How to enable secure impersonation
Here is how to enable secure impersonation and how the Pentaho Server processes that request. The mapping value simple
in the driver configuration file turns on the secure impersonation. This value is set when you specify impersonation settings while creating a named connection. See the Pentaho Data Integration document for instructions on creating a named connection.
Understanding secure impersonation
When the Pentaho Server starts, it verifies the mapping type value in the configuration file. If the value is disabled or blank, then the server does not use authentication when connecting to the cluster. The Pentaho Server cannot log onto a secured cluster if the value is set to disabled or blank. If the value is simple, then requests are evaluated for origination from the PDI client tool (Spoon) or from the Pentaho Server. If the request comes from a client tool, then Kerberos authentication is used; if the request comes from the Pentaho Server, then the request is evaluated to see whether the service component supports secure impersonation. If the component does not support secure impersonation, the request uses Kerberos authentication. If the component supports secure impersonation, then the request will use secure impersonation.
When impersonation is successful, the Pentaho Server log will report
"Everything looks good! [Hadoop User] is successfully impersonating as [Pentaho User]."

Note: If you change the mapping type value in the configuration file, you must restart the server for it to take effect.
Use secure impersonation with a cluster
You can establish secure impersonation depending on the options you select when creating or editing a named connection as you connect to a cluster with the PDI client. If your environment requires advanced settings, your server is on Windows, or you are using a Cloudera Impala database, you should consider applying optional manual and advanced configurations for secure impersonation on the Pentaho Server.
The following sections guide you through the optional manual setup and advanced configurations:
Prerequisites
Manually configuring secure impersonation parameters
Configuring MapReduce jobs (Windows-only)
Connecting to a Cloudera Impala database (Cloudera-only)
Next Steps
For an overview of secure impersonation, refer to Setting Up Big Data Security.
Prerequisites
The following requirements must be met to use secure impersonation:
The cluster must be secured with Kerberos, and the Kerberos server used by the cluster must be accessible to the Pentaho Server.
The Pentaho computer must have Kerberos installed and configured. See Set Up Kerberos for Pentaho for instructions.
Note: If your system has version 8 of the Java Runtime Environment (JRE) or the Java Developer's Kit (JDK) installed, you will not need to install the Kerberos client, since it is included in the Java installation. You will need to modify the Kerberos configuration file, krb5.conf
, as specified in the Set Up Kerberos for Pentaho article.
A Pentaho driver for your Hadoop cluster must be installed and a named connection in the PDI client created. See the Pentaho Data Integration document for instructions.
Manually configuring secure impersonation parameters
If you prefer an automated setup and authentication configuration of secure impersonation, you can use the security options while creating a named connection in the PDI client. See the Install Pentaho Data Integration and Analytics document for instructions. This section explains how to manually configure secure impersonation if you are not using the PDI client or need more advanced configurations.
The mapping types value in the config.properties
file turns secure impersonation on or off. The mapping types supported by the Pentaho Server are disabled and **simple.**When set to disabled or left blank, the Pentaho Server does not use authentication. When set to simple, the Pentaho users can connect to the Hadoop cluster as a proxy user.
Note: If you are using these instructions for manually configuring secure impersonation by eduting the config.properties
file, you do not need to follow the steps in Edit config.properties (Secured Clusters) of the Hadoop distribution instructions listed in Install Pentaho Data Integration and Analytics.
Perform the following steps to manually set up secure impersonation for your Hadoop cluster and PDI:
Stop the Pentaho Server.
