Explorer) for cross-platform authentication. Microsoft clients must use Windows authentication based on the simple and protected authentication mechanism (SPNEGO.
Cross-platform authentication is achieved by simulating the negotiation behavior of the local windows to Windows authentication service using Kerberos protocol. To enable cross-platform authentication to run properly, non-Windows servers (WebLogic Server in this article) Need to parse the SPNEGO flag to extract the Kerberos flag that
as adding users, services, and exporting keytab, can be done through the IPA-related interfaces.The choice of ContainerIt can be seen that the user-initiated task is performed within a specific container (Container), and at first we consider using Defaultcontainer instead of the officially recommended Linuxcontainer, with the disadvantage of physically isolating the tasks and preventing malicious tasks , but easy to deploy, the use of Linuxcontainer
gets the service ticket or some other credentials requested from the KDC based on the configured SPN (described later);
IE uses this information to encapsulate the negotiate token sent to the web Server
The WEB server verifies the authentication information submitted by IE using the prepared keytab, or submits the information in the Kerberos token to the KDC for verification;
WebLogic Web server verifies that the appropriate subject is as
In some service settings, we usually use other environments to complete some operations. For example, we will talk about configuring Kerberos for the telnet service. In the Kerberos environment, each Kerberos service is represented by a service entity. This service subject is only a common Kerberos subject and holds the key used to decrypt the response sent by the Kerberos server. This is also true for the telnet service. You need to create the telnet service principal on the telnet server and p
single, then RM and a NM, everything is okay, and sync to all host
Set Jobhistory server security
Mapred-site.xml
Start Jobhistoryserver sbin/mr-jobhistory-daemon.sh start Historyserver
Execute command kinit, get a TGT (ticket granting Ticket)
[Hadoop@dev80 hadoop]$ kinit-r 24l-k-t/home/hadoop/.keytab hadoop
[hadoop@dev80 hadoop]$ klist Ticket-Cache:f
ile:/tmp/krb5cc_500
Default principal:hadoop@dianping.com
Valid starting Expires
/unixclient.nfsdomain.com unixclienthostSetsps-a root/unixclient unixclientrootSetsps-a root/unixclient.nfsdomain.com unixclientrootSetsps-a nfs/unixclient unixclientnfsSetsps-a nfs/unixclient.nfsdomain.com unixclientnfs
Unixclient requires a root/unixclient.nfsdomain.com@NFSDOMAIN.COM identity, but does not need to enter the password for that identity. This is achieved through a key table. Next we will export key table files for these accounts. Run the following command on nfsdomain-DC:
Ktpass-
, Authenticated users can achieve "one-time password authentication, multiple-pass authentication" of the passport mechanismPublish Secure NFSSteps:
Adjust the shared directory configuration to start secure NFS support
Deploying a Kerberos Key File
Start the Nfs-secure-server service
#vim/etc/exports/protected * (rw,sec=krb5p)Under the Server0:#wget Http://classroom/pub/keytabs/server0.keytab-O/etc/krb5.
: uncommitted read, commit read, repeatable read, and serializable. If you choose too high a level of isolation, such as serializable, although the system can achieve better isolation and more to ensure the integrity and consistency of data, but the conflict between transactions and deadlock opportunities greatly increased, greatly affecting the system performance.
(7) using bound connections. Bound connections allows two or more transaction connections to share transactions and locks, and any o
Http://www.amobbs.com/forum.php? MoD = viewthread tid = 4001689.
How to design a multi-level menu for key-Pressed Liquid Crystal
Typedef struct
{Uchar keystateindex; // Index Number of the current StateUchar keydnstate; // The status index number to be switched when the "down" Key is pressed.Uchar keyupstate; // The status index number to be switched when you press the "up" key.Uchar keycrstate; // The status index number to be switched when you press the "enter" key.Uchar keybackstate; // The
isolation level is too high, such as serializable, although the system can achieve better isolationTo a greater extent, data integrity and consistency are ensured. However, the opportunity for deadlocks due to conflicts between transactions is greatly increased.The system performance is greatly affected.
(7) Use bound connections. Bound connections allows two or more transaction connections to share transactionsAnd lock, and any transaction connection needs to apply for a lock as another transa
, or. py files to placeOn the Pythonpath for Python apps.--files files comma-separated List of files to is placed in the workingDirectory of each executor.--conf prop=value arbitrary Spark configuration property.--properties-file file Path to a file from which to load extra properties. If notSpecified, this'll look for conf/spark-defaults.conf.--driver-memory MEM Memory for driver (e.g. 1000M, 2G) (default:1024m).--driver-java-options Extra Java options to the driver.--driver-library-path Extra
[Email protected]/]# systemctl restart Nfs-serverClient:[Email protected]/]# Systemctl restart NFS #重起客户端服务[Email protected]/]# Touch/mnt/nsd/5.txtSecond, ordinary usersClient access to the service-side Nfs-server service,The server will determine the permissions of the local user with the same UID as the client.LDAP: Network user, providing user nameKerberos: Password authentication, implementation of "One-time password authentication, multiple free login" pass mechanismService side:[Email prot
Support on the server disc: \ Program Files \ support Tools. This tool will generate a key file for the Kerberos server that uses Windows 2000 KDC. Run the following command on the command line of PDC:
Ktpass-princ host/linux @ DOMAIN. NET-mapuser linux-pass
-Out
Linux. keytab
Note that the user's machine account name is linux and the DOMAIN name DOMAIN. NET and password. the password should be the same as what you used when creating a li
ticket expiry. To handle this, a relogin is attempted.The retry logic is governed by the SHOULDAUTHENTICATEOVERKRB method. In case the user doesn ' t has valid credentials, we don ' t need to retry (from cache or ticket). In such cases, it's prudent to throw a runtime exception if we receive a saslexception from the underlying Authenticati On implementation, so there are no retry from the other high level (for eg, HCM or hbaseadmin).
Other than that:[Org.apache.hadoop.security.UserGroupInf
://172.25.254.254/pub/keytabs/server0.keytab-O/etc/krb5.keytab# Ls/etc/krb5.keytab4. Service end multiplicity from Nfs-server and Nfs-secure-server# systemctl Restart Nfs-server nfs-secure-server5. Service side guarantee Ldapuser0 user has Write permission, set local permissions[Email protected] ~]# setfacl-m u:ldapuser0:rwx/test[Email protected] ~]# getfacl/test6. Client Access and Mount sharing[Email prot
Tags: Fundamentals of cloud Computing Foundation LinuxTwo virtual machines, all to be detected1. is yum available2. Firewall default zone modified to trusted3. Whether the IP address is configured#######################################################Second, ordinary users (must restore the environment)Client access to the service-side Nfs-server service,The server will determine the permissions of the local user with the same UID as the client.LDAP: Network user, providing user nameKerberos: Pa
The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion;
products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the
content of the page makes you feel confusing, please write us an email, we will handle the problem
within 5 days after receiving your email.
If you find any instances of plagiarism from the community, please send an email to:
info-contact@alibabacloud.com
and provide relevant evidence. A staff member will contact you within 5 working days.