Cette page n'est pas encore disponible dans votre langue. Nous nous efforçons d'ajouter d'autres langues. Nous vous remercions de votre compréhension.

On this page

Show all

Interconnecting Hive with External LDAP

Updated on 2024-11-30 GMT+08:00

This section applies to MRS 3.1.0 or later.

  1. Log in to FusionInsight Manager.
  2. On FusionInsight Manager, choose Cluster > Name of the desired cluster > Services > Hive. On the page that is displayed, click the Configurations tab then the All Configurations sub-tab. On this sub-tab page, click HiveServer(Role) and select Security.

  3. Set the following parameters.

    Table 1 Parameter configuration

    Parameter

    Description

    Remarks

    hive.server2.authentication

    HiveServer authentication mode

    Value: KERBEROS or LDAP

    Default value: KERBEROS

    hive.server2.authentication.ldap.baseDN

    LDAP base DN

    -

    hive.server2.authentication.ldap.password

    LDAP password

    LDAP password used for health check

    hive.server2.authentication.ldap.url.ip

    LDAP IP address

    -

    hive.server2.authentication.ldap.url.port

    LDAP port number

    Default value: 389

    hive.server2.authentication.ldap.userDNPattern

    LDAP user DN pattern

    Separate multiple values with colons (:), for example, cn=%s,ou=People1,dc=huawei,dc=com: cn=%s,ou=People2,dc=huawei,dc=com.

    hive.server2.authentication.ldap.username

    LDAP username

    LDAP username used for health check

  4. After the modification, click Save in the upper left corner. In the displayed dialog box, click OK.
  5. Choose Cluster > Name of the desired cluster > Services > Hive > Instance. On the displayed page, select the instances whose Configuration Status is Expired, choose More > Restart Instance, and restart the instance.

Feedback

Feedback

Feedback

0/500

Selected Content

Submit selected content with the feedback