Set up a secured instance
If you are connecting to HDI secured with Kerberos, you must also perform the following tasks.
Configure Kerberos security on the platform, including the Kerberos Realm, Kerberos KDC, and Kerberos Administrative Server.
Configure the following items to accept remote connection requests:
Name
Data
Secondary
Job tracker
Task tracker nodes
If you have deployed HDI using an enterprise-level program, set up Kerberos for name, data, secondary name, job tracker, and task tracker nodes.
Add user account credentials to the Kerberos database for each Pentaho user that needs access to HDI.
Verify that an operating system user account exists on each node in HDI for each user you want to add to the Kerberos database. Add operating system user accounts if necessary.
Note: The user account UIDs should be greater than the minimum user ID value (min.user.id). Usually, the minimum user ID value is set to
1000
.Set up Kerberos on your Pentaho machines.See the Administer Pentaho Data Integration and Analytics document for instructions.
Last updated
Was this helpful?