |