Set up a secured instance of CDP

If you are connecting to CDP secured with Kerberos, you must also perform the following tasks.

  1. Configure Kerberos security on the platform, including the Kerberos Realm, Kerberos KDC, and Kerberos Administrative Server.

  2. Configure the following items to accept remote connection requests:

    • Name

    • Data

    • Secondary

    • Job tracker

    • Task tracker nodes

  3. If you have deployed CDP using an enterprise-level program, set up Kerberos for name, data, secondary name, job tracker, and task tracker nodes.

  4. Add user account credentials to the Kerberos database for each Pentaho user that needs access to CDP.

  5. Verify that an operating system user account exists on each node in CDP for each user you want to add to the Kerberos database. Add operating system user accounts if necessary.

    Note: The user account UIDs should be greater than the minimum user ID value (min.user.id). Usually, the minimum user ID value is set to 1000.

  6. Set up Kerberos on your Pentaho machines.See the Administer Pentaho Data Integration and Analytics document for instructions.

Last updated

Was this helpful?