Preparing for Security Authentication
Scenario
Before accessing services in the secure cluster environment, you must be authorized by Kerberos. Codes for security authentication need to be written into the Kudu applications to ensure that the applications can work properly.
Two security authentication methods are described as follows:
- Authentication by running command lines:
Before running the Kudu applications, run the following command on the Kudu client to obtain authentication:
kinit component service user
This method applies only to the Linux OS that is installed with the Kudu client.
Feedback
Was this page helpful?
Provide feedbackThank you very much for your feedback. We will continue working to improve the documentation.See the reply and handling status in My Cloud VOC.
For any further questions, feel free to contact us through the chatbot.
Chatbot