Interconnecting Hive with External LDAP
This section applies to MRS 3.1.0 or later.
- Log in to FusionInsight Manager.
- On FusionInsight Manager, choose Cluster > Name of the desired cluster > Services > Hive. On the page that is displayed, click the Configurations tab then the All Configurations sub-tab. On this sub-tab page, click HiveServer(Role) and select Security.
- Set the following parameters.
Table 1 Parameter configuration Parameter
Description
Remarks
hive.server2.authentication
HiveServer authentication mode
Value: KERBEROS or LDAP
Default value: KERBEROS
hive.server2.authentication.ldap.baseDN
LDAP base DN
-
hive.server2.authentication.ldap.password
LDAP password
LDAP password used for health check
hive.server2.authentication.ldap.url.ip
LDAP IP address
-
hive.server2.authentication.ldap.url.port
LDAP port number
Default value: 389
hive.server2.authentication.ldap.userDNPattern
LDAP user DN pattern
Separate multiple values with colons (:), for example, cn=%s,ou=People1,dc=huawei,dc=com: cn=%s,ou=People2,dc=huawei,dc=com.
hive.server2.authentication.ldap.username
LDAP username
LDAP username used for health check
- After the modification, click Save in the upper left corner. In the displayed dialog box, click OK.
- Choose Cluster > Name of the desired cluster > Services > Hive > Instance. On the displayed page, select the instances whose Configuration Status is Expired, choose More > Restart Instance, and restart the instance.
Feedback
Was this page helpful?
Provide feedbackThank you very much for your feedback. We will continue working to improve the documentation.