Navigate to the
<username>/.pentaho/metastore/pentaho/NamedCluster/Configs/<user-defined connection name>
directory and open theconfig.properties
file with a text editor.Note: This filepath and the
config.properties
file are created when you set up your named connection. See the Pentaho Data Integration document for instructions on creating a named connection.Modify the
config.properties
file with the values in the following table:ParameterValuepentaho.authentication.default.kerberos.principal
pentaho.authentication.default.kerberos.keytabLocation
Set the Kerberos keytab. You only need to set the password or the keytab, not both.
pentaho.authentication.default.kerberos.password
Set the Kerberos password. You only need to set the password or the keytab, not both.
pentaho.authentication.default.mapping.impersonation.type
simple
pentaho.authentication.default.mapping.server.credentials.kerberos.principal
pentaho.authentication.default.mapping.server.credentials.kerberos.keytabLocation
You only need to set the password or the keytab, not both.
pentaho.authentication.default.mapping.server.credentials.kerberos.password
You only need to set the password or the keytab, not both.
pentaho.oozie.proxy.user
Add the proxy user's name if you plan to access the Oozie service through a proxy. Otherwise, leave it set to
oozie
.In this table,
[email protected]
is provided as a sample of how you would specify your proxy user. If you have key-value pairs in your existingconfig.properties
file that are not security related, merge those settings into the file.Save and close the
config.properties
file.Restart the Pentaho Server.
Configuring MapReduce jobs
If you are trying to establish secure impersonation on a Windows system, you must modify the mapred-site.xml
file to run MapReduce jobs for secure impersonation.
Perform the following steps to modify the mapred-site.xml
file for secure impersonation:
Navigate to the
<username>/.pentaho/metastore/pentaho/NamedCluster/Configs/<user-defined connection name>
directory and open themapred-site.xml
file with a text editor.Add the following two properties to the
mapred-site.xml
file:<property> <name>mapreduce.app-submission.cross-platform</name> <value>true</value> </property> <property> <name>mapreduce.framework.name</name> <value>yarn</value> </property>
Save and close the file.
Connecting to a Cloudera Impala database
If you are trying to establish secure impersonation with a Cloudera Hadoop cluster and you are connecting to a secure Cloudera Impala database, you must update security-specific settings on the PDI database connection.
Perform the following steps to update your connection to the secure Cloudera Impala database:
Download the Cloudera Impala JDBC driver for your operating system from the Cloudera web site https://www.cloudera.com/downloads/connectors/impala/jdbc/2-6-15.html
Note: Secure impersonation with Impala is only supported with the Cloudera Impala JDBC driver. You may have to create an account with Cloudera to download the driver file.
Extract the
ImpalaJDBC41.jar
file from the downloaded zip file into the folder<username>/.pentaho/metastore/pentaho/NamedCluster/Configs/cdh61/lib
. TheImpalaJDBC41.jar
file is the only file to extract from the downloaded file.Connect to a secure CDH cluster.
If you have not set up a secure cluster, complete the procedure for setting up Pentaho to connect to a secure cluster found in the Install Pentaho Data Integration and Analytics document.
Start the PDI client and choose File > New > Transformation to add a new transformation.
See the Pentaho Data Integration document for instructions on starting the PDI client.
Click the View tab, then right-click Database Connectionsand choose New.
In the Database Connection dialog box enter the values from the following table:
FieldValueConnection Name
User-defined name
Connection Type
Cloudera Impala
Host Name
Hostname
Database Name
default
Port Number
21050
Click Options in the left pane of the Database Connection dialog box and enter the parameter values as shown in the following table:
ParameterValueKrbHostFQDN
The fully qualified domain name of the Impala host
KrbServiceName
The service principal name of the Impala server
KrbRealm
The Kerberos realm used by the cluster
Click Test when your settings are entered.
A success message appears if everything was entered correctly.
Next steps
When you save your changes in the repository and your Hadoop cluster is connected to the Pentaho Server, you are now ready to use secure impersonation to run your transformations and jobs from the Pentaho Server.
Note: Secure impersonation from the PDI client is not currently supported.
See the Install Pentaho Data Integration and Analytics document for instructions on any further advance configurations you may need to perform to connect your Hadoop cluster to the Pentaho Server.
Last updated
Was this helpful?