Updated on 2024-08-12 GMT+08:00

Interconnecting Hive with External LDAP

This section applies to MRS 3.1.0 or later.

  1. Log in to FusionInsight Manager.
  2. On FusionInsight Manager, choose Cluster > Name of the desired cluster > Services > Hive. On the page that is displayed, click the Configurations tab then the All Configurations sub-tab. On this sub-tab page, click HiveServer(Role) and select Security.

  3. Set the following parameters.

    Table 1 Parameter configuration

    Parameter

    Description

    Remarks

    hive.server2.authentication

    HiveServer authentication mode

    Value: KERBEROS or LDAP

    Default value: KERBEROS

    hive.server2.authentication.ldap.baseDN

    LDAP base DN

    -

    hive.server2.authentication.ldap.password

    LDAP password

    LDAP password used for health check

    hive.server2.authentication.ldap.url.ip

    LDAP IP address

    -

    hive.server2.authentication.ldap.url.port

    LDAP port number

    Default value: 389

    hive.server2.authentication.ldap.userDNPattern

    LDAP user DN pattern

    Separate multiple values with colons (:), for example, cn=%s,ou=People1,dc=huawei,dc=com: cn=%s,ou=People2,dc=huawei,dc=com.

    hive.server2.authentication.ldap.username

    LDAP username

    LDAP username used for health check

  4. After the modification, click Save in the upper left corner. In the displayed dialog box, click OK.
  5. Choose Cluster > Name of the desired cluster > Services > Hive > Instance. On the displayed page, select the instances whose Configuration Status is Expired, choose More > Restart Instance, and restart the instance.